CTS IT Security Enhancement Projects December 10, 2014.

Slides:



Advertisements
Similar presentations
CTS Initiatives July 24th, CTS Initiatives Schedule The CTS Initiatives Schedule provides a consolidated view of the work going on at CTS. This.
Advertisements

CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
FIREWALLS Chapter 11.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Secure Lync mobile Authentication
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
Module 5: Configuring Access to Internal Resources.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Firewall Slides by John Rouda
1 Enabling Secure Internet Access with ISA Server.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
CTS Private Cloud Status Quarterly Customer Meeting October 22, 2014.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
ENAM ENAM - INFRA Project 2013.
Module 1: Server Roles and Initial Configuration Tasks
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Corporate Information Systems Delivery of Infrastructure IT Services.
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
AWS Cloud Firewall Review Architecture Decision Group October 6, 2015 – HUIT-Holyoke-CR 561.
ArcGIS Server for Administrators
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
IT and IM: Promises and Pitfalls Greta Lowe August 15, 2011.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Wireless Intrusion Prevention System
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
ISA SERVER 2004 Group members : Sagar Bhakta – [intro] Orit Ahmed – [installation] Michael Wijaya [advantages] Rene Salazar - [features]
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Deconstructing API Security
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Kona Security Solutions - Overview
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
IS3220 Information Technology Infrastructure Security
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Office of Administration Enterprise Server Farm September 2008 Briefing.
Office of Administration Enterprise Server Farm Managed Services August 2004 Briefing.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Critical Security Controls
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
Prepared By : Pina Chhatrala
Securing the Network Perimeter with ISA 2004
Hybrid Search Phased Approach.
FIREWALL.
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

CTS IT Security Enhancement Projects December 10, 2014

Agenda Review of IT Security Decision Package Projects o Decision Package Funds - Overview o Enterprise Forward Proxy o Logging and Monitoring o Vulnerability Management & Discovery Tool o Web Application Firewall o Data Loss Prevention o Mobility Support

Decision Package funding was made possible by the decision package which was approved in 2013 all projects reviewed today are included as part of the security allocations agencies receive for the Security Infrastructure Service or Secure Gateway Service

Enterprise Forward Proxy (Complete) is included in the Secure Gateways service offering proxies outbound traffic for content analysis and filtering is delivered as Active/Active in Olympia with failover in the cloud service. provides delegated partitions and administration to enable agencies to control their own agency specific configuration 16 agencies and 25,000 users in production with a projection to 65,000 users by 2016

Logging and Monitoring is included in the Secure Infrastructure service offering service expansion provides a delegated model for agency reporting & centralized monitoring of all log data generated within each agency is available to agencies connected to the State Governmental Network who are also members of the Enterprise Active Directory Forest CTS equipment is fully implemented & operational DOR (pilot agency) equipment went online in early December and is performing initial deployment and operations testing

Vulnerability Management & Discovery Tool is included in the Security Infrastructure service offering service provides agency centric network scans & asset discovery for a comprehensive view of your network all hardware is located in the SDC with connections into agency networks available to agencies connected to the State Governmental Network who are also members of the Enterprise Active Directory Forest service being deployed in CTS with Agency Onboarding in Q1 2015

Future DP Projects Web Application Firewall – Q  Inspection of http protocols to mitigate attacks such as XSS & SQL injection  is included in the Secure Gateways service offering Data Loss Prevention – Q  Inspection & restriction of sensitive data outside an agency network  is included in the Secure Gateways service offering Mobility Support – Q  Under development

How do I …? To find out more information, please visit; CTS Initiatives  SharePoint Portal  Or, contact your Agency Implementation Coordinator (AIC).  Each Agency has identified a single-point-of-contact for collaboration on the SDC projects. AIC Meetings 

Request Service o To request any of these services, contact the CTS Servicedesk at Thank You