LogRhythm-SIEM allows the Information Security team to monitor the network for security threats and intrusions.
Secure Computing Services
Services that provide a secure computing environment for end users. Includes network security, system security, application security, etc.
The UTHSC System Center Configuration Manager (SCCM) server monitors Windows computers on the domain and provides the ITS department and other divisions with hardware and software information. It is also used to deploy patches and other software updates to campus computers. The system can also be utilized for imaging computers… Read More
The Cisco Clean Access Agent is part of the Cisco Network Access Control (or NAC) network security solution that will provide you with a secure and clean network environment by preventing infected and vulnerable machines from joining the University’s network. At the same time, it will provide necessary directions and… Read More
The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, quickly and securely. When should the UT Vault be used? To send sensitive information securely You should use UT Vault when you have the need… Read More
Xythos is content management software that allows you to place files in a secure central location so they can be accessed via the internet. You can upload, access, and share files from anywhere with any computer that is connected to the internet. Xythos provides a collaborative work area for your… Read More