Services

135 Results

Registering Your Computer

At UCSF, we are dedicated to providing you with the best customer experience and supporting your computer so you can focus on your business. In order to best protect UCSF data and resources, IT Field Services (ITFS) manages desktops and laptops with BigFix Endpoint Management.ITFS uses asset data to manage your computer by providing patching and ensuring your systems have the appropriate security.  

  • Faculty
  • Staff
  • Student
  • Desktop Support

Gartner Research Portal - A Multi-service Resource

 UCSF faculty, learners and staff have free and unmetered access to Gartner research, white papers, webinars and more covering an array of complex IT issues, emerging technologies and industry trends.

  • Faculty
  • Staff
  • Technical Partner
  • Business Applications

BigFix Endpoint Management

Install BigFix Endpoint Manager – UCSF IT does the rest! BigFix is required for all computers conducting UCSF business, whether a machine is UCSF-owned or your personal computer. This is because, when it comes to securing UCSF IT resources, we can't fix what we can't see.

  • Faculty
  • Staff
  • Student
  • Desktop Support

Phish Alarm

Phish Alarm is a tool that is available to all users at UCSF. With the click of a button, users can report a phishing or malicious message. As described here, the Report Phish button is available for both PC and Mac Outlook clients as well as on Outlook Web Access (email.ucsf.edu) and the Outlook Mobile App.

  • Faculty
  • Staff
  • Student
  • Security

UCSFwpa - Secure Wireless

The UCSFwpa wireless service provides protected communications to Campus and Medical Center resources and networks. It is widely available in clinical, research and administrative buildings.The UCSFwpa wireless network supports most wireless devices using 802.11a/b/g/n. It is the recommended method of network access at most UCSF locations. This service is available to faculty, staff, learners and affiliates with Active Directory (AD) accounts. 

  • Affiliate
  • Faculty
  • Staff
  • Student
  • Network & Wireless

Application and Website Security

Hackers must first find weaknesses (vulnerabilities) within a system or application in order to gain control of computers and other network systems. These weaknesses can be the result of many different causes, such as not keeping systems and applications up to date or the use of insecure development and coding practices. In either case, these weaknesses could allow hackers to gain unauthorized access to UCSF systems and data. 

  • Staff
  • Security

SSL / TLS Certificates

SSL (secure socket layer protocol), currently using TLS 1.2 or greater encryption, is used to secure transmissions between servers and clients. Example: Visiting a https address from Google Chrome or Safari. SSL / TLS certificates allow clients to verify a server's authenticity against known Certificate Authorities before establishing an encrypted connection. This helps determine if the server is who they say they are.

  • Affiliate
  • Faculty
  • Non-UCSF
  • Staff
  • Technical Partner
  • Security