top of page
black_dir-png-768x384.png

Texas Department of Information Resources

Contract DIR-CPO-4860

Cybersecurity Software Products and Services

Birch Cline provides cybersecurity solutions and services to local governments, state agencies, educational institutions, and public entities at discounted prices through DIR's Information and Communications Technology Cooperative Contract program

Quotes and Orders:

Customers must reference DIR contract number DIR-CPO-4860 when placing purchase orders.

To request a quote or place an order please contact:  Randy Guin | dir@birchcline.com | 972-571-4538

Cybersecurity Solutions

3.png
nomic.png

Cybersecurity Services

Vulnerability Assessments:

  • External Vulnerability Assessment:  Vulnerability Scanning & Assessment Services 

  • Internal Vulnerability Assessment:   Vulnerability Scanning & Assessment Services

  • Website Security Assessment:  Website Security Assessment Services

Compliance Assessments:

  • Risk/Compliance Assessment:   Security risk and/or Compliance (HIPAA, PCI, CJIS)

  • COSN Certification Assessment:   Certification Gap Analysis & Assessment 

Penetration Testing:

  • External Penetration Testing:  Network Penetration Testing Services 

  • Internal / External Penetration Testing:  Network Penetration Testing Services 

Social Engineering Assessments:

  • Social Engineering Assessment:  Managed Phishing / Smishing Services/Public Information Review 

  • Social Engineering Physical Assessment:  Physical Security Access Testing 

Management & Monitoring:

  • Vendor Management & Review:  Vendor Security, Compliance Requirement Review and Monitoring 

  • Network Management/Monitoring:  Services Managed SIEM with 24x7x365 Monitoring 

  • NOMIC Networks:  24x7x365 Monitoring & Assistance

  • Unauthorized Access Monitoring:  Monitoring and Alerting

  • Dark/Deep Web Monitoring:  Service Domain Name and Priviledged User Credential Monitoring 

  • EndPoint Security Management:  EndPoint Security XDR/MDR with 24X7x365 monitoring 

  • Threat Events:  EndPoint Security XDR/MDR,IDS and Network 24X7x365 monitoring 

 

  • CISO Assist:  CISO Assistance, Advisory & Training 

  • Virtual CISO:  CISO Assistance, Advisory & Training

  • Cybersecurity Services:  Adhoc Cybersecurity Projects 

  • IT Security Policy Services:  Information Security Policy Review & Creation 

  • Office 365 Email Migration:  Email Conversion and Implementation Service

  • Office 365 Security Review:  Services Office 365 Configuration Security Review 

General Cybersecurity Services:

bottom of page