The University of Connecticut uses Device Management platforms to enhance the security of university-owned devices and better protect individual’s and institutional data. ITS uses Intune for Windows and Jamf for Macs. These are both comprehensive device management platforms that ensure workstations have up-to-date security. This includes:
Encryption and data protection
Vulnerability assessment
Patching
Operating system and software updates
Endpoint Detection and Response
Why is data encryption important? Encryption transforms information into a form that only authorized users can read. It protects data, which could be sensitive or confidential, from unauthorized access, safeguarding against identity theft and breaches.
Microsoft Endpoint Detection and Response (EDR)
Enrollment includes Microsoft Endpoint Detection and Response (EDR), which allows ITS to better prevent, respond, and contain attacks targeting UConn. It also enables ITS to mitigate data exposure. If a machine is compromised, then every device associated with it – every device you’ve logged into and every device on your network – is also at risk until they hit a control barrier. EDR provides us the ability to quarantine a compromised device and contain it, minimizing the damage to the institution.
It also enables remote support, which vastly reduces the institutional response required if a device is lost, stolen, or otherwise compromised. When a device is lost there is a labor intensive and intrusive process to determine what was on the device. With Intune and Jamf, we can ensure encryption and remotely wipe the device to prevent unauthorized access to your information.
Why Does UConn Manage Devices?
The University of Connecticut has policies that govern how data should be stored, accessed, or transmitted on university technology securely and that state our responsibility to protect it.
The Data Classification policy defines the classifications of institutional data (i.e., the categories of data that the University is responsible for safeguarding) and the associated measures that are necessary to safeguard each classification.
The Data Roles and Responsibilities policy defines the responsibilities of individuals within the organization in protecting the University of Connecticut’s data assets.
Failure to comply with standards comes at a cost to the University because it increases risk. It is very labor intensive and difficult for individuals to comply. Device Management ensures that university-owned devices meet policy and security obligations and removes the burden from individuals.
Frequently Asked Questions
Why does the University manage Macs now?
ITS follows what Apple recommends. Apple formerly encouraged self-management. They no longer encourage this and now advise central management.