LET’S MAKE THE PERFECT DIGITAL PARTNERSHIP

t: 0333 666 5777e: hello@itgl.com

ITGL Limited, Trafalgar House,
223 Southampton Road,
Portsmouth, PO6 4PY

Cyber Security Advisory Services

SEGMENTATION

Problem

Implementing traditional segmentation methods has become challenging due to the increasing complexity of networks and the faster turnover of users, services, and devices.

Approach

By analysing existing network use and consulting on policy requirements, we design and deliver technology to seamlessly segment users and devices.

1    Network traffic flow analysis
2    Automated asset discovery & classification
3    Policy definition
4    Automated policy enforcement

ZERO TRUST

Problem

Erosion of traditional network perimeters and controls places greater emphasis on access control to services and data at point of connection, wherever the user or device may be.

Approach

Establish trust in users and devices before granting access to services. Multi-factor authentication and device posture checks help to determine the level of trust and authorisation for a connection.

1    Requirements gathering
2    Gap analysis
3    Technical controls - evaluation
4    Technical controls - production deployment

SECURITY SERVICE EDGE (SSE)

Problem

Hybrid working presents difficulties when applying unified security policies across all users and devices, irrespective of location.

Approach

We consider requirements, existing security controls, and user locations to design and deploy unified, cloud-delivered secure proxy solutions that improve security and efficiency, and increase flexible working possibilities.

1    Requirements gathering
2    Gap analysis
3    Technical controls - evaluation
4    Technical controls - production deployment