ROK employs a security team of experts from all different organizations — the federal government, financial institutions, and health care to name a few. With this experience, ROK is able to provide valuable insights on GIS security from a broad background of security philosophies to best fit our client’s needs.
Cybersecurity is not a one-size-fits all solution for GIS data. Each environment has different requirements, workflows, and processes that require customized systems to best meet GIS security needs in a cost-effective manner.
Making a server and its data available to the public can be done accidentally with a few clicks when access control rules aren’t sufficient.
Cloud services are far more accessible than traditional servers, requiring a delicate balance of availability and maintaining a secure infrastructure.
Our cloud architects and security experts evaluate each client environment individually to provide a best-fit security solution for the client’s requirements. By default, ROK will architect an environment based on NIST 800-53 best practices.
This allows ROK to run each client environment in a silo giving your organization the control you need.
We reduce public exposure with a web-tier, application-tier, and data-tier approach, each configured with its own firewall. We implement multiple layers of security between your authoritative GIS data and the internet.
Modularity helps maintain agility and scalability as our clients' needs evolve. The connections between production, QA, and dev environments, brokered by the management section, allow for a cost-effective VDI solution without additional risk.
Thanks to the cloud, we can monitor system health, security, systems patches, Esri patches, application updates, and antivirus from a centralized location. This level of proactivity allows us to take care of potential issues before they hinder performance or uptime.
ROK takes geo-redundant system backups multiple times a day to ensure minimal downtime and lost work in the event of a disaster. ROK tests disaster recovery processes annually.
Overview When England-Thims & Miller’s (ETM) Geospatial Technologies team set out to expand their client-facing solution, DeepVUE Geospatial, they quickly realized their on-prem and Azure environments couldn’t keep up with demand. Frequent outages, limited IT bandwidth, and scalability challenges threatened growth. By partnering with ROK Technologies, ETM successfully migrated DeepVUE to Amazon Web Services (AWS) […]
Unlock the full potential of your ArcGIS Enterprise with our latest webinar, Advanced Techniques to Supercharge Your ArcGIS Enterprise Performance. Join ArcGIS Enterprise, Cloud, and technology experts Jason Harris and Miles Harris as they dive deep into proven strategies, troubleshooting tips, and best practices for optimizing speed, efficiency, and reliability in your GIS environment. Whether […]
When Kansas State University’s GIS Spatial Analysis Lab needed to overcome the limits of aging infrastructure, they envisioned a cloud-native platform that could scale with cutting-edge research. The result, Geocat, a powerful ArcGIS Enterprise environment built on AWS and supported by ROK Technologies. With Geocat, students and researchers can now run advanced 3D modeling, GeoAI, and […]
“ROK made a complex transition very easy and is always very responsive with any requests or issues. Bringing on ROK to manage and administer our GIS environment has allowed us to move other initiatives forward and provide better service to our clients and staff.”
Greg Newton • GISP
Gewalt Hamilton Associates, Inc.
ROK approaches this problem in a way that respects our client’s budget. These security certifications often require costly annual audits, documentation, etc. To help our clients avoid paying for this process twice (once for their environment that exists already, and once for the ROK environment), ROK provides services where we are able to be on-boarded as contractors within your existing certified environment. We provide the same level of service you would expect with a ROK-owned environment, except you only have to deal with a single auditing process.
The cloud is generally more secure than most private data centers since Amazon and Microsoft can hire talented engineers and automate many of their practices. Cloud infrastructure providers also offer tools and architectural options to isolate workloads, encrypt data and detect potential threats.
The process to secure a cloud environment is different from traditional data center practices, so cloud adoption requires a learning curve for IT teams. Unauthorized access to resources is the most common cloud security threat; many high-profile exposures of sensitive data resulted from misconfigurations.
1501 Belle Isle Av, Suite 110
Mt Pleasant, SC 29464
Email: info@ROKtech.net
Phone: 843.577.3192