Search for people on this page
Access will be provided to a Solarwinds webpage to view bandwidth utilization graphically and in report formats. Telephone, remote and onsite support will be given for the software and setup of WAN devices to be viewed through monitoring. E-mail updates will be sent regarding any software changes and/or new developments. Training will be provided on how to read the utilization reports and graphics. Local bandwidth utilization reports will be provided four (4) times per year.
NOTE: Access to the Wide Area Network (WAN) devices to be monitored is needed. This service is available to ISP clients ONLY.
Anti-phishing and security awareness training from Infosec I.Q., a computer-based enterprise training platform. Simulation of phishing attacks included with remediation via training as an option.
NOTE: Price may decrease based of level of participation.
Network Security Assessment
Have you considered getting an outside, objective opinion of your network? The goal of a network security assessment is to identify network and system vulnerabilities by assessing management, operations, and technical aspects of an information system. Devices like routers, switches, and firewalls and the resident hosts like PCs and servers are prone to unique vulnerabilities and exploits. It is imperative to have a complete understanding of the hosts and the packet transport mechanism, or the network as a whole. The benefits of a network assessment are the ability to identify network strengths and weaknesses while obtaining refreshed network documentation that can help establish a baseline for future network projects.
NOTE: New assessment is required if an assessment has not been performed in the last two years by ESC-20.
ESC-20 will provide logical and physical diagrams in cut sheets (11 x 17) or poster size, CD-ROM Visio and PDF of the entire district network.
Network & Server Support
NOTE: Work may be supplemented through the use of partners.
Network Vulnerability Scan
A vulnerability scan may consist of a scan of servers, PCs or both. The vulnerability scan reports serve as a guide for remediation of vulnerabilities identified during the vulnerability scanning activities. These may be recommendations for system configurations or identification of missing patches or updates. Further evaluation to identify network and system vulnerabilities by assessing management, operations, and technical aspects of an information system may be obtained through the purchase of a comprehensive Network Assessment.
NOTE: Cost is based on blocks of 254 IP addresses.
Security Awareness Training
Humans are often the weakest link when it comes to cyber security, It is critically important to integrate employee security awareness training into your organization. Proactive Security Awareness training of employees before an Information Security incident occurs will include best practices, policies, procedures, popular attack methods and trends. Organizations can significantly reduce their risk of a data breach by educating employees before an incident occurs.
ESC-20 will provide proactive face-to-face one-hour Security Awareness training of employees. Training will include best practices, policies, procedures, popular attack methods and trends. Organizations can significantly reduce their risk by educating employees. Some customization can occur to identify items specific to your district such as actions, password policy, etc.
NOTE: Districts may choose to train high school, middle school and elementary in three (3) different sessions. This will require the purchase of three (3) training sessions.