Information Security
Security Incident Response and Investigation | |||
---|---|---|---|
Vulnerability Management Program | Vulnerability Scanning Service | Self Help |
Identity and Access Management | |||
---|---|---|---|
Austin Active Directory | The Austin Active Directory and associated auxiliary services | Self Help | |
Authentication | Enterprise Authentication, Multi-Factor Authentication (MFA) a.k.a. Duo | Self Help | |
Directory Services | uTexas Enterprise Directory (TED), UT Directory, White Pages Service (WPS) | Self Help | |
Group and Role Management | Apollo, Enterprise Group Services, Organizational Hierarchy System Contacts, SailPoint IIQ | Self Help | |
Identity Management | UT EID Self-Service Tool, UT EID Administrative Services, uTexas Identity Manager (TIM) | Self Help | |
Student Photo Roster | Access to student photo rosters | Self Help |
Security Consulting and Education | |||
---|---|---|---|
IT Security Consulting (Risk Management) Services | ISO security consulting services | Self Help |
Secure Computing | |||
---|---|---|---|
Antivirus Software | Antivirus protection software for university-owned computers | Self Help | |
Digital Certificates | Signing and encrypting email and other documents | Self Help | |
InCommon Certificates | InCommon (Web Server) SSL Certificates | Self Help | |
Isora GRC (includes System | App | Vendor Product Inventory) | Campus-wide IT risk assessment tool | Self Help | |
Stache | Store and share passwords, encryptions keys, personal identification numbers | Self Help |
Security Policy and Compliance | |||
---|---|---|---|
Hard Drive and Media Destruction | Safely discard old computer hard drives and media | Self Help | |
IT Security Policies | Information Security Policies | Self Help | |
Reporting a Stolen Device | Report stolen or lost computers and devices | Self Help | |
Security Exception Request | Request an IT security exception (ISO) | Self Help | |
UT Ready - Disaster Recovery Planning | Disaster Recovery Planning | Self Help |