- Trinsio
- Shane Ralls - Solutions Manager
This email address is being protected from spambots. You need JavaScript enabled to view it. - 385-283-1804 - Tim Tucker - Solutions Engineer
This email address is being protected from spambots. You need JavaScript enabled to view it. - 385-283-1803 - Network Threat Assessment identifies, counts, and qualifies unwanted incoming and outgoing IP traffic without needing direct access to your network or assets. It uses data from over 50 curated bad actor lists maintained by the cyber intelligence community. To perform the assessment, Trinsio requires firewall traffic logs covering at least 24 hours, containing source IP, destination IP, and whether the firewall allowed or blocked the traffic. No direct firewall access is required.
- Trinio, a cybersecurity solutions company, presented their services.
- Their assessment analyzes inbound and outbound IPs through syslogs to identify malicious activity.
- The assessment is free and comes with no obligations.
- They only work with municipalities and school districts nationwide.
- The assessment does not require any downloads on endpoints or network access.
- They analyze the data against a vast threat intelligence database, "Threader," which compiles information from over 50 vendors.
- The assessment focuses on identifying malicious IPs with a 90% or higher threat confidence score.
- Results are typically available within 3-5 business days after data submission.
- The assessment includes:
- Quantifying malicious traffic percentage.
- Identifying geographical origins of connections.
- Categorizing threats based on behavior.
- Providing specific examples of concerning IPs, including details like country of origin, threat category, number of connections, and time frame.
- Based on the assessment, Trinio provides no-cost or low-cost recommendations, like:
- Enabling or reviewing geo-blocking configurations.
- Upgrading firewall firmware.
- Reviewing firewall access policies.
- Blocking specific high-risk IPs.
- They offer a 30-day, no-cost proof of concept for a more in-depth analysis of malicious connections.
- Trinio also offers a threat intelligence gateway appliance as a paid solution.
- The appliance sits at the network edge, actively blocking malicious traffic in real-time.
- It uses the same intelligence platform as the assessment.
- Users can customize threat risk thresholds and manage allow/block lists.
- The appliance is available through annual or month-to-month licensing based on bandwidth utilization.
- A 30-day free trial is available for the appliance.
- Shane Ralls - Solutions Manager
-
Individual Updates from Attendees
- Daniel replaced all school switches with Meraki switches.
- Sarah is working on implementing a new bus camera software called "Armor."
- Mr. Shelling experienced issues with Infinite Campus, which he suspects might be regionally related to ISPs.
- Mr. Shelling is exploring Raspberry Pi for digital signage using Yodek and Pi Signage as potential solutions.
- He is also considering building a NAS box for offsite backups.
- Mr. Shelling encountered challenges with pursuing further education due to requirements for outdated transcripts and a preference for full-time students.
- Mr. Foley is dealing with malfunctioning bus cameras from Rosco.
- He also shared about an Apple TV OS update causing AirPlay issues in their Apple school environment
Welcome everybody to the September 26th edition of Technology. Check in thanks. Everyone for showing up today. You know I should have asked this offline, and think it's it trends. I/O. Yep. Is company name so. got contacted by them earlier week, they wanted set a meeting, like always, turn around say, well, why meet with just one us, instead presenting whole group here Invited all here, With that I'm going go ahead over Shane, I'll let you take everything over. All right. Well, thank you, Scott. My is Shane. joined Tim. We are from Trinio. gonna kind what we're present talk about today pretty informal. But we wanna do describe who are, doing. Why, our assessment unique. Probably different than performed past, which know. If isn't case, welcome challenge there. yet be challenged on uniqueness assessment. And then little bit what's us? Right? Nothing's free except It is. no strings attached. assure that. Alright. Tim share slide show you. He's exactly looks like. into more granular detail. know, how grab information? So let's 1st all. Let's Trinio Cyber security Solutions company. based out beautiful Salt Lake City, Utah, design implement support. solutions, only work municipalities school districts. We're doing nationwide. Iowa has been awesome so far terms they've been. O excuse me opening their arms happy here. So. Why Specifically is, don't ask download anything your endpoints. It's not where past probably done some sort vulnerability, scan down something spits report, dozen pages, telling endpoints date. Not need access network any way. analyze, inbound, outbound Ips through syslocks. information. Usually 24 72 h. information, analyze vast Thread intelligence. partner called Threader. That's theater an R. compiled list vendors, would argue, there nothing larger thread intelligence 50 really big names Microsoft Google Department Defense web root, few. able see malicious either knocking door or leaving network. Today 2 flavors use. To run block lists, 100% certainty those malicious. They business thread. Intelligence community mentioned vendors. I've determined, rating system way 100. Our 90% above malicious, again, belong. Knocking gist it. after team gets back us. results want steal Tim's thunder because he's specific examples Security Solution Company, Ran, give cost low recommendations. understand you're, organization. budget. Isn't, unlimited, we'd love be. cyber still scary educate. educate, more. up, everyone things changed. can't used Unfortunately, threat landscape evolved threat. Actors smarter, they're sophisticated. unfortunately, tools layers protecting organizations evolve without further ado, time, laboring. He'll his screen. much ahead, Perfect thanks, Great intro, great coverage entails. excited this. One hit on. Right gate was being request every organization falls under stewardship Cisa. They. performance goals. This specifically calls for. Regular testing effective. Your controls The idea What worked last year year. That constantly changes. attacks getting so, as part that, recommending regular cadence assessments. assessment, feel addresses head requesting do. Shane process, very simple. use Syslog traffic logs. inbound transaction logs firewall. source destination connections allowed through. comparing large library analysis get results. Again, big, platform rather recreate wheel does aggregate those, harmonize together cohesive list, actors there, but also threat, confidence, score, saying, certain actor category tags, meaning, type activity IP associated with. scanner? spam? Or problematic? Things command control endpoints? Those absolutely behaviors concerned about, especially identify both perhaps leg that's we. Used regards reporting confidence score meets exceeds 90. lot lists can anywhere 99. focusing exclusively greater. ones actually known actors. when comes front most concerning Yeah, address these right happening lower percentage conference ips focus saying. They're deal In meaningful way, right? Help mitigate risk giving hypotheticals could be? may if tomorrow, happen. network? What's happening? Are concerning. good sense, at a. A standpoint. We've we've seen quite few spectrum might imagine from. Point 0 3 identified upwards 87 traffic, gives temperature check you're we'll insight see. means. level methodology. you'll assessed level. For What? When level, 10 mentality approaching time jump try tolerance acceptable across multiple verticals education. Industry. safe bet. assessed, context behind slap Hey, high risk. better something. We'll seeing suspect again earlier. cost. Low recommendations, easy gate. from? latest version firewalls, operating system, firmware. currently Geo. Blocking? stringent that? Blocking 4 countries, it? 12 countries. look recommend policy review policies Different things. access. measure. looking at. Because attack Starts access, whether network, user phishing exercise. Whether cloud platform. student information Everything starts help measure determine connection. hugely valuable. wrap today, communicate upstream leadership Education Board quantifying numerically Easy bad, reduce if. 20% happen usually pass upstream. support efforts steward your. Organizations. here's sample. Yes, sir. Tim, Can question Absolutely. understanding Xyz Firewall my location. You're configure point equipment. assuming. particular yeah, multiple. There ways accomplish yet. common Alright! reporting, report goes firewall makes inside. black traffic. blacklist, won't case? Alright? Nope, already addressed edge blocks it, Scott via Black, blacklist. You've added list. Geo blocking enabled from, incorporate addressed. parse out. ensure careful roll each ensuring asking questions. Do active, Geo, many countries allowing right, whichever shorter data Sylk coming accurate. traffic? rules captured Agrara logging, make sure action logging verify Yep, There, occasional there's metric field identifies block. Requires white glove approach, addresses. sample once capture data. team. Typically, between 5 days submitted back. turnaround we, engage week. page left page. quantify. on? found. light gray boxes totals overall connection, count. did interact timeframe? h smaller red bubbles below. identified? were Malicious? will normalize districts typically week weekend day. guys full load evening times weekends lighter. day, helps number real. Good, real world average. normalized average daily, monthly counts and. Create attention okay with, million annual basis So, break out, versus separately numbers critical, device, basic antivirus, full. Edr, Mdr solution local tell us side. piece. circumvented layers. reaching Connections Ips. Any trends find. example There's greater side piece significantly lower. this, hour. job reducing Malicious Then details, quantify Give of. Okay, numbers? Look like? supports next start geography Blocking. blocking. exposure, purely country origin. This, validate geoblocking working effectively. had Come Where expectations pull 30, 40, sometimes, case 100 requires review, temporarily disabled printer wasn't needed update its firmware, blocked geography. forgot misconfigured never fully enforce, even rare occasion issue plug software, patches ran, resolved Blocking, effectively, catch, misconfigurations save other scenarios affect ability effectively bottom section. tags. behavior categories. 18 total. tied identified. control. draw problematic. occasions flag An urgent phone quickly remedy compromise. urgent. reach are. Inherently sensitive sooner act protected be, quicker prevent occurring having incident occur. less outbound. supporting examples. given story many? Now dive specifics. actual origin, Asm owns space. categories, obviously. like, across? It's, day period 340 hour half timeframe. again. connection? How host machines connected IP. lists? Threat feeds. verified across. box Homeland Msi stack. premium proof, talos. details. nation, state actor. large. Large scale log 4. J. recommendations? confident devices interacted May compromised. recommended. come Recommending aware provide specifics time. Obviously, cost, Perhaps not, enable finding 114 immediately exposure recommending, hey? firewalls running old version. OS. upgrade soon can. features available that'll patch holes. recommendations solutions. head-on. leave defer to. interested? Have we? peaked interest? Does mirror conversation? doors down. connection If. interested pieces great, I'd offer 30 proof concept deep origin informational pricing Demo. solutions initial. Conversation geared options sense. Here's limit exposure. Block Iran. Nation State connecting, connections. Decide reimage those. others top tells end commitment perspective. find maximum separate calls, initial introduction, process second call setting firewall, send instructions, familiar enough to, etc. you'd hands-on screen share, walk process. almost Make model assessments helped remote. assistance. 3rd call, own reduces timeframe perspective ready quick Timeframe huge. facilitate assist thing privacy. while sharing overly sensitive, same destination, IP, etc, visit website. says, visiting website, accept cook, deposit cookies, hit. Accept. difference sorts matter of, using strictly purpose selling data, storing anyone. retain ownership times. applies well Tie anyone else. confidentiality critical discretion whom will. intention service. hope conversation. away things, one, clear metrics mean, internally, champions orientation campus. As okay, short security. positive direction didn't win do, opportunities arise help. Partner obviously they, need. create relationship presentation Happy answer questions course, maybe now, later. contact distribute presentation. copy. beneficial. Scott, Thank letting Okay. guess now ultimately lead? mean. mean? goal sell continuation Would keep on, product question. drives aggregation sources, harmonization Also tries provided. appliance sits placed places outside ISP router switch fiber Ethernet Sfp plus category. Propose chat gateway. in. seeking fits beauty updating libraries. harmonizing together, determine. pulls together. them? Some add custom lists. score. risk? Tolerance level? allow 50% gross On 70% adjust customize thresholds. 18. Of blocks. also, integrated providers Zoom Microsoft, Aws, space within platform, new spaces, add, board. they. Remove sunset removed date threatless actively lifts burden. alert. creating events prefer respond occasionally, obviously, unexpected risk, too false positives. section manage eliminate noise. allows layer become surgical purely. Think no-fly Dsa. radar, adding latency libraries updated background. worry pretty, seamless solves problems, wise. talked districts, in, bigger metro, smallest rural areas budget standpoint affordable solution. broad provide. sense live Apollo? 13 world, you've little. Get bang buck, decisions gotta discretionary. value Alright, product. off Bandwidth count, what. Bandwidth, transparency. Here queued up. just. clients licenses bursts 95th percentile. Very aggressive. then, month month, budgets, whoops. Sorry. go! fiscal definitely option. clients. Typically middle fiscal, hits. plan, stay month. It. understand. constraints? Rarely see, 501 gig, detail, trial days. appliance, doesn't anything. agreement hard believe. hardware fancy decide Send appliance. gotcha contract. dial hundred Meg license. 300 license, gig? pricing. 95. gigabit Internet ISP. use, Yep utilization. Just perfect. Exactly. Alrighty! cause customers gig fall range. K. schools. benefit say pick 300, Meg. summer. 500, Meg, during summer, though part, or. summertime. depending, depending Set couple structures bandwidth, burst, license upgrade. contract Quarterly Reviewer Biannual Review, reviewing basis. flexibility. 9 months. months quieter. quarterly structure approval. Alrighty sounds good. Anyone else Monopolizing shane 3, weeks, State. cities district. involved references customers. assessments, shy shoot, offline put notes. people watching video? contact. Information? so? proceed Oh, sorry, ahead. Reach Gail, me. self link chat. link. detail what? offering. extra layer. talking about? emphasize. No go, absolutely, Take complementary trial, shot days, explore extend another plenty nice portfolio problem. at, preparing found package problem checks think. Perform party advised insist. clarify the. Initial Correct. absolutely! Sign says agree straightforward. confidentiality. Green. instructions rolling. kick off, lift typical, hours end. It's. a, half, h, investment Yeah. quick. honestly, alright, guys. follow additional documents, presentation, yep, notes well. Appreciate You, too. much. Alright normal have. Bye. necessarily List about. Actually, bring meeting stuff Registration. planning open. Haven't Phil Talking Go Daniel, slowing bit, did. Replace switches Moraki switches, that's. Got issues. sent replacement Swap Nothing exciting. Going am. though. interesting intriguing Looking decides willing experience was. I'd. Be hear Gonna say. goes. That'd awesome. Okay? Once pointing syslog. Can't complicated Right. alright. Anything else, Daniel. No, Trying get. Finalize quotes cameras. grant. Don't dragging feet but. Always something, thanks update. Sarah, you? exited minute transportation director ago bought software along cameras, means TB server. videos package. somehow vendor dropped midstream Personnel Turnover. anyway. server yesterday, called. don't. Who me, Matt? Was bus cameras? told Rei asset management observation. recording. armor. basically place he them. And. really, centralized place, camera said Dvr. video. viewing, offloading day? yes, I'm. Quite certain. Gotcha. Rei, too, order purchase? reached Reis. Web interface, ago. District. said. directors felt cracks. February, Dvrs cameras antennas. antenna tech getting, implemented put. Pressure him, Sure. why, hearing anything, Also, dealing anyway, safety grants, jurisdiction. coo heard Milestone, brand change. conversation morning couldn't arguing plugged fine, move Hippy Skippy tracking fortunate stopped. buying trying Didn't older ones? were, our. who's bid grants original high. outfit. them, prefer, alike other. Sci, stands for, nor has. one. bids lately, seem sei. alarm while, Omaha area central station was, good, previous directly department, which, opinion, always difficult. advice. Sarah. Mr. Shelling. Yes. issues infinite campus week? know? I. Shauna, person hired, she slowdown, no, reporting. problems Shoot, shoot. blame. Fortunate. ours net 40 gates. Z. Scott? encryption sure. Put spot, Here. grand poo! hear. z encryption. At Fortnat play since February. Since whole. Heck bunch research, kept sudden cleared reported thing. outage then. regionally isps. Possibly. happening. neither ask, Did face heavily lasted hours, trouble teachers flipping email. email meme broken fixed itself. heck's ordered raspberry pi. whip cream. playing micro Sd cards. yod, py signage. Google. Signed builder away. figure gonna. Based testing. Basically, cafeteria screenly, Screen, Nope. Writing pie pay pi 0, w. pi, Works nice, showed before. small box. 1 foot USB. Cable HDMI cable, hides Footprint, chromebooks before folded TV. TV mounts. Tvs have? many. many, digital. now. 5. menu, events, turns concession. Stand menu. 75 inch slideshow, play. Youtube stream. From gym. athletic events. wouldn't advertising. literally Loops advertising it's. apple Mac Mini running. Which overkill thinking replacing chromebook Athletic club buy Direct transfer Essentially pie. house starting Doing homemade naz Internally. Seeing personally, old. Server years room reason. Turn nasbox current server, outbuilding Off part. offside backup. Then. Essentially, site mean Prem, building physically attached ahead! much? server? the, windows, nails. Nas. home making. Optiplex 50, 60. nice. unread. experiment. equipment laying computer, tower itself Part computer lab, 7 office. blow haven't lost Yeah? outs, person. learned frustration classes, educated job. maybe, learn decided apply Went application processed. 42 old, college transcripts, fine. 20 went summer semester college, degree. adamant wanting 25 High School transcripts. Almost uncertain terms, program, full-time student. taking individual spots Students. Hmm. round basically, certificate. classes. degree unless pushing turned off. Northwest Community College, whatever Sheldon. Sheldon, Guys, honest God, want. certified. care securing realize public school. there? online courses said, prerequisite. prerequis. life Boot crazy. training accredited, Cause certificate knowledge go. profit education thought. Listen. colleges Whit such technical college. program Can. audit courses. students. annoying. demographic who, money, guess. terrible good! walked frustrated. Whatnot most. Frustrating done. long last, visited includes includes. Spending IC Beating Fortnet Fortigate, Otherwise hunky dory Concussion. Issues major Side no. Central Friday night, mess badly beat. Eagle Grove, aside wrong file, remembering hand signals files, microphone great. concussion. Storm Lake. stupid Speaking construction, apologies bringing Matt, Apparently build wing Supposedly. open year, after. More technology. exciting, exciting years. seriously. Actually point. beginning anybody saw Kca. U. Kt. stations, news rebroadcast Sioux Falls. Catholic taken technology computers entire admin k 8 Grease boards stuff. Wonder work. kids. kids Like, fact phones jail lying incentive where, Like class points. won quarter. phone. it! putting delivered classrooms Special needs kid walks delivers cases principal. Neat. picture hold 36 Case. Yay! Sorry co-opted enough. worries, updates. There. Foley, oh, footage. Sorted Yikes. On. fun camera, indication working. driver look! nothing. Re. Rosco. Huh! Tell functioning not. boat, advantage responsibility dance joy technology? Oh. Matt. remember Garrigan years, plugin. Ask mention everyone. Apple hooked projectors. wirelessly present. appliest OS came airplay disconnected Roll Can't. Apple. That'll wipe Back Macbooks. can, ipad Apple, TV, bummer. rest weekend, enjoy weather gorgeous By army Thanks.