University of Utah Cyber Security Initiative
Higher education faces an ever-growing number of cybersecurity concerns, from surges in phishing and ransomware attacks to regulatory changes and rising premiums for cyber insurance.
In response, University of Utah President Taylor Randall has commissioned a university-wide cybersecurity program led by UIT Partner Relations and the Information Security Office.
Please contact the help desk for questions or concerns regarding any of these security tools.
Cyber Security Tools
The University of Utah Information Security Office (ISO) utilizes a series of cyber security tools to maintain the stability and security of the University's computing environment. This initiative includes the following tools to secure and protect the University from malicious actors, both internal and external, to the University's mission.
Duo Two-Factor Authentication
Two-Factor Authentication (2FA) by Duo Security, ensures a secure method for authenticating user accounts. It requires something you know, your password, and something you have, such as a cell phone with Duo Security app installed, or a physical Duo token key fob. This ensures the person signing into the device is authentic and removes an actors ability to compromise a user's account.
Microsoft Defender
Microsoft Defender is an anti-virus and anti-malware software. It monitors for malware, spyware, ransomware, and other malicious software used to take control or infect your computer with more malicious software.
ForcePoint Data Loss Prevention (DLP)
ForcePoint DLP monitors for certain Restricted, Sensitive, or Public data and ensures the data is stored in appropriate locations. This prevents certain data types from being compromised in the event of a security breach. The University offers approved platforms for storing certain data types to prevent that data from being compromised or leaked to the outside world.
BeyondTrust Endpoint Protection Manager (EPM)
BeyondTrust EPM manages user credentials and permissions to monitor administrative tasks being performed on the computer. These actions are recorded and sent to ISO for auditing and/or to remediate threats.
Tanium
Tanium performs endpoint threat detection and response. When computers begin to perform maliciously or outside of normal operation as a result of a malicious actor, Tanium will alert a Response Team to mitigate the risk before a full security breach occurs.