Cybersecurity Services
From hospitals to government agencies, universities with massive computing power to non-profits with just a handful of desktop computers and a public website — anyone can be a target of cyber crime.
To combat the mounting threat of cyber attacks that all modern organizations face, Merit offers a suite of cybersecurity services focused on keeping your networks, your data, and even your reputation secure.
By leveraging Merit’s renowned Michigan Cyber Range, Members and non-Members alike can train and test staff for cybersecurity proficiencies using hands-on exercises in Alphaville. Utilizes the Secure Sandbox, take a cybersecurity certification course and much more.

Secure Sandbox
Teach, Test, & Train in an Isolated World.
Secure Sandbox provides you with a flexible, secure environment that can be used for cybersecurity education, training exercises, and software testing. Located in a virtual cloud, the Secure Sandbox simulates a real-world networked environment with virtual machines that act as web servers, mail servers, and other types of machines. You can add preconfigured virtual machines or build your own virtual machines. Access to the Sandbox is provided through a web browser or VMware’s View client from any location.

MEMBERS USING SANDBOX:
Ferris State University
University of Montana
Lawrence Technological University

FOR EDUCATION
Secure Sandbox is ideal for use by an instructor or school for cybersecurity training. It can come fully stocked with tools and targets, allowing for a full range of security exploration in a safe, secure environment. Access to the Sandbox is controlled completely by the instructor, who can create and administer course material.

FOR CYBERSECURITY
Your organization can run your own red team-blue team cybersecurity excercise by using the Alphaville cybersecurity training environment in the Secure Sandbox. Alphaville is a simulation environment that features computing resources that are typically found at a city hall, police station, power plant, library, and school.

FOR SOFTWARE TESTING
Since the Secure Sandbox is isolated and not connected to the Internet or other production networks, it is ideal for for testing against live security threats, such as malware, viruses, rootkits and more. It is perfect for testing software vulnerabilities and capabilities.


Check Out This Webinar to Learn More About the Merit Secure Sandbox

Alphaville Exercises
Practice Your Offense & Defense, Virtually
Alphaville, created by the Michigan Cyber Range, is a virtual training environment specifically designed to test cyber security skills. Alphaville consists of information systems and networks that are found in a typical information ecosystem. Each location has different operating systems, different security priorities, and different challenges for participants to encounter and overcome.
Alphaville is more than a collection of networks. It also presents the opportunity for participants to see how information systems in a community are truly interconnected. As participants navigate through the heterogeneous networks, they find that information discovered at one location can be used to gain access or elevate privileges at another site.

MEMBERS USING EXERCISES:
The State of Michigan
DTE
Consumers Power

RED vs. BLUE
Bring your IT staff to compete as the Blue Team and defend Alphaville from a Red Team of hackers intent on disrupting communications, stealing critical information or intellectual property, and causing mayhem for political reasons. These exercises create a demanding atmosphere that stresses team communication and documentation in addition to individual skills.

RED VS. RED
Under the pressure of a timed free-for-all, teams need to penetrate systems, plant their flag, secure the system, and move on. Teams can attack each other, replacing one flag with an opponent’s. The team with the most flags left planted when time is called wins the day.

CAPTURE THE FLAG
Alphaville is also an excellent venue for Capture the Flag exercises. Individual participants use penetration testing and forensic skills to gather clues and collect evidence. A self-paced exercise, the CTF is a means to assess individual skills across a broad range of systems and challenges.

Cybersecurity Certifications
Prepare for the Worst. Learn from the Best.
The Michigan Cyber Range provides students and IT professionals with a solid foundation in a number of cybersecurity disciplines. Through hands-on learning and challenging coursework, students gain technical knowledge and experience that prepares them through challenging hands-on exercises and labs. Each course prepares you for real-life situations and for the related certification test.
The curriculum for the courses is developed by the Cyber World Institute and by Mile2. Cyber World Institute is a division of The Learning Center (TLC), a 30 year IT and cybersecurity certification training company partnered with CompTIA, Microsoft, ISC2 (Cybersecurity) and others. Mile2 is a provider of vendor neutral professional certifications for the cyber security industry. The Federal Bureau of Investigations (FBI) has named Mile2 a preferred provider of cybersecurity certifications.

MEMBERS TAKING COURSES:
MI Educational Credit Union
Saginaw Valley State Univ.
The State of Michigan

Don’t see what you need on the calendar? Merit provides customized cybersecurity training. Contact learning@merit.edu to design the perfect learning solution for your organization.

Based on NICE Framework
The Michigan Cyber Range provides a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE). The NICE framework organizes the skills that America’s cybersecurity workforce requires to support the National Preparedness Goals of detecting, mitigating, and defeating malicious actors and cyber-based threats.

NIST and NICCS Mapped
National Institute of Standards and Technology (NIST) and the National Initiative for Cybersecurity Careers and Studies (NICCS) list Mile2 as an approved provider of certifications for cybersecurity professionals.

NSA/CNSS Accredited
National Security Agency (NSA) and the Committee on National Security Systems (CNSS) recognizes that Mile2’s certification courseware meets national training standards.

CISO Consulting Services
In Cyber Security, Risk Doesn’t Lead to Reward
Does your budget limit your ability to hire high-level cyber security personnel? Does your organization handle personal private information? Do you employ systems dedicated to enumerating and auditing your network devices? Are you subject to regulations that require testing of your network security?
Merit Chief Information Security Officer (CISO) Consulting Services will help you address these questions by assessing your attack surface, identifying weaknesses, developing security strategies that significantly minimize your chance of a data breach and providing guidance on regulatory compliance and reporting, all without the expense of hiring a full-time Security Officer.
Cyber Range Hub
Be the Cybersecurity Resource for Your Community
Your organization can become a Cyber Range Hub—a direct extension of the Michigan Cyber Range. A Cyber Range Hub is a facility that provides certification courses, cybersecurity training exercises and product/software testing. A Hub is a place where a community can learn about IT security, helping individuals prepare for a career in cybersecurity and providing economic development.
The Michigan Cyber Range is recognized in Michigan and beyond as a leader in cybersecurity training. Your Cyber Range Hub can be a regional asset and a respected provider of cybersecurity education.

MEMBERS WITH HUBS:
Pinckney High School
Velocity Center
Wayne State University

CERTIFICATION COURSES
A Cyber Range Hub is a place where IT professionals and students can obtain cybersecurity certifications to further their careers. There are over 20 different certifications available through the Michigan Cyber Range‘s curriculum providers.
SKILL DEVELOPMENT
IT professionals acquire valuable cybersecurity knowledge and hands-on experience at a Cyber Range Hub.
TRAINING EXERCISES
IT professionals can test their skills and expertise during cybersecurity exercises within the Michigan Cyber Range’s Alphaville training environment.
CYBER RANGE PREMIUM CONNECTION
A Cyber Range Hub has a secure, dedicated connection to the Michigan Cyber Range’s infrastructure and Alphaville environment.

SOFTWARE TESTING
A Cyber Range Hub is a place where businesses can conduct security reviews and validation checks on software and cybersecurity products.

SECURE SANDBOX
Organizations can lease virtual space within a secure sandbox that’s stocked with hardware and software.

COMMUNITY LEADER
The location will be a focal point in its community, enabling job and economic development.

GROWING DEMAND
Cybersecurity personnel are in high demand, and a Cyber Range Hub can help to educate IT professionals interested in pursuing a cybersecurity career.

Download the Cyber Range Hub brochure:


Managed Firewall
Screen Your Traffic Without the Burden of Support
Developed by AT&T, Managed Firewall provides a robust layer of security to help proactively protect your location’s perimeter. Managed Firewall keeps unwanted traffic out of your network and your vital data safe.
As a managed service, all hardware and software components, their configuration, installation, management, maintenance, monitoring and support is handled by AT&T security professionals. And once your firewall is in place, AT&T provides 24x7x365 monitoring and alert response.

MEMBERS USING FIREWALL:
Detroit Public Schools
Detroit Public Library

Fully Managed End-to-End Solution
Reduce the complexity associated with managing your IP network firewall.

Customize Security Policies
Defined levels of security for users and applications.

Industry Leading Technology
Proven and reliable hardware and software.

Stateful inspection
DMZ and Extranet support on most models.

Multiple VPN Connectvity Options
Available including client-to-site and site-to-site.

Risk Monitoring
Signet Scope – Predicting & Measuring Risk
Developed by QuadMetrics, Signet Scope provides a detailed understanding of your cybersecurity risk posture, using information that reflects the risk surface that it is projecting to the global Internet. This includes metrics that not only capture an instantaneous snapshot of these elements but also their temporal trends.
At its core, Signet Scope relies on the QuadMetrics Global Reputation System Platform, which is the broadest and most comprehensive collection of enterprise reputational information. Signet Scope helps organizations quickly understand their security risk posture from a holistic perspective and prioritize its responses. This tool can tackle one of the most challenging problems in cybersecurity, the measurement of cyber risk and the development of metrics that are useful in managing risk.

MEMBERS USING QUADMETRICS:
Eastern Michigan University
Western Michigan University
Ottawa Area ISD

Locates Active Threats
Tracks the most security-critical features of your network to find vulnerabilities.

Measures Reputation
Provides convenient data-as-a-service access to raw reputational elements.

Global Routing Instability
Identifies weaknessess and vulnerabilities in you network.

Updates Continuously
All datasets are continuously updated on daily, weekly or monthly schedules.

Compares Your Score
Compares your data’s evolution over time with comparisons to industry averages.

Provides A Network Overview
Provides a series of metrics that summarize your network reputation. It uses millions of individual reports to build a comprehensive view, including historical malicious activities.

Receive Customized Alerts
Proactive in nature, Signet Scope provides customized alerts when events occur.


Check Out This Webinar to Learn More About the Signet Scope Risk Analysis platform
For even more specifics about Signet Scope:


Managed Security
Real-Time, Evolving Protection
Developed by Above Security, OneStone Information Assurance Portal is a mangaged security service that protects your organization from external and internal threats, known and unknown. It is easy to deploy and provides immediate benefits. Guard your orgaization against increasingly sophisticated cyber threats and stay compliant with rapidly changing industry and government regulations.
Utilizing Above Security’s advanced security information and event management technology, and backed by a team of highly-trained security professionals and analysts in our security operations center, OneStone focuses on threats and incidents based on accurate real-time information. You are alerted the moment a threat is detected.

Improve Efficiency
Increase performance by managing your security environment with real-time views.

Proactive Risk Management
Identify and remediate security vulnerabilities before they can impact your business. Know how secure your organization is minute to minute.

Cost Effective
At a fraction of the cost of in-house security, it’s an ideal solution for limited budgets.

More-Informed Decision Making
Executives, IT security managers, and security analysts will utilize the tools in this information assurance portal to make more effective risk-based business decisions.

Additional Information & White Papers
Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners.
As cyber security becomes a requirement for businesses of any size, implementing a solution can be cost prohibitive for most SMBs.
Enterprises are often required and/or motivated to comply with requirements specific to their verticals,business processes, and, if publically traded, rules and regulations set forth by the SEC.
Many organizations find that their security controls prevent them from getting something done or reduce their effectiveness. Conversely, an organization may question whether there is sufficient protection for information to be shared with a new business partner, customer, or the general public.
As the severity and sophistication of cyber attacks against Information and Communication Technology (ICT) infrastructure continues to impact business and government operations, new solutions are needed that will improve the ability to detect and respond.
By correlating large amounts of security data, ArkAngel filters through the noise produced by today’s security technology solutions to provide a coherent view of client network security and facilitate the incident management process.
Above Security can help you by tailoring a program to safeguard not only your information, but also your ability to successfully operate your business.

Above Security Product Webinars
Identify Security Risks Before They Become Threats
Lost & Found: The New Landscape of Data Breaches
How Security Incidents Differ from IT Incidents


Duo Security
Two-Factor Authentication
Duo Security’s authentication platform is the next generation of access security. It starts with a robust platform capable of providing secure access to any user, to any application, on any device over any network.

Duo integrates with VPNs, cloud apps, on-premise apps and more to allow you to quickly and easily set up your security solutions. With Duo’s APIs, you can also integrate security into your existing custom environments.


MEMBERS USING DUO:
Wayne State University
University of Michigan Medical Center

Duo integrates with VPNs, cloud apps, on-premise apps and more to allow you to quickly and easily set up your security solutions. With Duo’s APIs, you can also integrate security into your existing custom environments.

Benefits

 

Mobile-Based
By leveraging a device that your users already carry around – their smartphone – security is much more simple.

Support Every User
Users can authenticate even when they’re offline. Users can also have multiple devices, and choose their preferred method during login.

Streamline Your User Logins
With Duo Security’s trusted devices and networks feature, you can allow a user’s computer to be considered trusted after initially authenticating.

Protect Enterprise Web-Based Apps
Cut back on your access-related support costs and reduce administrative workload.

Map Out Authentication
See who and where your users are authenticating from in real-time.

Automatic Updates
Duo follows an agile development cycle, releasing updates in hours and days.

Smarter Design
Duo Push is out-of-band two-factor authentication, delivered over a different communication channel than the primary authentication.

 


Michigan ID
Single Sign On Across All Your Platforms
Michigan ID provides a framework based on federated identity that enables organizations to provide access to shared resources, applications and content. This framework utilizes Merit’s trusted and secure infrastructure. Michigan ID is a value-added service for Members with a dedicated connection to Merit’s network backbone.

MEMBERS USING MICHIGAN ID:
Central Michigan University
Cleary University
Macomb Community College

Single Sign On (SSO) for your organization
One password that grants you access to all your organization’s platforms.

Share Resources
Share access to mission critical resources and content across many organizations.

Reduce Costs
Cut back on your access-related support costs and reduce administrative workload.

Data Security
Using Merit’s trusted, secure infrastructure, your personal data is protected while eliminating redundant security principals for every organizational relationship.

How does it work?
  • Active Directory / LDAP Integration means control remains with Member organization.
  • Merit can provide Hosted Authentication, creating and hosting an Identity Provider on behalf of the Member for a small annual fee.
  • Merit facilitates the relationship between Service Providers and Identity Providers.
  • Uses SAML, an open standard for exchanging authentication and authorization data between security domains, or between an Identity Provider and a Security Provider.
  • Merit Professional Services are available for organizations needing assistance in bringing up an Identity Provider on their own.

SSL Licensing
Comodo Certificates – A Hallmark of Trust
Comodo Secure Socket Layer (SSL) Certificates are the quickest and most cost effective way for organizations to protect online transactions, and Merit Software Licensing Service can provide Comodo licenses to our Members at a reduced rate.
Comodo’s ’Point-to-verify’ technology verifies your organization’s credentials in real time, and 2048 bit signatures and up to 256 encryption provide the highest possible levels of security for your site visitors. With Comodo SSL your site will employ the highest security levels and take advantage of additional tools that win customer trust.

MEMBERS USING LICENSING:
Memorial Healthcare Center
Saginaw Valley State Univ.
Jackson College

Highest Possible Encryption Levels
Your site or server is secured with full 128/256 bit encryption, 2048 bit signatures, and verifies your business credentials in real time for every visitor.

Integrated Everywhere
Comodo’s root certificates are embedded in all major browsers and devices.

Industry Leading Expert Support
First class technical support for any issues or questions you may have during any part of the application, installation or life-cycle of your SSL Certificate.

Highest Possible Encryption Levels
Comodo SSL certificates are trusted by 99.9% of the Internet population.


Custom Solutions
Put Our Expertise to Work for Your Organization!
Merit staff has considerable expertise that is available to our Members on an individual consulting basis. Merit staff can provides help to Members for planning, designing, and implementing technology projects and systems. This can be especially helpful for Member organizations that lack in-house IT personnel.
Contact us at sales@merit.edu or call 734.527.5785 to discuss your project with a member of the Merit Sales Team.

Network Security
Merit can provide port scans amd system assesments to improve the security of your network.

Secure Network Engineering
We are experts in network engineering. Merit can help design, install and securely configure your local area or wide area networks.

Secure Traffic Optimization
Merit is available to assist you with networking questions, help you in understanding your traffic patterns, and securely optimize your network connections.

Virtualization
Merit offers virtualization service packages that include software implementation and hands-on training.