A university IT team used ALICE to gain complete visibility across thousands of student and staff devices — identifying vulnerable, outdated, and non-compliant applications at scale, and enabling targeted remediation without manual auditing.
University IT environments are notoriously complex. Large numbers of devices, a mix of managed and unmanaged endpoints, high user turnover, and a culture of self-managed software create an estate that’s difficult to govern and even harder to secure.
The university’s IT team knew they had vulnerabilities in their application estate — but without a reliable, automated way to discover and map them, prioritising remediation was almost impossible. Manual audits were too slow and too incomplete to be actionable.
The team needed a way to see their full application exposure across every device — quickly, accurately, and without significant manual effort.
ALICE was connected to the university’s Microsoft environment and immediately began discovering every application across the estate. The team gained a complete, device-level view of installed software — including applications that had never appeared in any previous audit.
Using ALICE’s vulnerability intelligence capabilities, the team was able to:

Achieved across the entire device estate without manual effort

At device and user level enabled prioritised, targeted remediation

Surfaced and remediated across previously unaudited parts of the estate

Put in place to maintain security posture going forward