Students gathered around a laptop

Secure Your Devices

UCr Gold Line

Download the UC-Mandated Security Toolset

Faculty and staff who manage their own devices are required to manually download the security toolset to install it on any device they use to connect to secure UCR networks and cloud resources. In-person IT support is available Monday through Friday, 8:30am to 4:30pm, at the IT Support Services stations located at the Tomás Rivera Library, Orbach Science Library, and Student Success Center.

Join us for Office Hours

Faculty, staff, and interested students are welcome to join the ITS office hours to chat through their questions or concerns around the UC Cybersecurity Mandate, particularly the UCR-mandated security tools. ITS will also provide support to those requesting assistance with installation of the security toolset.

Join the ITS Office Hour on the following dates:

UCr Gold Line

It's Easy to Ensure Compliance with Secured Device Services (SDS) 

SDS ensures that your department meets compliance by providing vulnerability monitoring and remediation, virus protection, and asset management. As part of UCR's security investment roadmap, campus leadership has called on all units to move to SDS to improve the university's security posture. In the meantime, it is required that faculty and staff who manage their own devices install and use the security toolset.

UCr Gold Line

UC-Mandated Tools to Access Secure Campus Resources

UCR has identified three industry-standard security tools known for their effectiveness in helping organizations identify and manage vulnerabilities, mitigate risks, and respond swiftly to events by monitoring systems for signs of cyber threats, as well as keep track of vital data. The UCR security toolset provides even more robust security services for university-managed devices, such as delivering automatic updates and maintaining the health of the devices.

As part of UCR's plan to meet the new UC Cybersecurity Mandate, our campus policy now requires that the three applications in the UCR security toolset be installed and run on all devices that connect to secure UCR networks and cloud resources. All devices must be in compliance by May 28, 2025.   

Security Outcomes Addressed by These Tools

“Identify, track, and manage vulnerabilities of all devices that connect to campus resources.”

“Deploy UC-approved Endpoint Detection and Recovery (EDR) software on 100% of assets.”

UCr Gold Line

​Tools to Protect Your Work and Preserve Your Legacy 

Imagine our collective University data – research findings, financial records, sensitive personal information – as priceless works of art and historical artifacts housed within the Smithsonian. This vast collection represents the heart and soul of our institution, a treasure trove of knowledge, innovation, and individual contributions to our shared legacy.

Much like the Smithsonian’s sprawling complex of museums, UCR’s colleges, schools, departments, and administrative units house important artifacts that require preservation and protection from theft, damage, and unauthorized access. To protect these invaluable assets, a multi-layered approach is employed. View the cards below to explore this approach:

A shield with a lock inside.
"We want to emphasize that our commitment to protecting your research data and personal information is unwavering. The cybersecurity program is designed to safeguard sensitive data from unauthorized access, theft, and misuse, not invade privacy.”

William Kidder
Campus Privacy Officer

Dewight Kramer
Chief Information Security Officer

UCr Gold Line

Frequently Asked Questions

UCr Gold Line

Learn About UCR's Response to the UC Cybersecurity Mandate

Let us help you with your search