Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
At CENTURION, a Community Partner is defined as being a State, Local, Tribal or Territorial government organization.
Regardless of the size of the organization, quantified by the number of employees, you are eligible to become a Community Partner.
CENTURION contributes to the cybersecurity monitoring of 13 Community Partners across th
At CENTURION, a Community Partner is defined as being a State, Local, Tribal or Territorial government organization.
Regardless of the size of the organization, quantified by the number of employees, you are eligible to become a Community Partner.
CENTURION contributes to the cybersecurity monitoring of 13 Community Partners across the State of Colorado.
For the purposes of privacy and confidentiality as well complying with our Non-Disclosure Agreements (NDA’s) we are not able to disclose the actual identity of these Community Partners.
However, what we can share is that as at January 2024, our portfolio of Community Partners includes six School Districts, three Counties, two Cities and one First Response Service.
The service provided by CENTURION in the State of Colorado impacts the lives of some 440,000 residents.
No Direct Cost to Community Partners: Funded through educational grants and institutional support, CENTURION provides a high level of security at no cost to participating government organizations.
Additional Services over and above CENTURION monitoring are available as a Fee For Service at substantially discounted rates.
At CENTURION, our aim is ensure that the process of becoming a Community Partner is both user-friendly and streamlined as much as is possible.
If you would like to become a CENTURION Community Partner, the first step is to have an exploratory meeting with our experts so that we can better understand your environment.
Depending on the scale
At CENTURION, our aim is ensure that the process of becoming a Community Partner is both user-friendly and streamlined as much as is possible.
If you would like to become a CENTURION Community Partner, the first step is to have an exploratory meeting with our experts so that we can better understand your environment.
Depending on the scale of your infrastructure, we have two CENTURION hardware options available, one of which will need to be installed for the purposes of pushing data to our proprietary stack for analysis.
We have the ability to conduct two distinct types of analysis namely, NetFlow or Deep Packet Inspection (DPI).
NetFlow: is a network protocol that collects IP traffic information and monitors network traffic flow, providing high-level data such as source, destination, and volume of traffic.
Deep Packet Inspection (DPI): In contrast, DPI is a more thorough method that examines the data part of a packet as it passes an inspection point, enabling more granular network management and security by analyzing the content of traffic for harmful or non-compliant data.
As a Community Partner you choose the level of service you would like to receive.
If you would like to meet with the CENTURION leadership in order to become a Community Partner please apply below.
In addition to the CENTURION monitoring service, we are also able to offer additional services on a Fee For Service basis through our partner entity Stream. These services include:
Cloud-Native Solution: In addition to our hardware offering we are also able to offer a Cloud-Native solution. The fees associated for this service are dictate
In addition to the CENTURION monitoring service, we are also able to offer additional services on a Fee For Service basis through our partner entity Stream. These services include:
Cloud-Native Solution: In addition to our hardware offering we are also able to offer a Cloud-Native solution. The fees associated for this service are dictated by Flows Per Second (FPS).
Vulnerability Assessments: A systematic evaluation of security weaknesses in an information system, aimed at identifying, quantifying, and prioritizing vulnerabilities to help mitigate potential threats.
Phishing Campaigns: A controlled and informative exercise designed to simulate phishing attacks, teaching staff to recognize, avoid, and report potential security threats effectively.
Penetration Testing: A simulated cyber attack with highly defined Rules of Engagement (ROE) against your systems to check for exploitable vulnerabilities.
Threat Hunting: The proactive practice of searching through networks to detect and isolate advanced threats that evade existing security solutions.
Incident Response: A coordinated effort to address and manage the aftermath of a security breach or attack, aiming to limit damage, reduce recovery time and costs, and prevent future incidents.
Crisis Management: Access to experts during an Incident Response who guide the organization through the the survival process.
Security Awareness Training: An educational program aimed at equipping individuals with the knowledge and skills needed to recognize, prevent, and respond to potential cybersecurity threats.
Plans Evaluation: A third-party unbiased and objective evaluation of your proposed Incident Response and Crisis Management plans.
1250 7th Street, Denver, Colorado 80204, United States
Centurion Secured
1250 7th Street | Suite 118 | Denver, CO 80204
Copyright 2024-2025 Centurion Secured