Skip to Content

Division of Information Technology

  • Thomas Cooper Library at sunset.

SecureCarolina Technologies

The overarching goals of the SecureCarolina technologies are to:

  • Determine the risk and impact of compromise by correlating the vulnerabilities present and amount of sensitive data on each device.
  • Prevent unauthorized access to, and disclosure of, sensitive data in transit and at rest.
  • Prevent unauthorized access to business services.
  • Increase detection rates of compromise; expedite its eradication and the restoration of business services and devices.

SecureCarolina Technologies Available for Use

Consult your local systems administrator or SA contact for more information.

Open DNS

DNS Security

DNS Security helps prevent information security incidents by adding threat intelligence into the DNS translation process. That intelligence prevents adware, malware, botnets, phishing attacks, and other known bad websites from being accessed.

Symantec Endpoint Protection logo

Endpoint Protection

Microsoft Defender for Endpoint is Microsoft's endpoint security platform that goes far and beyond the traditional anti-malware engine and firewall to protect against the modern cybersecurity threats an organization faces.

List Thumbnail

Multifactor Authentication

Many of the largest data breaches begin with a compromised password. Enabling multifactor authentication (MFA) adds an additional layer of protection to your accounts and the data you access by making sure a stolen password is not enough to allow access to data.

Data Loss

Sensitive Data Discovery

The first step in determining the appropriate safeguards for a resource is to identify the sensitivity of data that it stores or handles. To this end, the University Information Security Office (UISO) has begun deploying a sensitive data discovery tool that will aid in inventory of sensitive data.

CIS Logo

System Hardening

Hardening your computer is an important step in the fight to protect university data and information. This process works to eliminate means of attack by identifying vulnerable configurations and turning off unneeded services.


Whole Disk Encryption  

People are turning more and more to portable devices like laptops for their daily work, and physical security measures like locked doors no longer provide as much coverage as they once did. When a device is lost or stolen, the data on it is at risk. 

Challenge the conventional. Create the exceptional. No Limits.