Skip to main content
Home       Solutions       Calendar       Gallery       About       Contact

Text Size:


Enterprise Forward Proxy

The Enterprise Forward Proxy (EFP) Service is an outbound Internet traffic proxy which provides content analysis and filtering. The service is available to agencies connected to the State Government Network. This service provides high-availability in Olympia with future plans to support business continuity in Eastern Washington. The EFP supports delegated partitions and administration which provides agencies the ability to control their own agency level configurations.
Find out more...

Fortress Anonymous

Fortress Anonymous provides a secure access connection to public data when the integrity and availability of the data (along with the assets secured behind the gateway) must be protected from targeted attack. Fortress Anonymous also provides encryption of the data during transit, and allows agencies to retain self-administration rights to applications.
Find out more...

Internal Certification Authority

The Internal Certificate Authority (ICA) was created as part of the decision package for the Integration Competency Center and provides digital certificates for use inside the State Governmental Network to address the need to protect data in transit. The Enterprise Security Services group provides the ICA service.
Find out more...

Logging and Monitoring

The Logging & Monitoring service provides monitoring of all syslog’s generated by network infrastructure and security equipment to centralize the visibility and report/alert on abnormal traffic detection in near real time. By identifying and tracking system events, your agency will be better equipped to take preventative actions before an exploit occurs.
Find out more...

Managed Firewall

Managed Firewalls protect your network from unauthorized access and malicious attacks. Firewalls are the critical gateway into a network, and firewalls managed by CTS come with the highest degree of attention and expertise to protect critical agency assets and provide peace of mind.
Find out more...

Network Security Design Reviews

The CTS Design Review Process gives agencies the opportunity to review strategies for implementing new technology, or strategies for modifying existing services that interact with the following systems: the State Government Network (SGN), the InterGovernmental Network (IGN), statewide systems, and the state’s security infrastructure.
Find out more...

Secure File Transfer

Data can be transferred securely between any two online locations with Secure File Transfer (SFT). Encryption-based SFT is a turnkey solution that delivers security, reliability, and performance at competitive pricing.
Find out more...

SecureAccess Washington® Security Gateway

SecureAccess Washington® provides self-administered single sign-on access to multiple agency applications, shields online services from harmful activity, and allows access only to known users.
Find out more...

Security Assessment

The ability to know your organizational cybersecurity risk is critical for reducing your exposure. The OCS Computer Emergency Readiness Team (CERT) performs security assessments of your organizations assets to provide you with an understanding of your vulnerabilities, critical assets, and issues. The work performed is as an extension of your organization’s own resources to provide your management with reporting information for risk mitigation planning.
Find out more...

Security Infrastructure

The CTS Enterprise Security Infrastructure protects the Washington State computer network from cyber threats like hackers and viruses. All agencies on the State Government Network (SGN) and the Intergovernmental Network (IGN) can rely on a safe network environment. The Enterprise Security Infrastructure is a strong defense against malicious and increasingly sophisticated cyber threats.
Find out more...

Strong Authentication

The CTS Strong Authentication service provides a way to positively identify users with a two-part authentication process. The authentication process uses one item that users know – a PIN – and one item that users have – a token to provide a one-time password. This provides a much stronger and more reliable level of authentication than a password.
Find out more...

Vulnerability Assessment

Vulnerability Assessment is one of the most effective, pro-active processes your agency can use to protect network assets. By identifying and tracking system and application vulnerabilities, your agency will be able to take preventative actions before an exploit occurs.
Find out more...

Web Services Gateway

The Web Services Gateway (WSG) enables agencies to make their State Government Network (SGN)/Intergovernmental Network (IGN) web services available to the Internet in a secure and reliable manner. The WSG supports a variety of WS standards, including but not limited to: WS-Addressing, WS-ReliableMessaging, WS-Policy, WS-Security, and WS-SecureConversation.
Find out more...