Security

Home >> Service Catalog Categories >> Security

Active Directory Federation Services (ADFS)

ADFS provides single-sign-on (SSO) technologies to authenticate a user to multiple Web applications (either on or off premise) over the life of a single online session. ADFS accomplishes this by securely sharing digital identity and “claims” across security and enterprise boundaries.

A claim is a statement about a user that is used for authorization purposes in an application. ADFS brokers trust between disparate entities by allowing the trusted exchange of arbitrary claims that...Read more

Application Security Management

Protect your agency by securing Web applications against Layer 7 threats.

The Application Security Management (ASM) service from WaTech blocks malicious attacks before they reach Web applications and is compatible with all major Web technologies and platforms.

There are two options for the ASM service:

  • Managed ASM: This solution is fully managed by WaTech to include policy building and configuration. A base ruleset is applied that is designed to protect Web
  • ...Read more

CERT Security Assessment

The ability to know your organizational cybersecurity risk is critical for reducing your exposure. The OCS Computer Emergency Readiness Team (CERT) performs security assessments of your organizations assets to provide you with an understanding of your vulnerabilities, critical assets, and issues. The work performed is as an extension of your organization’s own resources to provide your management with reporting information for risk mitigation planning.

Read more

Fortress Anonymous

Fortress Anonymous provides a secure access connection to public data, when the integrity and availability of the data must be protected from targeted attack. By masking the IP addresses to protect the source data from being exposed to the public Internet and potential targeted attack, Fortress Anonymous protects the state’s assets that are behind the secured gateway.

Fortress Anonymous also provides encryption between the service and the end user accessing the information so that...Read more

Logging and Monitoring

The Logging & Monitoring service provides monitoring of all syslog’s generated by network infrastructure and security equipment to centralize the visibility and report/alert on abnormal traffic detection in near real time. By identifying and tracking system events, your agency will be better equipped to take preventative actions before an exploit occurs.

Read more

Managed Firewall

Managed Firewalls protect your network from unauthorized access and malicious attacks. Firewalls are the critical gateway into a network, and firewalls managed by WaTech come with the highest degree of attention and expertise to protect critical agency assets and provide peace of mind.

Managed Firewall services are available in two categories:

  • WaTech-Managed Firewalls are a fully managed firewall solution, including policy and configuration. The service is tailored to
  • ...Read more

Network Security Design Reviews

WaTech Design Review Process gives agencies the opportunity to review strategies for implementing new technology, or strategies for modifying existing services that interact with the following systems: the State Government Network (SGN), the InterGovernmental Network (IGN), statewide systems, and the state’s security infrastructure.

The process analyzes both internal and external system modifications. WaTech then prepares a formal summary, which typically takes one to two weeks to...Read more

Secure Certificates (formerly Internal Certificate Authority)

Secure Certificates were created as part of the decision package for the Integration Competency Center and provides digital certificates for use inside the State Governmental Network to address the need to protect data in transit. The Enterprise Security Services group provides the Secure Certificate service.

Secure Certificates enable strong end point authentication and inter-server data encryption via SSL/TLS. Secure certificates are not intended for personal identification...Read more

Secure Web Proxy (formerly Enterprise Forward Proxy)

The Secure Web Proxy service is an outbound Internet traffic proxy which provides content analysis and filtering. The service is available to agencies connected to the State Government Network. This service provides high-availability in Olympia with future plans to support business continuity in Eastern Washington. The service supports delegated partitions and administration which provides agencies the ability to control their own agency level configurations.

Read more

SecureAccess Washington

SecureAccess Washington® provides self-administered single sign-on access to multiple agency applications, shields online services from harmful activity, and allows access only to known users.

To use a service or application protected by SecureAccess Washington®, you must provide a user ID and password – its authentication mechanism. The agency owner of the service is responsible for allowing or denying access and for verifying individuals' identities.

Some...Read more

Security Infrastructure

WaTech Enterprise Security Infrastructure protects the Washington State computer network from cyber threats like hackers and viruses. All agencies on the State Government Network (SGN) and the Intergovernmental Network (IGN) can rely on a safe network environment. The Enterprise Security Infrastructure is a strong defense against malicious and increasingly sophisticated cyber threats.

Read more

Strong Authentication

WaTech Strong Authentication service provides a way to positively identify users with a two-part authentication process. The authentication process uses one item that users know – a PIN – and one item that users have – a token to provide a one-time password. This provides a much stronger and more reliable level of authentication than a password.

This service can be used to positively identify users who access a variety of agency applications or resources, such as:

Vulnerability Assessment

Vulnerability Assessment is one of the most effective, pro-active processes your agency can use to protect network assets. By identifying and tracking system and application vulnerabilities, your agency will be able to take preventative actions before an exploit occurs.

Avoid damaging attacks by creating a strong vulnerability management strategy using best-in-class technology for your business needs. Be confident that you are in compliance with federal requirements by using an...Read more

Web Services Gateway

The Web Services Gateway (WSG) enables agencies to make their State Government Network (SGN)/Intergovernmental Network (IGN) web services available to the Internet in a secure and reliable manner. The WSG supports a variety of WS standards, including but not limited to: WS-Addressing, WS-ReliableMessaging, WS-Policy, WS-Security, and WS-SecureConversation.

Read more