IT Enterprise Applications and Infrastructure Services & Support | Information Services | Kent State University

IT Enterprise Applications and Infrastructure Services & Support

IT Enterprise Applications and Infrastructure Services and Support (EAI) within the Division of Information Services is comprised of several critical areas that support the Kent State's eight campuses and their respective satellite locations. Our customers are students, faculty, and staff at all locations. The scope of our services is broad and covers all technology infrastructure, major enterprise applications, and IT security.

Data Center Operations

Data Center Operations is responsible for monitoring enterprise services and managing the physical enterprise data center locations at Kent State University. In addition, they perform Examination Scoring and Survey analysis for faculty, Banner printer setup and print job management, Production Batch Job Scheduling, and Server Co-Location services.

Director, Johnson Fisher

Enterprise Applications Support

Supports enterprise applications that are used university-wide, including the Banner ERP.  In addition to supporting the applications, this team also provides development services for Banner and the related bolt-on applications.  Also included in their scope is the Cognos reporting environment, the Enterprise Data Warehouse, and Document Imaging.

Senior Project Manager, Barb McClintick

Identity and Access Management

The IAM team is responsible for enabling, developing, and supporting Single Sign On (SSO) solutions at Kent State, as well as developing identity management solutions that enable users to seamlessly access multiple systems using their single Kent State identity.

Manager, Matt Pahls

Infrastructure Engineering

The Infrastructure Engineering Group has responsibility for the design and implementation of critical infrastructure supporting the university’s core enterprise services.  This infrastructure includes servers, storage, and cloud platforms, as well as end user computing devices and accompanying software.  We also provide essential IT services including email and collaboration products, directory services, desktop management and encryption, virtualization and cloud platforms for the university.   Additionally, Infrastructure Engineering provides backup and disaster recovery services that ensure the university’s business functions can quickly return to operation in the event of a disaster.   Many of these services are requestable through the IS Service Catalog, or as customized solutions for specific projects or needs.  Experienced engineers are available to provide professional consultation and recommend solutions that meet most project and budgetary goals.

Director, Todd Ryan

Infrastructure Operations

Responsible for tools and activities that support reliability and availability of infrastructure services. Examples include Enterprise Monitoring (availability and performance), Change Management, and Major Incident Management. The scope of this team also includes the physical Data Center facilities,  both in the main Library and Moulton. The facilities are also responsible for Examination Scoring and Survey analysis, Production Batch Job Scheduling, and Server Co-Location services.

Director, Walt Bainey

Network and Telecom Services

Network and Telecommunication Services is responsible for all of Kent State University's phone and networking needs. They architect, design, implement, and support all networking and telephone architecture use by all university campuses. The scope of this team includes the core and edge networks, wireless infrastructure, cable TV, ISP services, directory services, dial tone, unified messaging, and contact center services.

Manager, Matt Williams

Security and Access Management

Responsible for protecting digital assets across the entire university system. This team is entrusted with ensuring the confidentiality, integrity and availability of all institutional data and digital assets. The scope of this team also includes publishing and maintaining policies and guidelines, and building awareness and best practices that ensure the security of systems and data. Other key functions include recommending secure technologies that enable responsible innovation and growth, and providing continuous monitoring of critical information systems in order to prevent or minimize the severity of breaches.

Manager, Brendan Walsh