Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
36 Results
- Hosting & Computing
- Security
Data Loss Prevention (DLP)
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
Phish Alarm
Phish Alarm is a tool that is available to all users at UCSF. With the click of a button, users can report a phishing or malicious message. As described here, the Report Phish button is available for both PC and Mac Outlook clients as well as on Outlook Web Access (email.ucsf.edu) and the Outlook Mobile App.
- Faculty
- Staff
- Student
- Security
Proofpoint URL Isolation
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Data Storage
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Security Incident Response & Investigation
- Technical Partner
Campus IT Operating Model (ITOM) Program
- Affiliate
- Faculty
- Lab Manager
- Principal Investigator (PI)
- Research Staff
- Researcher
- Staff
- Student
- Technical Partner
GitHub Enterprise Cloud
GitHub, a leading open-source platform for software developers, is now available at UCSF. Follow the steps below to request access to GitHub via the UCSF GitHub Enterprise Program.
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Hosting & Computing
GitHub Enterprise Server (On-Premises)
When people say "GitHub" they are often talking about the free public world-readable site at www.github.com. That's NOT what we're talking about here. Instead, UCSF has licensed its own secure internal version of GitHub Enterprise, and it lives at git.ucsf.edu.
- Research Staff
- Researcher
- Staff
- Student
- Technical Partner
- Hosting & Computing
Server Management & Monitoring
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
IT Security Risk Assessment
UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security