For Raising Buttons on Subpages
IT Security provides several services to campus users. Visit our Service Catalog to request a service, or review below for descriptions on services provided.
OU Information Technology offers vulnerability scanning for your servers, workstations, or static web sites. Results can be used to proactively locate, identify, and assess vulnerabilities allowing the department to prioritize and remediate them before they are targeted and exploited by attackers. This helps protect University data and can mitigate the risk of unauthorized access, theft, or malicious destruction. Vulnerability Scanning Request.
Two types of consultation on Information Security best practices in the work environment are available for request:
A SECURITY COMPLIANCE consultation includes assessments and reviews for external compliance standards such as NIST, HIPAA, PCI, GDPR, and FERPA or more general guidelines from the Center for Internet Security. Reviews covering compliance and internal policies and best practices are also available. Assessments include what tools and services OU IT can leverage such as sensitive data storage options.
A SECURITY ENGINEERING consultation can help you tailor a cost-effective, flexible plan to monitor and enhance your security posture. From assessment to strategy, design to implementation to customized solutions, our team of experts proactively identify network, data, and application and enterprise threat levels/risk, vulnerabilities and cyber security issues-helping you prioritize your security issues and address most urgent needs.
Dell Data Protection | Endpoint Security Suite Enterprise harnesses the power of an advanced threat prevention engine to prevent the execution of advanced threats in real-time on each endpoint in the organization. The Dell agent provides real-time detection and prevention of malware. It operates by analyzing potential file executions for malware in both the Operating System (OS) and memory layers and prevents the delivery of malicious payloads. Memory protection is designed to be extremely low-touch as to not incur a heavy performance overhead.
DUO is a cloud based service that provides multi-factor authentication (MFA) to applications and services. Multi-factor authentication verifies identities via a second factor, such as an application push to your Duo-registered smartphone. Duo works by exchanging encrypted keys between the client, server and secondary factor when authenticating. This prevents unauthorized persons from gaining access even if they have obtained a valid password.
It is highly recommended that sensitive and protected University data be secured by multi-factor authentication. Data that could compromise the University’s reputation, property, employees, students, or interests if stolen is a strong candidate for Duo.
University of Oklahoma account holders, who need special permission to access IT managed systems or services, will be required to fill out and submit an IT Access Request form for approval by their Director/Manager/Unit Supervisor or authorized proxy. The person requesting access will receive notice of whether or not the access has been granted, once it has been approved and reviewed by the appropriate sources. The IT systems request is a required online validation and tracking form for faculty/staff members needing access to specific IT managed systems, services or VPN management groups.