NJSBA has partnered with Vanguard CyberPath to assist NJSBA members in acquiring and deploying high quality Network, Endpoint & Cloud Cybersecurity Solutions. Vanguard CyberPath is comprised of a team of experienced leaders in the IT, cybersecurity, insurance, and legal professions with over 75 years combined experience in the public and private sectors and the military. Vanguard has partnered with industry-leading firms whose solutions are not only independently robust, but strategically complementary. Together, these partners provide coverage across the full technology stack, from network and endpoint protection to cloud security and identity management.
NJSBA cybersecurity solutions address the five functions outlined in the NIST Cybersecurity Framework, enabling NJSBA entities to identify, protect, detect, identify and respond to an increasing number of cyber incidents and to a broader range of cyber threats that schools are facing today.
Identify Solutions that identify and inventory assets and vulnerabilities that reside on devices, applications, and networks. They will help you gain an institutional understanding of what systems need to be protected and help to identify your current attack surface.
Protect Prevent or limit the impact of cyber-attacks through access control, data security, patch management and maintenance, and protective methods. These solutions help you protect various asset classes like workstations, network devices, software applications, networks, data, and users.
Detect These solutions will allow you to detect cybersecurity events and anomalies that occur within devices, applications, and networks. They can assess the potential impact of an event by, discovering anomalous activity, continuously monitor information assets, hunt for intrusions, and provide security analytics.
Respond Take action and respond once a cybersecurity event is detected. These solutions assist by eradicating intrusion footholds and assessing the damage caused by an attack.
Recover These solutions help you return to normal operations after an undesirable cybersecurity event by restoring capabilities, services that were impaired and documenting lessons learned.
