My Recently Visited Services

Offerings that provide a secure computing environment for end users. Includes network security, system security, application security, and threat monitoring and management.


Electronic message, information sharing, productivity, and integrated collaboration suites used to facilitate interactions between individuals and work groups as they create, share, and exchange information. Includes services such as email, calendaring, productivity suites, file sharing, instant messaging tools, and web-based collaborative platforms used strictly for collaboration.


Practices, frameworks, and technologies that automate, improve efficiencies, and measure the effectiveness of business processes. Includes IT service management; ticket management; operations, business, sales, and marketing management platforms; document and signature management services; customer relationship management; job scheduling; and workflow management.


Systems and technologies in support of clinical processes, including health record management, pharmaceutical data, medical appointment scheduling, and residency placements.


Support of room and facility systems, including event management (room management, hotel, concierge, seating, conference registration, etc.), mapping, building security, safety and risk management, dining systems, point of sale, transportation, laundry, and parking systems.


The Constituent Relationship Management (CRM) system manages relationships and interactions with constituents and potential constituents


Business intelligence platforms, data warehouses, dashboards, analytics tools, transactional reporting, operational data stores, and data governance when offered as a service.


Telephony, including voice/VoIP, teleconferencing, and web conferencing hosted either in cloud or on-premises.


Your JMU eID (also called “username” in some applications/systems) is your electronic identification that provides access to password protected websites and services, such as mylogin.jmu.edu, MyMadison, Canvas, the JMU Official Wireless network, and more.


The architecture, installation, and operation of infrastructure items required to offer network connectivity, such as network cabling, routers, and firewalls. Includes connecting devices (including Internet of Things devices) to the network, network access management, securing access to networks, and appropriate authentication (e.g., network registration systems, VPN, and NAC).


Network File Storage is space allocated on JMU network servers for personal or departmental data files, such as documents, spreadsheets and more. Network file storage provides the ability to share data with other users and the ability to access your own data from multiple locations (on and off campus).


Multi-factor authentication (MFA) is an information security best practice that adds an extra measure of protection beyond your user name and password. It adds a step to our login process by requiring everyone to prove their identity using something in their possession, such as a mobile device or token.


Content management systems, portals, web hosting, web analytics, user experience design, and URL management. Also includes website and mobile application development.


Includes design and maintenance of the capabilities, tools, and service points needed to deliver IT services or provide end-user support. Includes service desks, call centers, and online support delivery. Might include concierge support or special event service delivery.


Strategy, planning, architecture, and operation of physical and virtual data centers, including on-premises, remote, and cloud-based data centers.


Provides the JMU community secure accounts for identity and access to University resources.


Alumni portals and offerings that support university and college advancement and development


Admissions, enrollment, registration, orientation, financial aid, student accounts and collections, advising, and career services systems.


Assessing or enabling accessibility of academic software, enterprise applications, or electronic/digital resources. Might include accessibility reviews, defining standards, analysis, or end-user training/awareness.


Offerings relating to institutional policy or compliance guidelines and requirements. Includes support for audit processes.


Offerings that respond to, remediate, and seek to prevent security incidents and vulnerabilities.


Purchasing consultation, hardware procurement, device refresh, leasing, and technology recycling.


Polling and survey offerings used to solicit feedback from a group of individuals for academic or business purposes. Includes application-based, online, and device-specific polling or survey systems.


Administration and management of core human resource systems, including recruiting, position management, performance review, workforce development, and time and attendance. Might also include payroll and benefits administration systems.


Administration and management of financial services, procurement, travel, budget, vendor relations, and equipment purchasing systems.