{"640215":{"#nid":"640215","#data":{"type":"news","title":"Phase 2 of Endpoint Compliance Campaign Underway","body":[{"value":"\u003Cp\u003EGeorgia Tech wrapped up Phase 1 of the Endpoint Management \u0026amp; Protection Compliance Campaign in late July. Phase 2 of the campaign is now underway and\u0026nbsp;requires full compliance of all GT-owned off-campus and on-campus\/on-network devices by December 18, 2020.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EPursuant to\u0026nbsp;\u003Ca href=\u0022https:\/\/www.usg.edu\/information_technology_services\/assets\/information_technology_services\/documents\/2020_IT_Handbook.pdf\u0022\u003EUniversity System of Georgia (USG) policy, Section 5.8 (page 66)\u003C\/a\u003E, all USG organizations must implement endpoint security by \u0026quot;deploying\u0026nbsp;tools that add a layer of security to devices\u0026nbsp;connecting to\u0026nbsp;networks that may otherwise make them vulnerable to cyber attacks.\u0026quot;\u0026nbsp;Georgia Tech\u0026#39;s Endpoint Management \u0026amp; Protection Program\u0026nbsp;ensures secure management of all Institute-owned endpoint devices, including desktops, laptops, tablets, and mobile phones.\u0026nbsp;In early 2020, President Cabrera requested that campus leadership work\u0026nbsp;with their respective teams to ensure full attention and participation in the endpoint compliance effort\u0026nbsp;and other efforts\u0026nbsp;related to data security and protection.\u003C\/p\u003E\r\n\r\n\u003Ch4\u003EBenefits of Endpoint Management \u0026amp; Protection\u003C\/h4\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003EProtection against cyber threats\u003C\/li\u003E\r\n\t\u003Cli\u003ESimple self service installation and updating of GT-licensed software\u003C\/li\u003E\r\n\t\u003Cli\u003ECentralized\u0026nbsp;process for applying patches and making updates\u003C\/li\u003E\r\n\t\u003Cli\u003ECompliance with university system policy\u003C\/li\u003E\r\n\t\u003Cli\u003EFaster, and sometimes automated, issue resolution\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003EThe knowledge article, \u003Ca href=\u0022https:\/\/gatech.service-now.com\/home?id=kb_article_view\u0026amp;sysparm_article=KB0023477\u0022 rel=\u0022noreferrer noopener\u0022 tabindex=\u0022-1\u0022 target=\u0022_blank\u0022 title=\u0022https:\/\/gatech.service-now.com\/home?id=kb_article_view\u0026amp;sysparm_article=kb0023477\u0022\u003EHow to Meet Endpoint Management Compliance for Endpoints\u003C\/a\u003E, shares additional information and resources regarding the compliance campaign as well as resources for installing the appropriate endpoint tools. \u003Cem\u003EPlease note that you must be logged into \u003Ca href=\u0022https:\/\/services.gatech.edu\/\u0022 rel=\u0022noreferrer noopener\u0022 tabindex=\u0022-1\u0022 target=\u0022_blank\u0022 title=\u0022https:\/\/services.gatech.edu\/\u0022\u003EServices.gatech.edu\u003C\/a\u003E to view the knowledge article.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAdditional information regarding the campaign is shared at\u0026nbsp;\u003Ca href=\u0022https:\/\/oit.gatech.edu\/endpointcompliance\u0022\u003Ehttps:\/\/oit.gatech.edu\/endpointcompliance\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech wrapped up Phase 1 of the Endpoint Management \u0026amp; Protection Compliance Campaign in late July. Phase 2 of the campaign is now underway and\u0026nbsp;requires full compliance of all GT-owned off-campus and on-campus\/on-network devices by December 18, 2020.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":" Phase 2 of the campaign is now underway and\u00a0requires full compliance of all GT-owned off-campus and on-campus\/on-network devices by December 18, 2020."}],"uid":"34822","created_gmt":"2020-10-14 20:41:34","changed_gmt":"2020-10-15 11:18:20","author":"Malynda Dorsey","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2020-10-14T00:00:00-04:00","iso_date":"2020-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"626044":{"id":"626044","type":"image","title":"Cybersecurity stock image","body":null,"created":"1568223064","gmt_created":"2019-09-11 17:31:04","changed":"1568223064","gmt_changed":"2019-09-11 17:31:04","alt":"Stock photo of stylized padlock icons surrounded by a word cloud of information security terms.","file":{"fid":"238338","name":"Cybersecurity_stock_image.jpg","image_path":"\/sites\/default\/files\/images\/Cybersecurity_stock_image.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Cybersecurity_stock_image.jpg","mime":"image\/jpeg","size":110089,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Cybersecurity_stock_image.jpg?itok=scq0OgsD"}}},"media_ids":["626044"],"groups":[{"id":"174291","name":"OIT"}],"categories":[],"keywords":[{"id":"183656","name":"oit feature"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}