Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
82 Results
Pulse/ Ivanti and Okta Logon Instructions
On Thursday, June 13, 2024 (updated from Tuesday, May 21) at 11:00AM, the Ivanti/Pulse VPN logon screen on your workstation will change appearance. Customers will see a new Okta authentication screen asking for email address and password. The system will automatically send a Duo push. There will be no impact to any UCSF applications or systems.
- Faculty
- Staff
- Student
- Volunteer
- Network & Wireless
Campus IT Operating Model (ITOM) Program
- Affiliate
- Faculty
- Research Staff
- Researcher
- Staff
- Technical Partner
Network Access Control (NAC)
Network Access Control (NAC) With the volume and impact of security threats growing at UCSF and around the world, we have steadily improved UCSF’s security posture over the last few years. After a 2017 security assessment showed that we still had some way to go, Chancellor Hawgood instructed us to “move purposefully” on a suite of security initiatives, including the deployment of Network Access Control (NAC).
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Network & Wireless
Proofpoint URL Isolation
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
IS-3 Program - Project Resources
- Affiliate
- Faculty
- Staff
- Technical Partner
Data Loss Prevention (DLP)
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
IS-3 Program
- Technical Partner
CipherCloud
CipherCloud makes UCSF Box and Office 365 safe for storing restricted data (e.g., PHI, PII, PCI, FERPA). This page provides a CipherCloud overview and FAQ.
- Affiliate
- Faculty
- Staff
- Student
- Network & Wireless
Endpoint Detection and Response
- Faculty
- Staff
- Technical Partner
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security