Services

162 Results

Registering Your Computer

At UCSF, we are dedicated to providing you with the best customer experience and supporting your computer so you can focus on your business. In order to best protect UCSF data and resources, IT Field Services (ITFS) manages desktops and laptops with BigFix Endpoint Management.ITFS uses asset data to manage your computer by providing patching and ensuring your systems have the appropriate security.  

  • Faculty
  • Staff
  • Student
  • Desktop Support

Gartner Research Portal - A Multi-service Resource

 UCSF faculty, learners and staff have free and unmetered access to Gartner research, white papers, webinars and more covering an array of complex IT issues, emerging technologies and industry trends.

  • Faculty
  • Staff
  • Technical Partner
  • Business Applications

BigFix Endpoint Management

Install BigFix Endpoint Manager – UCSF IT does the rest! BigFix is required for all computers conducting UCSF business, whether a machine is UCSF-owned or your personal computer. This is because, when it comes to securing UCSF IT resources, we can't fix what we can't see.

  • Faculty
  • Staff
  • Student
  • Desktop Support

Blue Coat (Web Proxy)

Blue Coat is a tool to keep people away from dangerous websites. When a computing device on the Medical Center network tries to access a website that falls under the Phishing, Botnets or Spam categories, the user will be redirected to a custom exception page indicating that the website is blocked.

  • Technical Partner
  • Network & Wireless

Phish Alarm

Phish Alarm is a tool that is available to all users at UCSF. With the click of a button, users can report a phishing or malicious message. As described here, the Report Phish button is available for both PC and Mac Outlook clients as well as on Outlook Web Access (email.ucsf.edu) and the Outlook Mobile App.

  • Faculty
  • Staff
  • Student
  • Security

UCSFwpa - Secure Wireless

The UCSFwpa wireless service provides protected communications to Campus and Medical Center resources and networks. It is widely available in clinical, research and administrative buildings.The UCSFwpa wireless network supports most wireless devices using 802.11a/b/g/n. It is the recommended method of network access at most UCSF locations. This service is available to faculty, staff, learners and affiliates with Active Directory (AD) accounts. 

  • Affiliate
  • Faculty
  • Staff
  • Student
  • Network & Wireless

Application and Website Security

Hackers must first find weaknesses (vulnerabilities) within a system or application in order to gain control of computers and other network systems. These weaknesses can be the result of many different causes, such as not keeping systems and applications up to date or the use of insecure development and coding practices. In either case, these weaknesses could allow hackers to gain unauthorized access to UCSF systems and data. 

  • Staff
  • Security