Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
169 Results
- Service
Cisco Phones
- Faculty
- Staff
Concord Fax (Formerly RightFax)
- Faculty
- Physician
- Staff
- Student
PeopleConnect
- Faculty
- Staff
Voalte Phones
- Faculty
- Staff
Endpoint Detection and Response
- Faculty
- Staff
- Technical Partner
MyAccess Single Sign-On
MyAccess is UCSF’s single-sign-on (SSO) service that enables you to access a variety of applications after logging in a single time.
- Technical Partner
- Access & Identity
GitHub Enterprise Server (On-Premises)
When people say "GitHub" they are often talking about the free public world-readable site at www.github.com. That's NOT what we're talking about here. Instead, UCSF has licensed its own secure internal version of GitHub Enterprise, and it lives at git.ucsf.edu.
- Research Staff
- Researcher
- Staff
- Student
- Technical Partner
- Hosting & Computing
Technical Project Management
UCSF IT has a team of Technical Project Managers (TPMs) that can help you manage your next technology project. TPMs can help you with all aspects of a project: they plan, execute, communicate, track issues and budget, manage risks and stakeholders, troubleshoot issues and report on your project. TPMs are experienced with a variety of project management methodologies, from traditional waterfall project management to an agile, product development approach.
- Faculty
- Staff
- Technical Partner
- Business Applications
Microsoft 365
Microsoft 365 allows access to Microsoft Word, Excel, PowerPoint, OneNote, OneDrive, Teams and Outlook from any device, anywhere.
- Affiliate
- Faculty
- Staff
- Student
- Email & Collaboration
IT Security Risk Assessment
UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security