The SAP Access and Security Architecture offering informs and advises on highly technical strategy, design, and implementation engagements focused on the user access and security controls required to support new and ongoing applications in the SAP infrastructure.
The EduRoam service offering conveys access for visiting academics and staff members from other universities to connect to the University of Toronto network using their home university credentials.
Manage anti-phishing technical similations and campaigns.
AMS Access Control is a service for staff and faculty that grants and revokes access to different functional areas of the University’s SAP platform. AMS Access Control services include initial set-up of access, modifications to existing access, password resets and troubleshooting support. AMS Access Control should be used when a University staff or faculty member requires support in initiating or modifying their access to the University’s SAP platform.
The AMS Access Control service is operated by the University’s Enterprise Applications and Solutions Integration (EASI) unit.
AMS Access Control is the service that grants and revokes access to different functional areas of the student information system. Access includes initial set-up of access, modifications to existing access, password resets and troubleshooting support.
ISC working group focused on providing IT-related security guidance and service references to researchers.
The Information Security Guidelines service offering provides information security standards as a guideline to ensure the University of Toronto’s information systems and personal information is not compromised.
The Incident Response service offering monitors for and responds to notifications of compromised UTORid accounts, potentially compromised systems and phishing or other malicious emails. Additionally, it manages or facilitates and provides guidance for information security incidents.
The Internet Blocks service offering protects University of Toronto systems against unwanted intrusion or attack by internet hosts due to malware infection (botnet), virus/worm propagation, denial-of-service attacks, spamming (botnet, open SMTP relay), etc.
The Application Risk Self-Assessment service offering enables project managers / application developers to assess the security of their application and privacy impact to users of their application through a guided checklist.