<node id="640215">
  <nid>640215</nid>
  <type>news</type>
  <uid>
    <user id="34822"><![CDATA[34822]]></user>
  </uid>
  <created>1602708094</created>
  <changed>1602760700</changed>
  <title><![CDATA[Phase 2 of Endpoint Compliance Campaign Underway]]></title>
  <body><![CDATA[<p>Georgia Tech wrapped up Phase 1 of the Endpoint Management &amp; Protection Compliance Campaign in late July. Phase 2 of the campaign is now underway and&nbsp;requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.</p>

<p>Pursuant to&nbsp;<a href="https://www.usg.edu/information_technology_services/assets/information_technology_services/documents/2020_IT_Handbook.pdf">University System of Georgia (USG) policy, Section 5.8 (page 66)</a>, all USG organizations must implement endpoint security by &quot;deploying&nbsp;tools that add a layer of security to devices&nbsp;connecting to&nbsp;networks that may otherwise make them vulnerable to cyber attacks.&quot;&nbsp;Georgia Tech&#39;s Endpoint Management &amp; Protection Program&nbsp;ensures secure management of all Institute-owned endpoint devices, including desktops, laptops, tablets, and mobile phones.&nbsp;In early 2020, President Cabrera requested that campus leadership work&nbsp;with their respective teams to ensure full attention and participation in the endpoint compliance effort&nbsp;and other efforts&nbsp;related to data security and protection.</p>

<h4>Benefits of Endpoint Management &amp; Protection</h4>

<ul>
	<li>Protection against cyber threats</li>
	<li>Simple self service installation and updating of GT-licensed software</li>
	<li>Centralized&nbsp;process for applying patches and making updates</li>
	<li>Compliance with university system policy</li>
	<li>Faster, and sometimes automated, issue resolution</li>
</ul>

<p>The knowledge article, <a href="https://gatech.service-now.com/home?id=kb_article_view&amp;sysparm_article=KB0023477" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://gatech.service-now.com/home?id=kb_article_view&amp;sysparm_article=kb0023477">How to Meet Endpoint Management Compliance for Endpoints</a>, shares additional information and resources regarding the compliance campaign as well as resources for installing the appropriate endpoint tools. <em>Please note that you must be logged into <a href="https://services.gatech.edu/" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://services.gatech.edu/">Services.gatech.edu</a> to view the knowledge article.</em></p>

<p>Additional information regarding the campaign is shared at&nbsp;<a href="https://oit.gatech.edu/endpointcompliance">https://oit.gatech.edu/endpointcompliance</a>.&nbsp;</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2020-10-14T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[ Phase 2 of the campaign is now underway and requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Georgia Tech wrapped up Phase 1 of the Endpoint Management &amp; Protection Compliance Campaign in late July. Phase 2 of the campaign is now underway and&nbsp;requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.</p>
]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="626044">
            <nid>626044</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity stock image]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>238338</fid>
                  <filename><![CDATA[Cybersecurity_stock_image.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Cybersecurity_stock_image.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Cybersecurity_stock_image.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Stock photo of stylized padlock icons surrounded by a word cloud of information security terms.]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>174291</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>174291</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[OIT]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>183656</tid>
        <value><![CDATA[oit feature]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
