LogRhythm-SIEM allows the Information Security team to monitor the network for security threats and intrusions.
Infrastructure and services that provide security, data integrity, and compliance for institutional activities.
The UTHSC System Center Configuration Manager (SCCM) server monitors Windows computers on the domain and provides the ITS department and other divisions with hardware and software information. It is also used to deploy patches and other software updates to campus computers. The system can also be utilized for imaging computers… Read More
The Cisco Clean Access Agent is part of the Cisco Network Access Control (or NAC) network security solution that will provide you with a secure and clean network environment by preventing infected and vulnerable machines from joining the University’s network. At the same time, it will provide necessary directions and… Read More
Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Forensics Analysis provides the user with detailed findings in the… Read More
Hardware can be physically sequestered by security team upon request or due to incident or threat. Sequestration involves the physical removal of said machine. IT Security will review the contents of the hard drive. A copy of the hard drive will be produced. Machine can be wiped upon request.
The Account Management service is responsible for all authentication and authorization services provided centrally by OIT for all UT campuses statewide. The primary statewide identifier is the NetID. Features Provided for all faculty, staff, students at all campuses; may be requested for authorized guests Issuance of departmental NetIDs which are… Read More
IT and Information Security Standards and Practices are created and updated when necessary. IT Standards and Practices can be internal and external. IT Standards and Practices sets guidelines and rules for the campus and ITS Staff regarding Information Security and Technology requirements. Standards and Practices are reviewed and approved by… Read More
The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, quickly and securely. When should the UT Vault be used? To send sensitive information securely You should use UT Vault when you have the need… Read More
Xythos is content management software that allows you to place files in a secure central location so they can be accessed via the internet. You can upload, access, and share files from anywhere with any computer that is connected to the internet. Xythos provides a collaborative work area for your… Read More
The IT Security Team assesses and measures current security controls, policies, and best practices in specific UTHSC departments, colleges, areas, clinics, and other UTHSC-owned entities. Assessments are reviewed by IT Security. After review process is complete, IT Security will make suggestions to said area on what they can do to… Read More
A Security Plan is required, per UT Systems IT Policy IT0121, for computer systems at the UTHSC. This new policy became effective January 1, 2010; the initial security plans are to be done by beginning of the calendar year. Specific dates will vary but campus will be notified. Security Plans… Read More