Information Security
Services that provide security, data integrity, and compliance for institutional activities. Includes identity and access management, security consulting and educations, incident response and investigation, and security policy and compliance.
Quicklink(s)
1Password
1Password is a password management tool that securely stores your passwords and personal information in a secure location.
Departmental Firewall Support
OIT offers campus units locally attached, custom-configured firewalls that provide flexibility and additional security beyond the basic service provided by the campus firewalls.
FireEye HX
FireEye HX is an endpoint detection and response (EDR) solution designed to provide real-time visibility into endpoint activities and detect advanced threats missed by traditional security solutions.
LastPass
LastPass Enterprise is being replaced with 1Password Business. Service will end in November 2024.
My Account Activity
My Account Activity is a self-service application that allows you to view and report your recent UCInetID account activity.
Proofpoint Email Security
Proofpoint provides advanced email protection with URL Defense and Self-Service Spam Quarantine.
Secure Research Environment (SRE)
The Secure Research Environment (SRE) is a service providing a secure, on-campus virtual server infrastructure for the UCI campus research community.
Virtual Private Network (VPN)
The Cisco Secure Client VPN allows you to securely connect to UCI’s network as if you were on campus, making access to vital campus resources possible.
Vulnerability Management Program
Vulnerability Management Program
A formalized way to track and manage information security vulnerabilities on the network as part of an ongoing effort to reduce risk.
Tenable SecurityCenter
Tenable SecurityCenter is an enterprise management tool used to scan on-campus systems for security vulnerabilities. A self-service option is available to run custom scans.
Web AppScan
A Web AppScan can be used to perform an in-depth analysis of web applications to identify coding errors that could lead to an application being vulnerable to attack.