ESC-20 Conference Building
Programs and Services » Technology Services » Infrastructure Services

Infrastructure Services

Today’s organizations demand a robust and secure network infrastructure to drive collaboration, keep data secure, and remain agile. Operational excellence and execution are the cornerstones of any successful local educational agency. Our Infrastructure Services take a comprehensive approach to ensure that the infrastructure of your agency operates as designed.

Fortinet Logo

FortiAnalyzer

Security teams worldwide are struggling with the growing complexity of security operations. As networks expand and evolve and cyber threats grow more sophisticated, security teams are challenged to keep up. FortiAnalyzer, combined with the Fortinet Security Fabric, provides a solution.

FortiAnalyzer Network Security Logging, Analysis, and Reporting Appliances securely aggregate log data from Fortinet Security Appliances. A comprehensive suite of easily customizable reports allows you to quickly analyze and visualize network threats, inefficiencies and usage.

NOTE: Must have Fortigate firewall.

Forticlient

FortiClient Tiered License Security Fabric Agent plus ATP license subscription for 25 endpoints. Includes Fabric Agent, Anti-Malware, Remote Access, Web Filter, Vulnerability Scan, Software Inventory, Application Firewall, Application Control, SSOMA, Threat Outbreak Detection, Sandbox Agent with Cloud Sandbox subscription, Central Management (On-Prem) and 24x7 Support. FortiClient for Chrome offers Chromebook license subscription for 25 Chrome OS users. Includes Web Filter, Central Management (On-Prem) and 24x7 Support.

The purpose of a network diagram is to demonstrate how computers or a system is linked to others in a network. It can be useful when you have technicians or engineers troubleshooting network or connectivity issues. Network diagrams are also necessary for Network Engineers to plan network design changes.

ESC-20 will provide a diagram of the physical network in cut sheets (11” x 17”) or poster size, CDROM Visio and PDF of the entire district network. Fee is based on annual cost.

Have you considered getting an outside, objective opinion of your network? The goal of a network security assessment is to identify network component operating systems and configuration vulnerabilities by assessing management, operations, and technical aspects of an information system. Devices like routers, switches, and firewalls are prone to unique vulnerabilities and exploits. It is imperative to have a complete understanding of the network as a whole. The benefits of a network assessment is the ability to identify network strengths and weaknesses while obtaining refreshed network documentation that can help establish a baseline for future network projects.

NOTE: A customer provided network diagram is required to perform this assessment.

A vulnerability scan may consist of a scan of servers, PCs or both. The vulnerability scan reports serve as a guide for remediation of vulnerabilities identified during the vulnerability scanning activities. These may be recommendations for system configurations or identification of missing patches or updates. With the Network Vulnerability Scan, our Security Administrator will use a vulnerability scanning tool to provide detailed information including asset results, audit and remediation reports. Further evaluation to identify network and system vulnerabilities by assessing management, operations, and technical aspects of an information system may be obtained through the purchase of a comprehensive Network Assessment.

NOTE: Cost is based on blocks of /24 IP addresses. The free service for Premier Members includes only one /24 IP address scan.

Humans are often the weakest link when it comes to cybersecurity. It is required under HB-3834 to integrate employee security awareness training into your organization for employees who have access to a computer.

Proactive security awareness training of employees can significantly reduce the organization’s risk of a ransomware attack, data breach or other security incidents. Educating employees is your organization’s best defense against these malicious attacks.

ESC-20 will provide proactive face-to-face or virtual one-hour security training of faculty and staff. Training will include best practices, policies, procedures, popular attack methods and trends.

NOTE: Districts may choose to train high school, middle school and elementary in three (3) different sessions. This will require the purchase of three (3) training sessions.

Security awareness training and anti-phishing from Infosec I.Q., a computer-based enterprise training platform that is undergoing HB-3834 recertification. Simulation of phishing attacks included with remediation via training as an option.

NOTE: Price may decrease based of level of participation.