single News Archives — Network Consulting Services, Inc. - NCSi

News & Tech Alerts

The latest news and information from NCSI


Position Summary: The Service Management Consultant implements all aspects of customer’s ITSM solutions per a statement of work. Perform other pre and post sales activities and assist in process design workshops. Consults with NCSi customers in order to help them deliver high quality of services and maintain system availability and adherence to best practices.


  • Post Sales implementation of Service Management solutions at customer sites based on previously agreed upon requirements and statements of work
  • Day to day administration of Service Management solution for Managed Service customers.
  • Support customers with problems that occur post implementation.
  • Maintain expertise in production releases NCSi’s portfolio of solutions
  • Maintain knowledge of best practices and latest developments related to tools and techniques for effective Service Management
  • May perform other job duties as directed by Employee’s Leaders

Required Skills and Experience:

  • Excellent interpersonal and communications skills
  • Excellent time management, decision making, prioritization, documentation and organization skills
  • Strong ITIL Knowledge
  • Knowledge and previous experience of SQL Server databases.
  • Advanced analytical skills
  • Analytical skills for problem identification

Preferred Qualifications:

  • Previous experience of LANDesk Service Desk, Ivanti Service Manager, Heat Service Manager or ServiceNow
  • Previous experience of a comparable Service Desk system
  • Knowledge and previous experience of Crystal Reports or SQL Reporting Services
  • Project Management experience
  • Business process experience

Travel: Generally around 25% travel with peak months at greater than 75% with a majority of it spent on customer sites.
Send resumes and inquiries to Brian Hoskins: – mobile 801-726-6002

Palo Alto Networks, Digital Defense, Aruba Networks, and Veeam form the final quartet of vendor solutions we examine in our coverage of our CIS Security Controls toolkit. Leveraged to reduce your organization’s risk of cyberattack by up to 94%, these four security partners check off seven of the 20 Center for Internet Security (CIS) Critical Security Controls.


Center for Internet Security (CIS) Critical Security Controls V6.1

  • #4 Continuous Vulnerability Assessment and Remediation – Digital Defense
  • #8 Malware Defenses – Palo Alto Networks
  • #9 Limitation and Control of Network Ports, Protocols, & Services – Palo Alto Networks
  • #10 Data Recovery Capability – Veeam
  • #12 Boundary Defense – Palo Alto Networks
  • #15 Wireless Access Control – Aruba Networks
  • #20 Penetration Tests and Red Team Exercises – Digital Defense


Digital Defense
“Shrink the attack surface™,” is Digital Defense’s trademark slogan, which accurately sums up their approach to cyber security. This ability to manage vulnerability is why NCSi chooses the Digital Defense security suite as a strategic tool for daily customer protection. The technologies used by Digital Defense enables us to scan, analyze, score, automate, test, and establish compliance in all areas of frontline security. We also work with Digital Defense to educate our clients about the dangers of risky digital behavior. This knowledge is crucial to deterring potential human-weakness based threats. We all know we make mistakes, often unknowingly. Education is one sure key to a secure network.


Palo Alto Networks
While a cyberattack may indeed come, Palo Alto Networks security suite prevents the attack from being successful. Cyberattacks are becoming more sophisticated, more automated, and cheaper to launch. Fundamental trust in the network is eroding, but you still need trust in your system to maintain your daily business. NCSi uses Palo Alto Networks’ next-generation security platform to reduce the success rate of an almost inevitable cyberattack to as close to zero as possible. A manageable cyberattack can have limited or no damages. And that is, after all, the end goal of a cyber security plan.


Veeam was named a 2017 Gartner Magic Quadrant Leader for Data Center Backup and Recovery. This is not the first time Veeam has been honored by the security industry, and this is not the first year NCSi has been a proud partner with Veeam. The solution most relevant to the current CIS Security Control mentioned here is their Disaster Recovery-as-a-Service (DRaaS).  Without disaster recovery, a successful attack — despite all your preparations — could mean the demise of your business. An efficient and affordable recovery plan, however, can get your operations back online in fewer than 15 minutes. Your customers won’t even know you’ve had a mishap. That’s quite a significant difference. It pays to be ready in case of disaster.


Aruba Networks
Aruba networks focuses on mobile first, and it’s not just about connectivity. Reliability, integration, sharing real-time contextual information about the network state with business applications and providing programmability of your infrastructure. Whew! Add to this the inclusion of the IoT, and you have a cutting-edge security solution for wired, wi-fi, wide area and cloud-based networks. The aruba network ecosystem provides a better user experience, too, with many developer options. [4] This is why NCSi chooses aruba networks for wireless access control.


This security quartet rounds out the toolkit that NCSi uses to fulfill the promise set out by the CIS Critical Security Controls. We have looked at all 20 of the controls. The first five offer the greatest bang for your buck. Implementing the first five reduces your risk of cyberattack by 85%. But the job isn’t complete with just the first five. By finishing what you started, and working with us to implement all 20 of the CIS security controls, you reduce your cyberattack by 94%. That’s a hefty increase in your comfort level, not to mention a significant increase in protection for your business investment. Add to this the extra miles that NCSi goes to address your particular organization’s specific needs, your exposure to attack begins to close in on zero. That’s our goal.


We hope that this series of articles has helped you see the need for a long-term security strategy. Committing your organization to implementing the international CIS Critical Security Controls is a wise plan. Our job is to help you do this in the most effective, efficient, and affordable way possible.


Contact us today for a free evaluation of your security posture.



For Release:  September 11, 2017

Bountiful, Utah— September 11, 2017 — Network Consulting Services, Inc. (NCSi) today announced Steven Taylor will be joining NCSi in a newly created position, as Service and Delivery Manager, reporting to Brian Hoskins, Director of Services.  Steven will have oversight of the strategic direction, expansion and operation of the ServiceNow line of business.


“I am thrilled that Steven is now part of the team,” said Brian Hoskins.  “He shares our values on innovation and the customer experience, and he will have a positive impact on our ServiceNow practice.”


Mr. Taylor joins Network Consulting Services, Inc. with more than 10 years of IT Service Management and Business Process Automation experience.  He has worked previously as a Solutions Architect for Cask, with a focus on designing and delivering Enterprise Service Management Solutions across all internal business units.  Prior to joining Cask, Steven was the Senior Manager of Platform Software Development responsible for managing the cloud solution teams at Academy Mortgage.  Steven has been working on ServiceNow since the Aspen release and has experience in nearly every module the platform has to offer.  He also helped found the Utah ServiceNow User Group (SNUG), where he served as Group Leader for five years. Steven is a pioneer in building applications for the enterprise, customizing projects for specific departmental needs including Facilities and Project Management.


Network Consulting Services, Inc. offers IT solutions to mid and large-size enterprises in both the public and private sector with offerings including; Security, Data Storage, Virtualization, Networking, Asset and Service Management.  NCSI, based in Salt Lake City, Utah, is a national partner of ServiceNow and other IT partners, with certified engineers and support professionals located throughout the country.


Connect with Network Consulting Services, Inc.
Twitter (@goNCSi)
NCSi Blog

For more information, please contact:

John Bartz, Marketing Director
Tel:  801-677-2496

Ivanti rocks. Enforcing the first five CIS Critical Security Controls in your organization’s network reduces the threat of cyberattack by 85%. And Ivanti is the only suite of tools that addresses all of the first five controls.  Plus, it adds control number 15 for good measure. You can’t be too careful or too secure. NCSi engineers know this. That’s why we choose Ivanti to be on point.

Ivanti’s Advantages
Let’s look at the CIS Critical Security Controls that Ivanti addresses.


Center for Internet Security (CIS) Critical Security Controls V6.1

#1 Inventory of Authorized & Unauthorized Devices
#2 Inventory of Authorized & Unauthorized Software
#3 Secure Configurations for Hardware & Software on Mobile Devices, Laptops, Workstations & Servers
#4 Continuous Vulnerability Assessment and Remediation
#5 Controlled Use of Administrative Privileges
#15 Wireless Access Control

Source: NCSi CIS Critical Security Controls Download


Know Your Network Environment
As we said, the first five controls are the biggest piece of the pie. They account for 85% of the threat reduction. Imagine your confidence level when your entire network is being inventoried, monitored, configured, assessed and controlled at all times. Threats of ransomware, viruses, and hostile acts from inside and out are detectable and preventable.

Several things matter in this process. The following points cover Controls #1, #2, and #15 and describe the features of Ivanti’s Network and Discovery solutions.


Automate the Process
Automation reduces errors, allows you to scale to network size, and saves enormous amounts of time. It also frees up personnel hours. And automation also enables the discovery of new network additions in real time, something a human monitor may miss.


Inventory All Software
Software listings include usage documentation. Usage is crucial for comprehensive security and financial reports, and whatever compliance records you must keep.


Inventory All Devices
Every device of any type which connects to the network, including remote locations connected by the internet, is automatically inventoried without the need for a virtual private network (VPN).


Visualize the Connections
See the links between the software, the devices, and the people who use them. Your organization’s assets can be added to the mix. You get a visual feel for the shape and extent of your network and its topography.


Catch Rogue Elements
If something is on the network, even for an instant, you’ll know it. Network endpoints are automatically designated on every subnet. A wireless access point that suddenly appears on your network is identified immediately.


Secure Your Devices
Ransomware is becoming one of the biggest cyber threat worries. If you are going to prevent attacks of any kind, including ransomware, you must ensure the security of your network, your devices, your software, and your assets.

Here are the aspects of Ivanti’s Security Defenses that apply to Security Control #3, #4 and #5.


Patch Management
Vulnerabilities exist in all operating systems and all pieces of software. That’s just a fact. Application updates — or “patches” — are regularly distributed by the software vendors to address these problems. Having an automated patch management system is as necessary as having an automated network monitoring system. You must patch your software as quickly as possible to avoid any dangerous exploits that may be making its rounds on the internet at the moment.


Application and File Management
Your business applications — and only your business applications — need to run from authorized devices by authorized people. Controlling the applications that run and the privileges of the users is mandatory. The files generated, and the drives they are stored on, such as hard disks and removable media, must also be secure. Encryption, deletion, all manner of file security under appropriate privileges is monitored.


Ransomware and Malware Remediation
Kill bad actions remotely and immediately. Keep them from spreading to the rest of the network and the organization.


NCSi engineers use Ivanti’s Security Suite as a key tool in analyzing and locking down your organization’s network against cyberattacks. Patching software and eliminating malware is another significant benefit from this toolkit. Implementing the first five CIS Security Controls (plus #15) takes an enormous step towards reducing your cyber threat risk. Have NCSi engineers work towards making your organization’s threat risk equal zero.


Contact Us
NCSi welcomes your comments, questions, and suggestions. Allow us to introduce ourselves when the time is right for you.

Imperva protects websites, applications, and databases wherever you deploy them.  NCSi engineers leverage the Imperva suite because it is an effective tool in securing your data from attack.  Here’s why Imperva is in our quiver of tools:


CIS Security Control Support
Imperva’s solutions address 11 of the 20 CIS controls according to our NCSi Security Controls attack plan. This plan is available for you to download. The specific controls Imperva addresses are:

Lady Cyber Hacker

Center for Internet Security (CIS) Critical Security Controls V6.1

#1 Inventory of Authorized and Unauthorized Devices
#2 Inventory of Authorized and Unauthorized Software
#3 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
#5 Controlled Use of Administrative Privileges
#6 Maintenance, Monitoring, and Analysis of Audit Logs
#9 Limitation and Control of Network Ports, Protocols, and Services
#12 Boundary Defense
#13 Data Protection
#14 Controlled Access Based on the Need to Know
#16 Account Monitoring and Control
#18 Application Software Security


How Imperva Works
Imperva organizes its security offerings into seven categories. Let’s look at each one.

DDoS Protection
Always-on DDoS protection enables automatic detection and mitigation of attacks, blocking low & slow and volumetric attacks against websites, applications, and infrastructure. This protection also improves your website performance through load balancing and the use of a global CDN (content delivery network.)


Application Security and Threat Intelligence
Applications are protected from hackers and previously unknown weaknesses through dynamic application behavior profiling and virtual application patching. Integrated Threat Intelligence stops logical and technical attacks. Flexibility in application management allows you to deploy Imperva application security in the cloud or on-site.


Database Security
Compliance audit processes are simplified and sensitive data discovered and protected. Structured and unstructured data throughout the entire organization can be located, classified, and analyzed. Sensitive data can be hidden or masked to guarantee data integrity and confidentiality whether in the cloud or on-site.


File Security
Real-time monitoring and blocking enables visibility and access control for data security in SharePoint systems and on file servers. Easily keep track of user activity and access rights to meet file compliance requirements. Keep sophisticated hackers at bay.


Cloud Security
Imperva extends your security to the cloud, protecting IaaS (Infrastructure as a Service) and SaaS (Software as a Service) services from cyber attacks. Hybrid deployment — both in the cloud and on-site — is also managed and protected. A cloud-access security broker discovers cloud-based applications, providing superior protection for both apps and database infrastructure on Azure (Microsoft) and AWS (Amazon).


Breach Preventions
Innovative cyber security software learns a user’s baseline data access behavior and then flags dangerous activity. Risky users are contained to prevent data breaches proactively. User data access is monitored both in the cloud and on-site.


Cyber Security Platform
A highly scalable platform improves operational efficiency and protects applications and data. The platform supports massive traffic loads and offers multi-gigabit throughput. Hot-swappable, redundant components maximize uptime. Scalable web, database, and file security management are unified in one common platform.



NCSi and Imperva – Fighting Cybercrime
Cybercrime feeds off of unsecured data. Keeping your data safe and secure is the business of NCSi and Imperva together. We’ve discussed the broad categories that Imperva uses to make its products’ value easy to understand. There are multiple products in each category, and each product overlaps into other categories. For example:

  • Incapsula and SecureSphere: DDoS Protection
  • Incapsula, SecureSphere, and ThreatRadar: Application Security, Threat Intelligence
  • SecureSphere and CounterBreach: Data Security, Breach Prevention



Contact Us To Get Started With Imperva
To make use of these great Imperva products does take some expertise. NCSi offers that expertise, and combines these tools with all the others in the NCSi engineers’ toolbox to bring your cyber attack threat as close to zero as possible. That’s our goal.  We welcome your comments, questions, and suggestions. Contact us for a complimentary data security evaluation.


Forcepoint-Tackles-CIS-Security-ControlsIn our continuing series on the 20 CIS Critical Security Controls, we turn to the tools that mitigate the daily attacks threatening your networks and data.


Be sure to download a copy of our NCSi Security Controls plan. You’ll find each of the 20 Security Controls, their definition, and our vendor partners we leverage to implement each control, ultimately reducing your risk of cyber attack by up to 94%.


Forcepoint Security
One of our strategic partners is Forcepoint, powered by Raytheon. Forcepoint’s suite of security solutions directly addresses nine of the 20 CIS Security Controls.


Center for Internet Security (CIS) Critical Security Controls V6.1
#6 — Maintenance, Monitoring, and Analysis of Audit Logs
#7 — Email and Web Browser Protections
#8 — Malware Defenses
#9 — Limitation and Control of Network Ports, Protocols, and Services
#11 — Secure Configurations for Firewalls, Routers, and Switches
#12 — Boundary Defense
#13 — Data Protection
#17 — Security Skills Assessment and Appropriate Training to Fill Gaps
#19 — Incident Response and Management


Forcepoint’s products are divided into four categories:

  • Network Security
  • Cloud Security
  • Cross Domain Security
  • Data and Insider Threat Security


[NOTE: In the text that follows, the numbers in parentheses () refer to the CIS Controls listed above.]

Network Security
Forcepoint NGFW — Next Generation Fire Wall — supports (8), (9), and (11) directly and others indirectly. The firewall is built to deliver high performance across physical, virtual, and cloud appliances, is massively scalable, highly available, and centrally manageable. Most importantly, Organizations that switched to Forcepoint reported 69% fewer breaches, and 89% fewer cyber attacks. [3]


Cloud Security
Forcepoint Email Security Cloud (7), (8), (13) eliminates spam and phishing. This solution stops ransomware in its tracks. Web Security Cloud controls advanced web vectors (7), (8), (9), (13) regardless of employees browsing behavior. The Cloud Access Security Broker — CASB — enables visibility and control over cloud applications (9), (19) whether authorized or not.


Cross Domain Security
Trusted Thin Client Access (12), High-Speed Guard (13), Trusted Gateway System (9), (11), (12), (13) all ensure high-speed data transfer through secure gateways. Trusted Mail System (7), (8), Trusted Print Delivery (9), (11), and WebShield (7), (8), (9), (11), allow secure traffic through less sensitive networks. SlimShield (17) protects training and testing environments with bi-directional fixed-format data filters and data disguise.


Data and Insider Threat Security
Forcepoint DLP protects intellectual property across endpoints, networks, and cloud services (9), (11), (13).  Forcepoint Insider Threat identifies internal threats to data, intellectual property, and critical systems through analytics, behavior profiling, and user action context (6), (13), (19).


Proven Experience in Securing Networks
Forcepoint has been in the network security business for over 30 years. We partner only with best-in-class industry leaders like Forcepoint to bring your cyber attack risk posture to as close to zero as possible.


NCSi Engineering Expertise
It’s not enough to simply buy expensive state-of-the-art tools, install them on your network and start clicking buttons. It requires experienced, highly skilled engineers to make the entire security toolbox work together seamlessly and efficiently.


And our engineers’ toolbox is impressive. We’ve focused on Forcepoint’s offerings today. In future articles, we will look at the CIS Control solutions from these vendor partners:


Get Help From NCSi
NCSi believes that reducing your cyber attack risk by up to 94% is an important business goal. The attacks are becoming greater day by day. Artificial intelligence is no longer limited to the lab. Zero-day exploits are becoming more common. It requires the efforts of a superstar team of engineers to keep up with the business of keeping your data and your networks safe from exploits and corruption.

We welcome your comments, questions, and suggestions. Contact us today