Enhanced our Firewall to Improve the University’s Security Posture

The previous approach to restricting the flow of nefarious traffic was very manual and required that distinct blocking rules be defined. Today, we are leveraging next-generation tools to perform autoblocking, blacklisting of unwanted traffic and application-sensing technologies at the border firewalls.
Associated Group: 
Information Technology
Win Category: 
Organizational Stewardship
Win Image: 
Padlocks in a row and one is red