Interview with James Lamont, IT Manager at Tiger
Interview with James Lamont, IT Manager at Tiger
Interviewer: Great to meet you, James. Can you tell us a bit about your role at Tiger and how you got introduced to Centripetal?
James: I’m the IT Manager at Tiger, overseeing our security measures alongside our CISO. The introduction to Centripetal came from our CEO’s network. We’d been looking to further harden our infrastructure and complement our strong security team, so this introduction came at the right time. After reviewing Centripetal’s offer, and recognising the security it provides, we agreed to install the device for a complimentary trial. We’re now a platinum partner.
Interviewer: That’s impressive! Can you describe how Centripetal’s CleanINTERNET® solution has impacted your security infrastructure?
James: Absolutely. We have two CleanINTERNET® RuleGate appliances covering our head office (HQ) and datacenter (DC) locations. These units sit outside of our existing network, in front of our company firewall, and pick up all traffic in and out of our networks.
Interviewer: Can you share some specific use cases where CleanINTERNET® has made an impact?
James: Sure, here are a few examples:
- World-Leading Security In 2022/2023, 100% of successful cyber attacks against enterprises already had a firewall in place. We’re no longer dealing with traditional threats. Despite our strong security footprint, CleanINTERNET® unveiled previously undetected traffic within our robust security infrastructure. Our customers’ data is important to us, so we’ve invested in our security posture at both our internet breakout locations. The RuleGate’s proactive utilisation of threat intelligence repositories enhances our cybersecurity posture and elevates Tiger’s security framework to an enterprise-grade level, ensuring a robust defence against evolving threats in real-time.
- Reducing Management Overhead Traditional security appliances inundate support staff with events, alerts, and logs. CleanINTERNET® significantly reduces this management overhead by intercepting and neutralising all forms of reconnaissance and exploits before they enter our network. Our security appliances are integrated into a defence-in-depth architecture, resulting in a further reduction in traffic and resource utilisation. This not only minimises noise on the network but also mitigates the overt alerting that typically accompanies such security measures.
- Enhanced Stealth and Security Tools like Shodan scan and index information about various internet-connected devices. Shodan held information about Tiger’s online presence, including IP addresses and domain names. However, since implementing CleanINTERNET®, our internet-facing devices are no longer detectable online through public scanners or detection tools, effectively reducing our internet footprint. This heightened level of stealth makes it challenging for anyone to find us unless we intentionally make ourselves visible. The result is a strengthened security posture, ensuring that our online presence remains under our control and hidden from potential threats.
Interviewer: It sounds like CleanINTERNET® has been a game-changer for Tiger. Have you encountered any issues with legitimate traffic being impeded?
James: To date, we have encountered no instances of the unit impeding legitimate traffic. This is attributed to the device’s preliminary phase of monitoring and analysis, ensuring a thorough examination before activating any security measures.
Interviewer: Thank you for sharing these insights, James. It’s clear that CleanINTERNET® has successfully enhanced Tiger’s security infrastructure.
James: My pleasure. Yes, it’s been a transformative experience for us.
If you would like to learn more about Tiger’s use of CleanINTERNET, drop us a hello@tiger.io.