Please be aware the software purchasing process can take several weeks. Some requests to purchase software may require the initiation of a Cybersecurity or Information Security Risk Assessment. That team may determine the product does not meet security requirements with how it is developed or reject integration for other reasons.
Products that store medium or high-risk data will typically require the use of multi-factor authentication (MFA)/2-factor authentication (2FA) as required by GCU System Information Security policy.
If you know this software has never been purchased by GCU previously, you might consider sending the questions found on this page, the IT Security questions, to the vendor to respond to. You can send the vendor responses to [email protected].