Archive

Default image

Oct. 10, 2025

Zoom Protected for Health

Zoom rooms purpose-built to meet the security and privacy standards required by HIPAA by safeguarding the protected health information (PHI) shared within Zoom meetings. How to get the software Faculty, Staff, & Researchers Click Here and Log In Using Your MU Username & Password Support Resources Protected Zoom Quick Start Guide Licensing Info Zoom Terms of Service Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data within approved systems, and ensure…

Default image

Oct. 10, 2025

KeePass

KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. How to get the software Faculty, Staff, & Researchers PC Access: Click here to access the Software Center Mac Access: Click here to access the Software Center Support Resources KeePass First Steps Tutorial Licensing Info GNU General Public License Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data…

Default image

Oct. 10, 2025

YubiKey Manager

YubiKey Manager allows users to configure and manage YubiKey settings, including PIN codes, FIDO2 OTP, and PIV functionality, supporting all currently supported YubiKeys. How to get the software Faculty & Staff PC Access: Use this link to download your software.* Mac Access: Use this link to download your software.* *YubiKey Manager requires specialized hardware. Consult with your IT Pro. Support Resources UM System Security Keys Access Licensing Info Yubico Terms & Conditions Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance…

Default image

Oct. 10, 2025

Yubico Authenticator

Yubico Authenticator generates two-step verification codes on mobile or desktop devices, providing hardware-backed security for online accounts through the OATH-TOTP protocol. How to get the software Faculty & Staff PC Access: Use this link to download your software.* Mac Access: Use this link to download your software.* *Yubico Authenticator requires specialized hardware. Consult with your IT Pro. Support Resources UM System Security Keys Access Licensing Info Yubico Terms & Conditions Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant…

Default image

Oct. 10, 2025

Milestone Systems

Milestone Systems offers video management software (VMS) solutions like XProtect, BriefCam, and Arcules, designed to centralize and integrate video surveillance technologies for enhanced security and operational efficiency. How to get the software Faculty & Staff Click Here to Visit Software Requests Support Resources DoIT Security Camera Assistance Licensing Info Milestone Terms of Use Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data within approved systems, and ensure equitable access to…

Default image

Oct. 9, 2025

Milestone X Protect

XProtect is a powerful and scalable video management software (VMS) designed to enhance security and surveillance operations. It integrates seamlessly with a wide range of cameras, sensors, and third-party applications, providing a comprehensive solution for monitoring and managing security systems. How to get the software Faculty & Staff Contact your IT Pro to request access. Support Resources DoIT Security Camera Assistance Licensing Info Milestone Terms of Use Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and…

Default image

Oct. 9, 2025

X Protect (Mac Security)

Apple’s built-in anti-malware solution for macOS. How to get the software Faculty/Staff Default (Mac) Support Resources Protect Against Malware in MacOS Licensing Info Apple Software Licensing Agreement Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data within approved systems, and ensure equitable access to information technology for users with disabilities. Individuals at MU are ultimately responsible for any infringing software on their computers or devices or for violating the terms and…

Default image

Oct. 9, 2025

Cisco Secure Client

Cisco Secure Client is a comprehensive security solution that integrates VPN, endpoint security, and cloud management into a single, unified interface. It offers robust protection and seamless connectivity across various platforms, ensuring secure and efficient remote access for users. How to get the software Faculty/Staff Default Install Support Resources Cisco Secure Client Resources Licensing Info Cisco Software Terms of Sale Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data within approved systems,…

Default image

Oct. 9, 2025

Windows Defender

Windows Defender (now Microsoft Defender Antivirus) is built into Windows 1 and 1, providing real-time protection against viruses, malware, and spyware, leveraging machine learning and cloud-based intelligence. How to get the software Faculty/Staff Installed on all DoIT PCs Support Resources Windows Defender Training Licensing Info Microsoft Defender License Terms Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data within approved systems, and ensure equitable access to information technology for users with…

Default image

Oct. 8, 2025

Adobe Acrobat Sign

A cloud-based e-signature service that allows users to send, track, and manage signature processes electronically, replacing paper and ink signatures with automated workflows. How to get the software Faculty/Staff Click here to Request Adobe Acrobat Sign Support Resources TDX form- Get Assistance Licensing Info Adobe Terms of Use Adobe Acrobat Sign Terms of Use Your Responsibility It is the user’s responsibility to protect university resources and data by ensuring that you use software in compliance with relevant university policies and standards, store and process all sensitive data within approved systems, and ensure equitable…