Service Catalog · Information Security
Information Security Services
Security service categories and request paths
Services that provide security, data integrity, and compliance for institutional activities. Includes identity and access management, security consulting and education, incident response and investigation, and security policy and compliance.
5
Categories
15+
Services
24/7
SOC
100%
UT Community
Security Incident Response & Investigation
Services for detecting, analyzing, and responding to security incidents and vulnerabilities across the UT environment.
Identity & Access Management
Comprehensive identity services including authentication, directory services, and group management for secure access to UT resources.
Austin Active Directory
The Austin Active Directory and associated auxiliary services for centralized user and resource management.
›
Authentication & Multi-Factor Authentication
Enterprise authentication services including Duo multi-factor authentication for enhanced account security.
›
Directory Services
uTexas Enterprise Directory (TED), UT Directory, and White Pages Service for directory lookups and contact information.
›
Group & Role Management
Apollo, Enterprise Group Services, and SailPoint IIQ for managing user groups, roles, and access permissions.
›
Identity Management
UT EID Self-Service Tool, EID Administrative Services, and uTexas Identity Manager (TIM) for comprehensive identity lifecycle management.
›
Student Photo Roster
Access to student photo rosters for authorized university personnel and systems.
›
Security Consulting & Education
Professional consulting services and educational resources to help departments manage security risks and compliance requirements.
Secure Computing
Essential security tools and technologies for protecting data, communications, and computing resources across the UT environment.
1Password
Enterprise password manager to securely store and share passwords, encryption keys, and personal identification numbers.
›
Antivirus Software
Antivirus protection software for university-owned computers and systems to detect and prevent malware threats.
›
Digital Certificates
Digital certificates for signing and encrypting email and other documents to ensure authenticity and confidentiality.
›
InCommon Certificates
InCommon web server SSL certificates for secure HTTPS connections on university web services.
›
Isora GRC
Campus-wide IT risk assessment tool including system, application, and vendor product inventory capabilities.
›
Stache Retiring Winter 2026
Password management tool for storing and sharing passwords — service retirement planned for Winter 2026.
›
Security Policy & Compliance
Policy frameworks, compliance requirements, and operational procedures to ensure institutional security and data protection standards.
Hard Drive & Media Destruction
Safe and secure disposal of old computer hard drives, media, and storage devices in compliance with data protection standards.
›
IT Security Policies
Information security policies and standards governing the use of IT resources and protection of institutional data.
›
Reporting a Stolen Device
Report stolen or lost computers and devices to enable rapid response and data protection measures.
›
Security Exception Request
Request an IT security exception through the ISO process when operational needs conflict with standard security requirements.
›
UT Ready — Disaster Recovery Planning
Disaster recovery planning services to prepare departments for business continuity during major system outages or emergencies.
›