NORFOLK, Va., June 4, 2018 /PRNewswire/ -- Jigsaw Security has released their new Jigsaw Threat Mitigation Model. This model brings together threats from multiple environments into one protection model. The Jigsaw model encompasses six phases to cover multiple vector attacks. The phases of the model are Personnel and Insider Threat, Intelligence Collection and Application, Physical Controls, Cyber Security Controls, Counter Operations and Audit and documentation. Jigsaw applications enable an organization to cover all these phases providing a comprehensive security program covering the full spectrum of threats.
The Jigsaw Security suite of products to include our FirstWatch sensor detects signature-based threats and non-signature-based threats using advanced analytics and crowd sharing of incident data as we have found IOC (Indicators of Compromise) to be stale and not very useful for actually providing protection. In addition to our FirstWatch sensor, our patented methodology known as the Jigsaw Threat Mitigation Model allows us to map our security services to standards such as NIST or the DHS CDM models without changing how we approach security issues.