Language Translation
  Close Menu

Security Operations Center

  • IOT
  • About
  • Current: Security Operations Center
lock screen
Who We Are:

A group of cybersecurity professionals tasked with protecting the Executive Branch agencies servers and workstations from threat actors with malicious intent.

What We Do:
  • ASM: Ticket and Request Management
  • Vulnerability Management: Agent- and engine-based scans of all assets managed by IOT, which produces a list of identified vulnerabilities on each endpoint.
  • Endpoint Protection: A comprehensive agent-based detection and protection of all IOT manage Windows and Linux based endpoints.
  • Endpoint Tracking: A agent-based tracking system that enables the freezing of assets when then are identified as lost or stolen.
  • Network Traffic Inspection: Layer 3 network traffic inspection of all ingress and egress traffic for IOT managed network infrastructure.
  • Internet Traffic Filtering: DNS based traffic inspection for all IOT managed endpoints.
  • Incident Detection & Response: Detection and response to any identified cyber security threat within and of the State’s 100+ Executive Branch agencies.
  • Software Review: Known vulnerability and general security inspection all software installed on IOT managed endpoints.
  • Centralized Enterprise Logging: Centralized logging all events required to facilitate successful threat hunting within the IOT managed network infrastructure.

IOT News

Click here to view more events

Top FAQs