Child pages
  • Security Management and Consulting
Skip to end of metadata
Go to start of metadata

Service Name

Security Management and Consulting


This service supports the University's security policies and processes by providing appropriate controls over access to service infrastructure components and protecting services from unauthorized access or use. This service also provides consulting services to ensure departments and systems comply with the University's security requirements.


All University Departments

How to Request Service

  • IT Service Request


Business Standard - Service availability target is Monday- Friday 8:30 am. – 5:00 p.m.  No on-call engineer support provided.  Support Service is Next Business Day.  Full Support Center Service request schedule is available.


  • Use of external security resources may incur charges

Service Line

Systems and Networks


  • Establishes monitoring and reporting processes for security events and ensures that all recognized events are logged, and reported on.
  • Plans and designs hardware and software solutions used to support security processes and automated enforcement of University security policies.
  • Establishes guidelines for appropriate access control lists, group membership, rights assignments and access profiles.
  • Consults and recommends physical security solutions such as badge creation and maintenance, camera surveillance, physical access management to secure areas and biometric or other multi-factor access methods.
  • Establishes appropriate protocol management services such as encryption support, VPN access and secured transmission of data and files.
  • Negotiates and establishes appropriate presence management services such as federated identity management and trusted partner support.
  • Plans and allocates resources to support internet firewalls, network port access and proxies.
  • Consult with University departments on security requirements for application security, security models, application security API interfaces and security validation.
  • Negotiates with 3rd party firms to conduct regular audits and tests for intrusions, vulnerability and security risk exposures.
  • Support external audit efforts as well as validate security compliance with regulatory and industry controls.
  • Provide security consulting services to assist with security design over new and changing services.
  • Reviews IT practices for compliance with University Information Security interests.
  • Works with Technology Training service to ensure appropriate campus community training on information security roles and responsibilities.


Dexter Caldwell


Adequate power and networking environment for security infrastructure.

VP Customer

Vice President of Finance & Administration

Delivery Channels

  • Complete Work Requests
  • Security plans and strategies
  • Consulting and Support

Service Targets

  • Major Server Vulnerability Rate. (Quarterly Major Server Vulnerabilities/Total Servers Scanned.)
  • Total Server Vulnerability Rate. (Total servers with vulnerabilities/Total Servers Scanned.)
  • Security Management Process Maturity.
  • Staff Security Training Rate. (University Faculty/Staff with PII access trained/Total Faculty and Staff.)
  • PCI Compliance Rate. (PCI compliant Apps/Total Apps requiring PCI compliance.)
  • No labels