Enhanced our Firewall to Improve the University’s Security Posture

The previous approach to restricting the flow of nefarious traffic was very manual and required that distinct blocking rules be defined. Today, we are leveraging next-generation tools to perform autoblocking, blacklisting of unwanted traffic and application-sensing technologies at the border firewalls.

Win Category
Organizational Stewardship
Win Image
Image
Padlocks in a row and one is red