Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
2089 Results
Microsoft 365: SharePoint
Description
- Faculty
- Staff
- Student
- Technical Partner
- Email & Collaboration
Cisco Phones
- Faculty
- Staff
PeopleConnect
- Faculty
- Staff
Endpoint Detection and Response
- Faculty
- Staff
- Technical Partner
MyAccess Single Sign-On
MyAccess is UCSF’s single-sign-on (SSO) service that enables you to access a variety of applications after logging in a single time.
- Technical Partner
- Access & Identity
GitHub Enterprise Server (On-Premises)
Overview When people say "GitHub" they are often talking about the free public world-readable site at www.github.com. That's NOT what we're talking about here. Instead, UCSF has licensed its own secure internal version of GitHub Enterprise, and it lives at git.ucsf.edu.
- Technical Partner
- Business Applications
Technical Project Management
UCSF IT has a team of Technical Project Managers (TPMs) that can help you manage your next technology project. TPMs can help you with all aspects of a project: they plan, execute, communicate, track issues and budget, manage risks and stakeholders, troubleshoot issues and report on your project. TPMs are experienced with a variety of project management methodologies, from traditional waterfall project management to an agile, product development approach.
- Faculty
- Staff
- Technical Partner
- Business Applications
Microsoft 365
DescriptionMicrosoft 365 allows access to Microsoft Word, Excel, PowerPoint, OneNote, OneDrive, Teams and Outlook from any device, anywhere.
- Faculty
- Staff
- Student
- Email & Collaboration
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security
Slack
- Staff