Data Storage and Protection
Software designed to protect computers from malware
Converts saved sensitive data (e.g., social security or credit card numbers) into an unreadable, protected format
Options and guidelines for where to store sensitive or confidential data
Access and Authentication
Provides enhanced security by requiring two types of authentication to verify your identity
Implements processes and systems that protect institutional data and enables secure access to digital resources
Provides secure communications from sites outside the University network
IT Professional Security Tools
Security system that filters network traffic
Certifies that the content is provided from a verfied sender
Process used to identify, analyze, plan and respond to risks within the University’s IT environment.
Search, report, monitor and analyze real-time streaming and historical IT data
Assesses computers, computer systems, networks, or applications for security weaknesses
Provides online video-based training for faculty and staff.