Enhanced Endpoint Protection Service (EEPS)
With the extension of our networks for remote work, the need for early detection of malicious activity is greater than ever. That is why the university is complementing our existing security tools by providing a new service called the Enhanced Endpoint Protection Service (EEPS). This service will improve the protection of our endpoints and institutional data.
The timing of this initiative against cybercriminals is also critical for several other reasons:
- Universities are under attack as never before – Michigan State, University of California - San Francisco, and University of Utah all reported attacks in 2020. Attacks come from nation states as well as criminal organizations trying to steal or manipulate intellectual property.
- Many government regulations and granting agencies already require a higher level of security to safeguard government information included in research and university projects. In the future, many of these sponsors will not accept grant applications from institutions that do not meet these higher standards of data security.
- Enhanced endpoint security is in place at our peer universities.
Our new enhanced security service uses a risk-based approach that focuses on securing the most sensitive, valuable university data that is likely to be at highest risk for attack. The program will focus on protecting leaders and faculty who access systems that contain this type of information.
To preserve your privacy and keep information confidential, EEPS tools monitor endpoint activity at a technical level. For example, if a PDF document attachment is downloaded from email and opened, these tools will detect the PDF reader was used and the name of the PDF document but will not access the content of the document. If after opening the PDF there were unwanted changes to the system or the PDF reader behaved suspiciously the tool could help detect this threat and then defend you from an attack without accessing the content of the document.
Currently we are testing on a subset of systems with a few different tools to determine which tool provides the best fit for our environment and once selection is complete we will be deploying that tool on a wider scale.
Will this tool be replacing an existing security tool on my computer?
The scenarios being tested involve running this tool alongside of existing security software so no replacements will be needed.
Will this tool cause my computer to run slower?
The tools are designed to have as little impact as possible and this is one of the primary evaluation criteria we will be looking at.
If you have any questions on this upcoming service or have interest in participating in the testing please reach out to our team at firstname.lastname@example.org.