OMNIA Partners and Iron Bow Technologies
Cyber Security Solutions and Associated Products and Services
Iron Bow is a comprehensive solutions provider with experienced, OEM-certified engineers that support the full product lifecycle, from analysis and design through implementation and operational support. Our team is experienced in design, integration, deployment and sustainment of complex multi-technology solutions to include cloud, collaboration, mobile/remote workforce, networking, Unified Communications, Audio/Visual (AV), Voice over Internet Protocol (VoIP), Data Center, Video Teleconference (VTC), Wireless and Security solutions.
Cyber Security Solutions and Associated Products and Services
Contract Number: R200802
Expiration Date: September 30, 2023. Option to renew for two (2) additional one-year periods through September 30, 2025
Iron Bow is an authorized reseller for over 200 major OEMs including:
Through these relationships, we have access to a wide variety of tools that can meet your unique security needs.
Our U.S. based Client Service Center (CSC), can provide a variety of support options for your deployed solutions including as-a-service, cloud, hosted or managed services offerings.
Minimize Risk, Maximize Technology Investments
We design solutions to achieve resiliency. Our comprehensive approach to cyber security looks at the whole of your system and takes into account how your users access and use data. We understand and support the full IT lifecycle, ensuring a holistic approach to security. Solutions can be installed and run on premise, via the cloud or in a hybrid model.
Network and Endpoint Defense – protect data by separating trusted and untrusted networks and strengthening external borders against unauthorized access and attack.
Threat Visibility – provide visibility into traffic traversing the network to obtain a baseline of normal traffic flows and, from that baseline, be able to detect misconfigured devices and malicious attacks.
Remediation and Response – prevent the possibility of malicious attacks entering the network. It is critical to have the security tools in place before attacks happen to speed response time.
Data Protection – protect your most valuable asset – data – with visibility into who is accessing it, how and when.
Policy Enforcement – develop, automate and enforce authentication and authorization policies to control system and application access.
Commercial Solutions for Classified (CSfC) – enables commercial products to be leveraged in solutions to protect sensitive information, supporting specific U.S. government security requirements.
Unified Communications Manager Cloud (UCM) – provide cloud-based unified communication and collaboration applications, powered by Cisco, within a highly secure, virtualized platform under a centralized management system.
About OMNIA Partners
OMNIA Partners, Public Sector, is the nation’s largest and most experienced cooperative purchasing organization dedicated to public sector procurement. Its immense purchasing power and world-class suppliers have produced a comprehensive portfolio of cooperative contracts and partnerships, making OMNIA Partners the most valued and trusted resource for organizations nationwide.
Through the economies of scale created by OMNIA Partners, participants now have access to an extensive portfolio of competitively solicited and publicly awarded agreements. The lead agency contracting process continues to be the foundation on which the organization is founded. OMNIA Partners is proud to offer more value and resources to state and local government, higher education, K–12 education and nonprofits.
For more information, visit https://www.omniapartners.com/publicsector.
Iron Bow in Action
Outfitting the Hospital of the Future
Iron Bow was contracted by a state-run hospital to procure, design, and install an Audio Visual system to better communicate with patients at a diagnostic treatment center. The system included video walls in the main lobby and atrium as well as the equipment rack to support the displays. The primary display is a 4×4 video wall comprised of 55” NEC displays, which will produce a 220-inch diagonal image. The video wall can be used in several different configurations that can be preset to meet the most popular applications. Iron Bow also provided two desktop monitors that can receive preview feeds of the PC or telehealth sources. The team was responsible for testing the system and providing training to end users.
Meeting Remote Work Needs
One of the largest counties in the U.S. need to quickly adapt to the majority of staff working from home due to the COVID-19 pandemic. Many employees were working off of desktop computers in the office. Iron Bow helped procure, distribute and later support 1,000+ laptops. Once employees were up and running, Iron Bow provided remote support eliminating the need for them to travel into offices for routine maintenance and support.
Better Budget and Security Planning with Threat Visibility
An Iron Bow client began using a threat visibility tool and immediately saw probes from foreign countries and traffic from their network going to foreign countries. This visibility provided two critical functions. First, it was a graphical method of easily seeing when a breach has occurred. Second, it provided clear justification for the security budget. In this case, the attacks were unsuccessful, but the client learned they were being attacked on a regular basis from places they never imagined.
Identifying Weaknesses Before They Become an Issue
For one client we discovered, through a combination of raw data and user interviews, a client was open to malicious actors via several well-known and well-used workarounds employees were using. The weakness had not yet been targeted, but posed a huge risk. Iron Bow provided a detailed network vulnerability assessment and was able to lay out a prioritized plan for increasing the client’s security posture that dramatically shrunk the potential attack vectors, increased visibility and stayed within budget.
Remediation and Response Tools Enable Quick Response
An organization could see that files on local computers and on file shares were being encrypted, but could not make sense of why those files were being targeted. Based on the traffic the attackers were using an account that had full read write access as well as laptop and active directory rights. The organization was able to cut off a branch organization that looked to be the source and at the same time limit write access for all users to stop the flow until the root cause was identified. Next Gen IPS was used to show where traffic was exfiltrated and look for matching signatures. Netflow-based tools provided visibility into all flows traversing the network and quickly identified the malicious flows. Anti-malware agents identified any files that were known malicious and quarantined them helping identify possible source computers. Once the initial computer and attack was identified, they implemented remediation for all machines that addressed the current attack as well as all machines to prevent and future attacks.
Manage Multi-Cloud Without Multi-Headaches
Iron Bow’s IronTarget™ is purpose built to help organizations move to the cloud at their own pace and manage the variety of cloud solutions in use, integrating public and private cloud management into a single pane of glass while providing the right level of resources for each cloud application. IronTarget enables the migration of legacy workloads to more efficient platforms, meeting user needs and achieving cost and performance optimization.
Providing Seamless Collaboration Across the Enterprise
Iron Bow deployed the Unified Communications for Cloud (UCM) to over 10,000 users at a federal agency with demanding security and user identification requirements. The client had a federated IT architecture where four separate, independent domains needed to access the cloud application and communicate across the enterprise. Iron Bow helped the client to evaluate, test and select the domain management vendor best suited to their needs.
In-depth knowledge on the latest attack methods and how to defend against them.
Customized approach to cyber security to meet domain and environment-specific needs.
Laser-focused on developing solutions that reduce risk and enable mission and business success.