AlertUR
AlertUR is the University's emergency notification system. In the event of an emergency, alerts are sent to the University community by phone call, text message, or email. All students and employees are automatically enrolled with their University email address. You can opt to provide other contact information by logging in to the system with your NetID.
Antivirus Software
CrowdStrike Falcon is the University’s trusted source of endpoint protection (antivirus software) and is automatically installed on all University managed devices. This computer monitoring tool is designed to prevent, detect, and respond to attempts that could compromise computer systems by recognizing patterns in network connections that indicate malicious activity.
Device Encryption
Full disk encryption is available for computers that handle high-risk sensitive data. To protect the data from unauthorized access, all data on your computer’s internal hard drive is converted into unreadable code that cannot be deciphered easily.
Firewall
The University firewall maintains the security and proper functioning of the University network by filtering out unwanted traffic. Departmental firewall service includes design consultation, installation, upgrades, and 24/7 monitoring and support.
IT Equipment Recovery Program
You can securely recycle personal or University-owned consumer electronics free of charge. All devices are tracked by serial number and all hard drives and storage media are physically destroyed or securely wiped using industry-standard software with regular audits as required by R2 guidelines. Please keep all equipment secured until pickup.
Keeper
Keeper is a secure password management tool that employs end-to-end encryption to ensure your logins and files are always secure. Students are able to sign up for their free annual Keeper account (annual registration is required to maintain your free account).
Mobile Device Management
Mobile devices are a valuable tool in a wide variety of applications with convenient features typically found in a personal computer making them susceptible to theft, loss, and unauthorized use. To ensure your device is properly protected, please contact the University IT Help Desk to request MDM for Office 365 be activated on your account.
Remote Access (VPN)
A Virtual Private Network (VPN) is used to access restricted University resources from off campus through a secured Internet connection. Faculty, staff, and students with a current, active relationship with the University can use VPN. University resources that do not require VPN to access remotely include email, SharePoint, and most library resources.
SecureMail
Faculty and staff sending high risk information to external email addresses are required to use SecureMail. University IT recommends also using SecureMail to send high risk information to University email addresses.
Software and Patch Management
University IT can manage software delivery and updates on computers running Windows or Mac OS X. This includes operating system updates, security patches, and third party software such as web browsers, productivity and multimedia software, and frameworks.
Spam Management (Proofpoint)
The University uses Proofpoint to help protect University email addresses from spam, phishing messages, and other malicious email. Proofpoint also protects all mailing lists and distribution lists. You are automatically enrolled in Proofpoint.
SSL Certificates
The University has an arrangement with InCommon for issuing digital certificates, which are used to confirm that a website is legitimate and that its online transactions are secured. Certificates are provided free of charge for all University websites and web applications, including in test environments.
Two-Factor Authentication (Duo)
The University uses Duo for Two-Factor Authentication to better protect University data, especially when University accounts are used fraudulently to gain remote access to sensitive information. Duo authentication occurs after you log in with your user name and password using a mobile phone, tablet, or landline to verify your identity.
Virtual Desktop
Virtual desktop allows you to connect to software applications or a Windows desktop environment over the Internet, from anywhere and any device.
Vulnerability Management
Security vulnerabilities introduce risk on our network, applications, and other infrastructure. Managing them involves identification through scans, prioritization, and providing stakeholders with guidance on remediation and mitigation. Our team also supports asset tracking, reporting, and other security testing processes like web application assessments.