Managing the flow of incoming calls without the intervention of a live operator
Accepts and routes incoming calls to fixed group of agents
Upgrade your network with a connection to the campus backbone, for high-performance access to UCLA computing resources, the Internet and Internet2.
Unlimited, secure online document storage and collaboration for everyone.
Supplying cable television within a closed-system campus environment
Educating and empowering faculty and staff in understanding, preventing and responding to cyber risks
IT Services offers database administration and support for Microsoft SQL Server, MySQL, Oracle and DB2 on the Mainframe.
Detecting, analyzing, and resolving incidents
Domain Name Services (DNS) allows online resources to be accessed via friendly URLs such as www.ucla.edu.
Send forms to be completed and signed electronically
Protecting the endpoints, email, hard disks, folders, and/or individual files
Identify and patch vulnerabilities across your organization.
The Enterprise Data Warehouse (EDW) is a central repository of institutional data for reporting and analytics.
Providing automatic host auditing and vulnerability management across the campus
Detecting data breaches before they happen
SMTP is a secure, quick and effective means of transmitting email.
Managed Network Services provides all the resources to run your departmental network.
Adding an additional layer of security
UCLA Departments may request a DUO instance for use in securing internal departmental applications which do not use UCLA Logon / Single Sign On (SSO).
IT Services offers network time services to campus via the Network Time Protocol (NTP).
SentinelOne is an advanced anti-malware program which protects against executable and file-less malware/ransomware and more.
LastPass simplifies your online life by remembering your passwords for you.
Finding vulnerabilities an attacker could exploit
Offering a wide range of business telephone services
Security presentations and general security training for campus units and departments
Using automated technology to identify compromised systems
Evenly distributing incoming calls
Personal voice mailbox access 24 hours a day, 7 days a week from any touchtone telephone in the world
Evaluation of IT Infrastructure by safely trying to exploit vulnerabilities
Find tools and services for publishing and managing online content.
Access Streamlined, Simplified