The enterprise data centers are controlled access environments housing critical technology equipment, applications, and data. They are the hub of the University’s computing resources, which are shared by the academic, medical, research, and administrative communities.
Full disk encryption is available for computers that handle high-risk sensitive data. To protect the data from unauthorized access, all data on your computer’s internal hard drive is converted into unreadable code that cannot be deciphered easily.
Domain Name System (DNS)
The Domain Name System (DNS) translates computer names to Internet Protocol addresses. This naming structure makes it easier to access resources on the Internet or University network. Departments can apply for use of DNS to support their computers' network connections.
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol automatically configures the necessary settings when connecting a computer to the network. It allows you to more easily connect your computer to the University network from any participating UR location. Departments can apply for use of DHCP to support their computers' connection to the University network.
Enterprise architecture identifies the principles and standards by which an enterprise will organize itself to most effectively achieve its business goals. Architects will consult with individuals and departments to develop a streamlined approach to guide technology, information, business, and solutions standards throughout the University.
The University firewall maintains the security and proper functioning of the University network by filtering out unwanted traffic. Departmental firewall service includes design consultation, installation, upgrades, and 24/7 monitoring and support.
University IT can assist you with quality assurance (QA) and testing of your applications. QA services include test strategy and planning, use case identification, exploratory testing, manual testing, automated testing, and browser emulation.
Software and Patch Management
University IT can manage software delivery and updates on computers running Windows or Mac OS X. This includes operating system updates, security patches, and third party software such as web browsers, productivity and multimedia software, and frameworks.
Vulnerability scanning allows IT administrators to identify weaknesses in the security of their systems from perspectives both internal and external to the University network. Departmental IT staff can assess the security risk of their systems and prioritize vulnerability remediation through an intuitive web interface.