Secure Computing

Overview

Offerings that provide a secure computing environment for end users. Includes network security, system security, application security, and threat monitoring and management.

Get Started

Click the Service Offering(s) button on this page to open the Form directly or see additional information via the Service Offering link(s) at the bottom right of this page

Request

Fill out required fields, submit request, you'll receive an open ticket notification, if further info is needed you'll be contacted by support team, ticket activity can be tracked in the portal, and you'll receive a notification once the ticket is completed.

Learn More

More information may be obtained via keyword search in the Knowledge Base.

 
Application Integration Request Endpoint Security Support Security Certificates Security Compliance Consulting Security Control Exceptions Security Incident Response Security Support and Tools

Related Articles (1)

Guidelines for protecting desktops and laptops, emphasizing strong access controls, regular software updates, antivirus use, firewall activation, data encryption, and routine data backups.

Service Offerings (7)

Application Integration Request
The Application Integration Request Service Offering allows requests for integrating NetID authentication into applications.
Endpoint Security Support
The Endpoint Security Support Service Offering allows requests for assistance on security tools for endpoints
Security Certificates
The Security Certificates Service Offering allows requests for TLS certificates and ACME accounts.
Security Compliance Consulting
The Security Compliance Consulting Service Offering allows requests for verifying devices are up to security standards.
Security Control Exceptions
The Security Control Exceptions Service Offering allows requests for guidance on security control exceptions.
Security Incident Response
The Security Incident Response Service Offering is for reporting security incidents.
Security Support and Tools
The Security Support and Tools Service Offering allows requests for encryption services, endpoint protection (EDR), vulnerability scanning, and penetration testing.