Search9 Results
- Services
- IT Security
- Network Security
Network Access Control secures data and systems by preventing unauthorized access from unknown locations, compromised devices, or malicious network traffic.
- Services
- IT Security
Any breach of security incident must be immediately reported via the Security Incident Reporting Form. If you suspect a security incident has occurred that could impact the University’s network, computers or data, you are required to report the incident immediately.
- Services
- IT Security
- Application Security
Web Application Firewalls (WAF) protect web applications from internet-based cyberattacks by filtering traffic to block malicious requests, allowing legitimate traffic to pass through normally.
- Services
- Wi-Fi and Network
Network support for students living in the UNL Residence Halls.
- Services
- IT Security
- Network Security
OnGuard is a software agent that performs posture assessments while BYOD is connected to eduroam or the wired network on campus.
- Services
- IT Security
The log analysis service is responsible for collecting, indexing, correlating, and managing multiple streams of data owned by the University of Nebraska System. Multiple systems and tools are used for this service. The two primary tools are Splunk and Cortex Data Lake.
- Services
- IT Security
- Network Security
A virtual private network (VPN) provides a secure connection to university networks from anywhere.
- Services
- IT Security
- Network Security
- Network Access Control
Network firewalls monitor and control inbound and outbound traffic, acting as a barrier between trusted internal network segments and untrusted external networks. Firewalls prevent unauthorized access and block potential threats by filtering data packets based on predetermined security rules.
- Services
- IT Security
- Network Security
- Network Access Control
Network authentication is the process of verifying the identity of a user or device attempting to access a network. Requests can be submitted to allow compliant devices to authenticate at specific network levels, based on use-case.