Consultation & Services
IT Security provides several services to campus users. Visit our Service Catalog, or review below for descriptions on services provided.
What Services are Offered?
University of Oklahoma account holders who need special permission to access IT managed systems or services will be required to fill out and submit an IT Access Request form for approval by their Director/Manager/Unit Supervisor or authorized proxy.
The person requesting access will receive notice of whether or not the access has been granted once it has been approved and reviewed by the appropriate sources. The IT system request is a required online validation and tracking form for faculty/staff members needing access to specific IT managed systems, services, or VPN management groups.
Dell Data Protection | Endpoint Security Suite Enterprise harnesses the power of an advanced threat prevention engine to prevent the execution of advanced threats in real-time on each endpoint in the organization.
The Dell agent provides real-time detection and prevention of malware. It operates by analyzing potential file executions for malware in both the Operating System (OS) and memory layers and prevents the delivery of malicious payloads. Memory protection is designed to be extremely low-touch as to not incur a heavy performance overhead.
DUO is a cloud-based service that provides multi-factor authentication (MFA) to applications and services. Multi-factor authentication verifies identities via a second factor, such as an application push to your DUO-registered smartphone. DUO works by exchanging encrypted keys between the client, server, and secondary factor when authenticating. This prevents unauthorized persons from gaining access even if they have obtained a valid password.
It is highly recommended that sensitive and protected University data be secured by multi-factor authentication. Data that could compromise the University’s reputation, property, employees, students, or interests if stolen is a strong candidate for Duo.
OU Information Technology offers vulnerability scanning for your servers, workstations, or static web sites.
Results can be used to proactively locate, identify, and assess vulnerabilities allowing the department to prioritize and remediate them before they are targeted and exploited by attackers. This helps protect University data and can mitigate the risk of unauthorized access, theft, or malicious destruction.
What Type of Consultations are Offered?
A Security Risk Assessment includes assessments and reviews for external compliance standards such as NIST, HIPAA, PCI, GDPR, and FERPA or more general guidelines from the Center for Internet Security. Reviews covering compliance and internal policies and best practices are also available. Assessments include what tools and services OU IT can leverage, such as sensitive data storage options.