Unparalleled Commitment

Managing against security threats is our #1 priority.

Assess, Monitor, and Manage

NIC’s commitment to security is unparalleled. Led by Chief Security Officer Jayne Friedland Holland, NIC’s security program includes a comprehensive suite of information security solutions to support the digital government operations of every government partner. Our proven approach integrates security assessment, monitoring, and management to deliver best-in-class security solutions.


Our security solutions focus on the people, processes, and technology requirements to ensure a forwardleaning information security posture. We maintain a layered security approach with audits, testing, and governance controls.


LAYERED AND MODULAR APPROACH

NIC takes a layered and modular approach to information security.

Read More

SECURE APPLICATION DEVELOPMENT

A robust process exists to develop secure sites and services.

Read More

NETWORK INTEGRITY

A layered approach is used to achieve network integrity in an effort to keep malicious traffic from entering our network.

Read More
There are several security steps in place to protect online services.

Modular architecture allows NIC to replace, modify, and upgrade individual security components
at any given time.
Limit transmission of sensitive data.

When sensitive data must be collected, transmitted, and stored, it is encrypted.
Sensitive data is only retained for business purposes for the necessary length of time, and then purged.
Specific network security tactics include:

  • Firewalls
  • Access control lists (username and password authentication)
  • Intrusion prevention and detection systems
  • Web application firewalls
  • Encrypted communication channels
  • Antivirus software