Re-imagine cyber protection
Re-imagine cyber protection
cyber security platform unification
converging security functions, with iG2 UES platform
Re-Inventing Security Operations with iG2 Software Robots
Security Posture
Sustained Cyber Hygiene for Enterprise, Critical Infrastructure and Cloud
END POINT SECURITY
RE-IMAGINE THE PERIMETER
identity | privacy | zero trust
IDENTITY SECURITY
secure identity first solution, starting with human
Critical Infrastructure Threat Insights
Extending Cyber Protection to OT/ICS physical platforms
iG2 Solution Strategies
Prepare for the fight...but brace for the impact. reduce attack surface, and have a disaster recovery plan
enabling cyber resilience
Cyber Security Wellness (foundation) | Cyber Security Rails (drift management) | Automated Attack Distruption (AI based response)
enabling cyber resilience
machine learning (ML) for threats identification and machine response (MR) for defence and offence
iG2 Group Inc. is a Canadian technology company, leading in next-generation digital and consulting services. iG2 serves as independent, technology-agnostic advisor and collaborative partner to our public sector community. We provide unparallel industry expertise and proven methodologies to optimize security and infrastructure technologies transformation and maximize business outcome.
Named as one of the top 10 cyber security companies in Canada by the global Enterprise Security Magazine, iG2 has developed numerous reference architecture and solutions guide that are widely adopted by organizations across Canada. Our focus is to right-size innovation to deliver practical security solutions which enable your enterprise to deliver more secure, faster, and cost-effective services and operations.
The iG2 team empowers organizations to innovate by leverage the best of both digital transformation and human – AI-enabled machine collaboration. By providing thought leadership, strategy development, and practical assistance for implementation planning through to execution and operations – we can help you realize the modern, intelligent, secure technology stacks and upskilled human resources needed to support achievement of your organizational goals and objectives.
iG2 is a Vendor of Record (VOR) for Ontario Government and Ontario Public Funded Organizations, in the following:
- I.T Security Products and Service (Tender_17542),
- Management Consulting (Tender 17892) etc.
Partner with iG2 and leverage our recognized VOR status to access specialized servcies that empower your organization's success. With our commitment to excellence and track record of delivering results, we ensure exceptional value and outcomes for your partnership.
iG2 team empowers its clients to take advantage of the digital transformation and the human – AI enabled machine collaboration.
iG2's team has demonstrated understanding and practical experience with the standards, policies, and guidelines of the Government of Ontario and the Broader Public Sector. With more than 20 years’ experience in Machine learning, Cyber security, and enterprise infrastructure. iG2 have led and contributed to the industry’s evolution, amassing a combined 150 years’ experience in the private and public sectors, and hold academic and industry certifications, including CISSP, CISA, CCSP, CEH, P. Eng, M.Sc., Ph.D., Our knowledge, and experience have been shared in more than 300 publications, and white papers internationally.
iG2 ENTERPRISE SECURITY SERVICE
A suite of innovation services designed to improve your organization's cyber security posture, resilience and reduce risk, while supporting your continual digital transformation journey.
iG2 ENTERPRISE SECURITY ENGINEERING
Design, build and operationalize cyber security practice with Extended Detect and Response (xDR & mXDR). Our next generation xDR practice, included end point protection, (from Identity to cloud), intelligent event visibility and analysis (advances SIEM) with semi-automated response (SOAR) with Security operations (SecOps) service delivery collaboration with conventional IT operations.
iG2 xDR ADVISORY SERVICE
Combines advanced end-to-end security visibility with iG2 cyber threat insights with to unravel, detect and auto response to most cyber threats.
iG2 CYBER RESILIENT
Cyber security and network architecture aims at providing pervasive secure connectivity, by embracing software defined distributed network (SDDN) and compartmentalizing failure zone, while trusting no-one (ZTN)
Brief history
September 2023: iG2 launches "UES - X" is a security platform that unifies XDR, SIEM and SOAR protection for endpoints and cloud workloads. It integrated Machine Learning (ML) for threat detection, Artifical \Intelligence (iG2 Lisa AI companion) for threat investigation.
December 2022: iG2 launches "G2-Plusar" an AI based SIEM platform, design for OCSF standards -based data lake with xSOAR integration.
September 2022: iG2 launched its enterprise mXDR Service (managed extended detect and response service) with intelligent log collection, threat insight, context-aware response, automated response, remediation, and cyber resilience re-enforcement.
July 2022: iG2 extends its advisory service to include Network Detect and Response (NDR)
June 2022: iG2 launches its resilient cyber secure architecture framework
Oct 2021: iG2 launches "Project Needle" An iG2 purpose-built Linux Distro with a suite of deception technologies, packaged with visualization and analytics. This all-inclusive package will enable organization to deploy decoy technologies (servers-honeypot, network-honey net, honey doc, breadcrumbs etc.), while capturing, analysing, and visualizing attackers’ activities in real time. This package is made available at no cost to help organizations enhance their cyber defences.
Sept 2021: iG2 enable ZTN design, built and implement ZTN solution for a corporate client.
April 2019- Aug 2021: iG2 Enable a WAF, CASB, FWaaS, NG-SEC with ATP, SASE solutions for multiple clients
2016-2021: iG2 enabled SASE, WAF, SD-WAN/NG-SEC, NOC, Private Cloud and SAAS applications for multi client.
2014-2016: iG2 enable multi-private cloud ready data center; Open Cloud solutions and platform (for large higher-ed institution)
1) AI advantage Insight Analysis
2) iG2 Intelligent-Architecture transformation
3) Cyber resilience Architecture and Solutions
4) Managed xDR service, with hyper automated response.
5) iG2 Cyber Security hygiene for Enterprise, Cloud and Critical Infrastructure
6) Next Generation Secure-Network Solutions, SD-WAN and SASE
7) Resilient IT solutions (Identity security, Vulnerability management, and Cloud security)
8) Cyber security risk and posture assessment
1) iG2 UES is a security platform that unifies XDR, SIEM and SOAR protection for endpoints and cloud workloads. It integrated Machine Learning (ML) for threat detection, Artifical \Intelligence (iG2 Lisa AI companion) for threat investigation.
2) iG2 Security Lake - A composite threat detection, identification, and response platform, with hyperautomation
3) iG2 security posture and risk assessment (standards based, NIST, CAS, STAR)
4) Manage Cyber Protection
5) Managed Cyber Operation Center (MXDR)
6) iG2 Crypto Shield: advanced visibility into cipher data (iG2 native)
iG2
An in-depth Cyber Risk Assessment. We work with you to review the current state of your security posture and evaluate it against widely-accepted best practices and frameworks like NIST CSF, CSA, STAR and ISO 27001
On boarding effective Cyber Hygiene. End-point protection, user Identity, data, application, cloud protection to contained threats and stop breaches. Zero touch deployment within minutes. Includes , ZTN, 2FA, Next Generation Anti-malware and Attack protection.
The IG2 Managed xDR service, combines advanced threat prevents, control with end points security in iG2 Security Data lake to provide events threat visibility . Layered ontop is a SecOPS processs with auto response to most cyber threats. Ultimately improving cyber resilience with machine intelligence and automation
MANAGED NETWORK AND SECURITY
(IG2 CYBER CENTER HUB - NOC & SOC)
Know whether your critical data and service is at risk and how easily it may be obtained by malicious actors. Identify and mitigate complex security vulnerabilities before an attacker exploits them.
A suite of technical and advisory services that enable clients to deal with cyber events (security breach, incident triage, and resolution, forensic investigation, and remediation)
1,250
HOURS OF WORK
40+
FINISHED PROJECTS
17+
HAPPY CLIENTS
18
EXPERT MEMBER TEAM