Enterprise Security

Advanced Endpoint Protection (AEP)

About Advanced Endpoint Protection (AEP) Advanced Endpoint Protection (AEP) is a software solution that provides next-generation protection of endpoints through the use of artificial intelligence and machine learning to identify malware. What problems it solves Security breaches are costly and

Email Encryption

About Email Encryption Email Encryption allows email messages and attachment to be easily protected while maintaining control wherever they are shared. This service is currently provided through Virtu. What problems it solves Prevents unauthorized access or disclosure of confidential information

Multi-Factor Authentication (MFA)

About Multi-Factor Authentication (MFA) Multi-Factor Authentication (MFA) is a security mechanism that requires multiple factors of authentication to verify a user's identity for a login or other transaction. Factors for authentication may include knowledge (something a user knows, like a password)

Anti-Phishing

About Anti-Phishing This service provides the capability for an agency security team to conduct simulated phishing attacks against their employees, or have them conducted by Cyber Command. This involves sending emails that mimic real phishing attempts as seen by outside threats. Employees who click

Security Awareness Training (SAT)

About Security Awareness Training (SAT) Security Awareness Training (SAT) features user-friendly online training courses that cover the latest cybersecurity best practices to educate employees on how to keep state data and devices safe. This training is mandatory for all state employees and must be

Security Operations Center (SOC)

About Security Operations Center (SOC) A Security Operation Center (SOC) is a function within Cyber Command which employs people, processes, and technology to continuously monitor the security posture and potential threats to the State, while preventing, detecting, analyzing, and responding to

Server Hardening

About Server Hardening Cyber Command provides the tools for agencies to evaluate their systems against a variety of hardening guidelines and provides a detailed report of the security risks associated with any identified gaps. Recommendations on policy and configuration changes, as well as technical

Vulnerability Management

About Vulnerability Management Vulnerability Management tracks an agency or board’s overall exposure to cyber risk and generates a score and visual representation at both the organization and asset level. The current goal is for all agencies to achieve a score of 725 or greater. Cyber Command also

Web Application Firewall (WAF)

About Web Application Firewall (WAF) A web application firewall (WAF) helps protect web applications by filtering and monitoring traffic destined for your web applications from the Internet. What problems it solves Internet-facing Web applications are inherently at risk of being attacked by threat

Web Content Filtering (WCF)

About Web Content Filtering (WCF) Web Content Filtering helps protect users from accessing websites known to pose security risks and can also be used to control the web-based content a user can access. Provides the ability to block content by category or specific websites containing material