Access will be provided to a Solarwinds webpage to view bandwidth utilization graphically and in report formats. Telephone, remote and onsite support will be given for the software and setup of WAN devices to be viewed through monitoring. E-mail updates will be sent regarding any software changes and/or new developments. Training will be provided on how to read the utilization reports and graphics. Local bandwidth utilization reports will be provided four (4) times per year.
NOTE: Access to the Wide Area Network (WAN) devices to be monitored is needed. This service is available to ISP clients ONLY.
Anti-phishing and security awareness training from Infosec I.Q., a computer-based enterprise training platform. Simulation of phishing attacks included with remediation via training as an option.
NOTE: Price may decrease based of level of participation.
Have you considered getting an outside, objective opinion of your network? The goal of a network
security assessment is to identify network and system vulnerabilities by assessing management,
operations, and technical aspects of an information system. Devices like routers, switches, and
firewalls and the resident hosts like PCs and servers are prone to unique vulnerabilities and exploits.
It is imperative to have a complete understanding of the hosts and the packet transport mechanism,
or the network as a whole. The benefits of a network assessment are the ability to identify network
strengths and weaknesses while obtaining refreshed network documentation that can help establish
a baseline for future network projects.
NOTE: New assessment is required if an assessment has not been performed in the last two years
The purpose of a network diagram is to demonstrate how one computer or system is linked to others in a network. It can be useful when you have technicians trying to track down problems. Issues can be easily traced if the technicians have an understanding of how all the different devices in a network are connected. Network diagrams are really useful for Network Engineers to plan network design changes.
ESC-20 will provide logical and physical diagrams in cut sheets (11 x 17) or poster size, CD-ROM Visio and PDF of the entire district network.
Consultation, configuration and support for servers, applications, phone switch, operating system, networking devices (routers, switches, firewalls, etc.) and videoconference equipment.
NOTE: Work may be supplemented through the use of partners.
A vulnerability scan may consist of a scan of servers, PCs or both. The vulnerability scan reports serve
as a guide for remediation of vulnerabilities identified during the vulnerability scanning activities.
These may be recommendations for system configurations or identification of missing patches or
updates. Further evaluation to identify network and system vulnerabilities by assessing management,
operations, and technical aspects of an information system may be obtained through the purchase of
a comprehensive Network Assessment.
NOTE: Cost is based on blocks of 254 IP addresses.
Humans are often the weakest link when it comes to cyber security, It is critically important to
integrate employee security awareness training into your organization. Proactive Security Awareness
training of employees before an Information Security incident occurs will include best practices,
policies, procedures, popular attack methods and trends. Organizations can significantly reduce their
risk of a data breach by educating employees before an incident occurs.
ESC-20 will provide proactive face-to-face one-hour Security Awareness training of employees.
Training will include best practices, policies, procedures, popular attack methods and trends.
Organizations can significantly reduce their risk by educating employees. Some customization can
occur to identify items specific to your district such as actions, password policy, etc.
NOTE: Districts may choose to train high school, middle school and elementary in three (3) different
sessions. This will require the purchase of three (3) training sessions.
Contact Mike Garcia
Contact Tom Grove
Common Core Disclaimer
Copyright © 1985 - 2019. All rights reserved.