How the University of Tennessee secured 40 departments by removing admin rights
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A case study on reducing privileged access risk and improving compliance in a complex university environment.
Higher education IT teams often manage large, decentralized environments with limited staff and increasing security and compliance pressure.
At the University of Tennessee, a six-person IT governance and compliance team supports six campuses, two statewide institutes, and dozens of departments. Like many institutions, broad local administrator access was once the norm, creating challenges around risk, audits, and operational efficiency.
This case study explores how the team addressed privileged access at scale without disrupting users or overwhelming IT.
What You’ll Learn:
- Why standing admin rights created security and audit challenges
- How a small IT team approached privileged access control
- What improved visibility revealed about software and access usage
- The operational and compliance outcomes achieved
Download the full case study to learn how a higher-ed IT team strengthened access control while keeping users productive.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Does your business need cyber insurance?In-depth As the cyber insurance market matures, do firms actually need it and if so, how should they choose a policy?
-
Geekom A5 Pro reviewReviews It's not a mini PC for power users or intense graphics work, but as a productivity machine or media server, it will do very nicely
-
No Room for Error: Navigating The 2026 Threat Landscapewhitepaper
-
App Modernization Best Practices in a Serverless Worldwhitepaper
-
Whiteboarding Zero Trust: Advice and lessons from Swiss Post’s security transformationwhitepaper
-
Déjouez les cybermenaces et enchantez vos invités: sécurisez les réseaux Wi-Fi grâce à Cloudflarewhitepaper
-
Detect and protect data, accounts, and operations in your APIs hosted anywherewhitepaper
-
The New Arms Race: The Rise of Bots in an AI Worldwhitepaper
-
Cyberbedrohungen stoppen, Gäste begeistern: WLAN-Netzwerke sicher gestalten mit Cloudflarewhitepaper
-
The Ripple Effect: A Hallmark of Resilient Cybersecuritywhitepaper
