Topics Map > SOE
School of Education Security Programs
Security tools installed on all School of Education computers supported by MERIT to ensure compliance with UW-Madison IT policies.
The following security tools are installed on all newly purchased School of Education computers. The Security Baseline Project ensures that these security tools are installed on all existing School of Education computers.
Secunia Software Inspector (CSI) – Is an internal vulnerability scanner, capable of assessing the security state of practically all legitimate programs running on Microsoft Windows, Mac OSX, and Linux platforms.
Tivoli Endpoint Manager (TEM) – Combines endpoint management and security into a single solution. TEM provides the ability to push software updates, security patches, and programs out to our customer’s computers.
Symantec Endpoint Protection (SEP) – Is a scanning tool that provides Antivirus and malware protection. Symantec offers a layered approach to protection that reduces antivirus scans, cyber-criminals, and zero-day attacks.
Identity Finder (IF) – Is a scanning tool that will locate and report the presence of data that contains sensitive information, it does not alter or remove the data or sensitive information. Preventing a data breach starts with knowing the location of your sensitive information. Identity Finder enables you to find confidential data, and then protect it so that sensitive information is not compromised. IF scans can be run remotely or initiated by users
All security tools are used remotely and do not require user interaction. They simply run in the background to keep your programs up to date, and your data protected from unauthorized access.
If you have any operational or training questions, please contact our MERIT IT Service Desk (firstname.lastname@example.org). If you have security related questions, please direct them to Dean Winger (email@example.com), the Security Officer for the School of Education.
Malware: short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Sensitive information: descriptive term, sensitive data may fit into various classifications including: personal and financial data, federally protected data, state protected data, human subjects research data, passwords, etc.
1 "Malware definition"(http://www.techterms.com/definition/malware). techterms.com. Retrieved 26 August 2013.