Search15 Results

Services or Offerings?
We use Microsoft Defender to help protect university‑owned Windows, Mac, and Linux computers from security threats. Microsoft Defender is automatically installed and managed on all university‑managed devices, so your system stays protected without you needing to take any action.

Request badge access to ISS and Denver OIT managed spaces on campus. Exclusive to ISS and Denver OIT spaces only. See the campus badging or facilities offices for all other access requests.

Supervisors and managers may request authorized access to institutional data for an employee when access is required for business or compliance purposes.

Digital Certificate Management provides secure issuance, renewal and revocation of digital certificates to ensure secure communications and authentication across systems and applications.

Ensure your department or program meets industry standards by achieving and maintaining required security and compliance accreditations. Receive expert IT support coordinating and communicating with auditors or accreditation boards to streamline the process, compiling documentation that meets the auditors' and accreditation boards' needs, and speaking on behalf of security and compliance practices.

Seeking additional knowledge about security and compliance best practices? Schedule a time with the IT security and compliance team to learn more about IT security and compliance including existing IT policies, standards, and request training on a wide range of topics for you or your department.

Departments accepting payments from credit or debit cards need to meet certain compliance requirements. Request support for payment card activities for merchants, including onboarding new merchants, completing procurement card scans, and receiving guidance to meet and maintain procurement card compliance requirements.

Quickly report any missing or stolen university devices to ensure prompt action and security.

Request a technology risk assessment to evaluate security and compliance risks for applications, services, or research related technologies that involve university data.

Ensure timely termination of access for departing employees to maintain information security and compliance.

Vulnerability Asset and Remediation conducts regular vulnerability scans and assessments, providing actionable insights and remediation plans to address security weaknesses to university IT professionals.

Report suspected or confirmed IT security incidents so we can respond quickly and protect university systems and data.

Get assistance coordinating and communicating campus security and compliance policies and procedures with accreditation boards to facilitate a smooth accreditation process.

Get assistance coordinating and communicating with auditors to facilitate a smooth audit process.

Ensure that your critical system meet security and compliance industry standards with a System Security Plan.