ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.


ITS administers the Enterprise Security Program to provide coordinated oversight of the cyb​er security efforts across all state agencies, including cybersecurity systems, services, and development of policies, standards, and guidelines.

We offer

Core Security Services
ITS provides core security services in support of the State Data Centers and core network infrastructure which provides layered security and perimeter defense mechanisms. These core security services include:

  • Management of multiple firewalls
  • Management of multiple Intrusion Prevention Systems (IPS)
  • Security management for event correlation and notification
  • Authentication administration and support
  • Security assessment coordination for core devices in the state network
  • Cyber security exercise development, promotion, and coordination
  • Virus protection for email
  • SPAM filter for email

Security Services Offered To Customers
ITS also provides a variety of security services directly to customers. These customer specific services include:

  • Management of a secure file transfer application for the handling and distribution of sensitive information
  • Management of guest wireless network that offers Internet access to third parties that are not permitted access to state network resources
  • Management and support for SSL, cryptographic services, and digital signatures
  • Management and support for Virtual Private Network (VPN) connectivity for the implementation of IPSec VPNs and qualified SSL clients to secure connectivity of third parties to state resources as well as access to the state network by remote state employees
  • Cyber security leadership to provide security information, security awareness, policy development, and awareness training

Cy​ber Security Tip

Use Caution When Entering Website Addresses
Pay attention to the website addresses you click on, as well as those you enter yourself. Malicious website addresses often appear almost identical to legitimate sites, often using a slight variation in spelling or a different domain (e.g., .com instead of .net).

Use Caution with Web Addresses