Overview
The Secure Computing service provides JMU faculty, staff, and departments with tools and technologies designed to protect institutional data, safeguard individual accounts, and maintain a secure computing environment. This service includes password management solutions, endpoint protection, cloud security monitoring, sensitive data discovery, and secure remote access. Together, these offerings help ensure that university systems and information remain resilient against modern cybersecurity threats.
Who can use this Service?
JMU faculty and staff
How can I get this Service?
The use of JMU secure computing services is dependent on University Role, level of requested access, approval of access and other requirements depending on the need of the request.
Where can I get Help/Support?
Report questions or any issues by contacting the IT Help Desk.
Quick-start FAQ's
Features:
- Bitwarden: Provides secure creation, storage and management for your password needs.
- Crowdstrike: A web/cloud based anti-virus product for your Windows or Linux server.
- Exabeam: A SIEM that provides JMU with a centralized view of our security landscape by aggregating, analyzing, and correlating data from numerous sources.
- Identity Finder: A desktop application/service to locate personally identifiable information (PII) stored on JMU-owned computers (aka Spirion Identity Finder, data security, sensitive data, sensitive files)
- Netskope: A desktop application/cloud-native platform that monitors and secures cloud environments with continuous security assessments, advanced threat protection, data loss prevention and private access.
- Remote Access: Request access to the JMU VDI and VPN services.
- Website Certificate Request: A system of processes, technologies, and policies that provide data encryption and validation for your access needs (aka PKI, Certificate, SSL, Cert, SSL Certificate, SSL Cert)