Security

Home » Service Catalog Categories » Security

CIRT Security Assessment

The ability to know your organization’s practical cybersecurity risk is critical for reducing your exposure. The Washington state Office of CyberSecurity (OCS) Computer Incident Readiness Team (CIRT) performs security assessments of your organization’s assets to provide you with an understanding of your vulnerabilities, system hardening and other issues.

These assessments are most often used in the following ways:

  • Agencywide technical security assessment.
  • ...Read more

Domain Naming Services (DNS)

WaTech Domain Naming Service (DNS) is available to all agencies connected to the State Government Network (SGN) or the IntraGovernmental Network (IGN) for the .wa.gov and wa.us domains.Read more

Fortress Anonymous

Fortress Anonymous provides a secure, encrypted connection to information hosted on state websites. Agencies retain self-administration rights to their applications and maintain control.

Fortress Anonymous protects the source identity for many public services, including the Unemployment Claims Application, the Division of Child Support New Hire Reporting program, and the Vehicle Tab renewal service.Read more

Managed File Transfer

Managed File Transfer is a multi-protocol (Hypertext Transfer Protocol Secure [HTTPS], Secure File Transfer Protocol/Secure Shell [SFTP/SSH] and File Transfer Protocol [FTPS]) secure file transport to perform manual single file or automated high-volume file transfers with business partners located in the United States or Canada.Read more

Managed Firewall

Managed Firewalls protect your network from unauthorized access and malicious attacks. Firewalls are the critical gateway into a network, and firewalls managed by WaTech come with the highest degree of attention and expertise to protect critical agency assets and provide peace of mind.

Managed Firewall services are available in two categories:

  • WaTech-managed firewalls are a fully managed firewall solution, including policy and configuration. The service is

  • ...Read more

Secure Certificates

The Internal Certificate Authority (ICA) provides digital certificates for use inside the State Government Network to address the need to protect data in transit. The ICA provides a Certificate Revocation List (CRL) that allows systems to validate that a certificate has not been revoked.

Certificates issued to state agencies are used for encryption, authentication and identification of servers and/or client via SSL and TLS. Some agencies use the ICA to provide protection of sensitive...Read more

Secure Web Proxy (formerly Enterprise Forward Proxy)

The Secure Web Proxy service provides content analysis and filtering. The service is available to agencies connected to the State Government Network. The service supports delegated partitions and administration that allows customers to control agency-level configurations.Read more

SecureAccess Washington

SecureAccess Washington provides self-administered single sign-on access to multiple agency applications, shields online services from harmful activity, and allows access only to known users.

To use a service or application protected by SecureAccess Washington, you must provide a user ID and password – its authentication mechanism. The agency owner of the service is responsible for allowing or denying access and for verifying individuals' identities.

Some...Read more

Security Design Review

The state Office of Cyber Security (OCS) Security Design Review process provides agencies with a security assessment of their new or updated systems, and works with agencies to ensure security controls and processes are in compliance with the state’s IT security standards. This supports agency business objectives by helping ensure services are securely configured prior to being deployed.

Security Design Reviews are required when an agency project or initiative requires OCIO oversight...Read more

Strong Authentication

WaTech Strong Authentication service provides a way to positively identify users with a two-part authentication process. The authentication process uses one item that users know – a PIN – and one item that users have – a token to provide a one-time password. This provides a much stronger and more reliable level of authentication than a password.

This service can be used to positively identify users who access a variety of agency applications or resources, such as:

Virtual Private Network (VPN)

Secure Sockets Layer Virtual Private Network (SSL VPN) provides mobile users with secure internet access to agency networks from any location.

The SSL VPN service can be customized to meet your agency’s needs with several options for multi-factor authentication.Read more

Vulnerability Assessment

Vulnerability Management is a key competency in securing a business computing environment. The Term “Vulnerability” in this context is defined as a weakness in a technology component that allows an attacker to compromise the integrity, availability, or confidentiality of an asset. WaTech operates a hardware and software vulnerability scanning platform service which enables agency security teams to identify where vulnerabilities reside across their environment of network components, servers,...Read more

Web Services Gateway

The Web Services Gateway (WSG) enables agencies to make their State Government Network (SGN)/Intergovernmental Network (IGN) web services available to the Internet in a secure and reliable manner.Read more