Advanced Threat Protection

Advanced threat protection delivered as a cloud service for adaptive and agile defense

Advanced Threat Protection is the collection of network security and related defenses deployed to address current and emerging threats. Often, it is not the advanced nature of the threat that is the real risk. IT organization are facing the daunting task of maintaining complex infrastructure as the basis of providing Advanced Threat Protection to their users. Following simple best practices like network segmentation, keeping software up to date, monitoring and detecting unauthorized cloud usage (“Shadow IT”), and deploying multi-factor authentication – to name a few – represent a real hurdle for IT leaders facing significant skill shortages.

Advanced Threat Protection that delivers a powerful set of defenses, in the form of self-maintaining cloud service, is essential to effective security. Customers should expect up-to-date, scalable and optimized infrastructure as the starting point to evaluating Advanced Threat Protection capabilities.

The ICG Solution: A cloud-based network with built-in Advanced Threat Protection

ICG is providing a range of advanced security services built into a global cloud network. The SD-WAN aggregates all enterprise traffic across data centers, branches, mobile users and cloud infrastructure into the cloud. It then applies multiple security engines to enforce a comprehensive security policy on both WAN and Internet-bound traffic, and all users, both fixed location and mobile.

The ICG Research Lab is analyzing cloud network traffic patterns to looks for anomalies and possible attacks on our infrastructure and on customers networks, and adapt our defenses as needed.

Benefits

  • Built-in network segmentation
    The cloud network is segmented by default preventing access between network resources (locations, users) unless specifically permitted.
  • Advanced malware protection
    ICG inspects all web sites access for malicious domains (phishing and malware delivery sites). It also performs aninspection on all WAN and internet traffic for malicious files.
  • Intrusion prevention system
    ICG performs deep packet inspection on all traffic for indicators of compromise or malicious patterns. Protocols validation, known CVEs, flagged domains and IPs, and advanced behavioral analysis is seamlessly performed in the ICG SD-WAN.
  • Network anomaly detection
    ICG enforces application aware policies on both WAN and Internet traffic across all network resources. Deep Packet Inspection is used to look for attack patterns within internal and external network activity.
  • Rapid threat adaptation
    ICG leverages the unprecedented visibility to the cloud network traffic to detect network anomalies and emerging threats. This enables quick adaptation of our Advanced Threat Protection to protect all customers.
  • Cross-domain event correlation
    ICG looks at network activity across multiple domains to identify complex attack patterns in real time.
  • Unrestricted scalability and self-maintaining service
    ICG can inspect any traffic mix (encrypted and unencrypted) and ensures capacity is available to provide subscribed services. Without the need to size, upgrade, patch or refresh appliances, customers are relieved of the ongoing grunt work of keeping their network security up to date against emerging threats and evolving business needs.

Have time for a coffee?

Face to face or over Zoom, we are here to help you.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.