1 / 21

ContentKeeper for K-12 Education

ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.

cleave
Télécharger la présentation

ContentKeeper for K-12 Education

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ContentKeeperfor K-12 Education Solution Overview Presented by Date

  2. Agenda • Next-Gen Learning Requirements • Why ContentKeeperfor K-12 Education • Advantages of the Architecture • Proven Scalability • Feature Benefits • Closed Loop Collaborative Filtering™ • Demo/Questions

  3. ContentKeeper Overview • Corporate Headquarters: Canberra Australia • Founded in 1999 • Customers: Over 1000 global customers and more than 4.5 million users • 80% Australian Federal business • Majority of Australian Education business • Employees: 50+ worldwide • 6 International Offices • Solutions: • Web Productivity & Security Solutions • Summary and Detailed Reporting • Proactive Malware Detection • Market Recognition: • Gartner SWG Magic Quadrant recognition since 2008 • Focus: Developing high speed, scalable, fault tolerant, technologically advanced solutions for large education, government and private organizations

  4. Next-Gen Learning Requirements

  5. Next-Gen Requirements • CIPA Compliance • Support Social Learning • Granular Social Media Controls • YouTube for Schools • Enable Mobility for all Devices • BYOD and 1:1 deployments • SSL Decoding & Content Scanning • Smarter Balance/Online Assessment • Proactive vs. Reactive Malware Detection

  6. Why ContentKeeperfor K-12 Education

  7. Architecture • Physical Layer 2 Ethernet Bridge • Highly Secure • Highly Scalable • Highly Available • IPv6 Support • Highly Flexible: Start with filtering, extend as desired • All traffic coming to and from the Internet Internal NetworkPlugs in here Internet Plugs in here Management Port Plugs in here (The only IP Address)

  8. Proven Scalability • Scales beyond 10Gbit/s • Australian Statewide Education deployment • 550,000 endpoints • Scalability depends on implemented policy • Up to 60,000 users p/box • Virginia Beach School District • 60,000 endpoints

  9. Features & Benefits Overview • Layer 2 Ethernet bridge • CIPA Compliance • Granular Social Media Controls • BYOD Web Access Controls for all Devices • 1:1 Support for Windows, iOS/OS X & Android • Full SSL Session Decoding & Inspection • Elimination of Proxy Anonymizer issues • DLP/Content Scanning • Advanced Proactive Malware Engines • Delegated Administration & Reporting

  10. Granular Social Media Controls • Set Granular Policies by User on Specific Web 2.0/Social Media Application Activities • Setup a policy for each required control group • Assign level 1 & level 2 policies as required • Enable/Disable, Read-only, Time-of-Day • Admin Over-ride, Block, Don’t Log Level 2 Controls - Facebook YouTube for Schools Support Level 1 Controls (Partial list)

  11. BYOD – Web Access Controls Who are they? Authentication What are they doing on your network? No Client side software allowed! All devices iPad/iPhone, Android Windows, etc. Monitor, Manage, Control & Secure

  12. BYOD – Accountability & Reporting

  13. Enable Mobility • 1:1 Initiatives/Mobile Users • Enforce policy to mobile users when they are away from your network: 3G, Wi-Fi, Bluetooth… • Windows, iOS/OS X & Android

  14. Full SSL / HTTPS Decoding & Filtering

  15. Why Malware is an Issue Malware attacks come from the Web Vector 92% Increasingly Dynamic Attacks Increasingly Targeted Attacks last less than 24 hours 54% On Legitimate Websites Companies hit by targeted attacks 45% Malware comes from legitimate sites It’s not a matter of if, it’s a matter of when… 83% Source: M86 Security; Panda; Osterman Research; CSI Study 72% Organizations hit by Web attacks Result:

  16. Malware Attacks: Education Beware! • Education #1 vertical for malware attacks • February, 2013, SC Magazine Report • 182% above median vertical malware encounter rate • Why? • Signature based Anti-Virus is largely ineffective against today’s Web threats • Students push boundaries: • Heavy users of malware targeted websites like social networking • Poor password security • Common to click on / share anything without levels of care or awareness compared to workers in other industries • Problems with proxy avoidance (anonymous proxies) bypass rules and protections – exposes network to threats

  17. Multi-Layered Advanced Threat Protection

  18. Proactive Malware Defense Technologies • Behavioral Analysis Engine (BAE) • Browser object analysis • Detects and analyzes obfuscated code • Cloud Sandboxing (CSB) • Full Windows sandboxing for all other files • Full forensic reporting • Additional tools provided such as console drag & drop for local files & URL links • Threat isolation CK-Console Based Tool

  19. Closed Loop Collaborative Filtering™ • Automatic Global collection with hourly URL & real-time (malware protection) updates • Automatic discovery of new sites & new threats • Social Media/Web 2.0 control set/UI updates • Automatic local & cloud based analysis • Automatic Categorization & threat rating • Automatic Data Center Validation • Automatic Distribution • Automatic Re-Categorization • Stringent, Automatic & manual Quality Control Globally meshed, fully automated, 24x7 operation Over 4million users participating

  20. Demo/Questions?

  21. Reporting Overview • The Advanced Reporting Module allows you to drill down and get detailed information on Internet use and share those reports with who you need to…

More Related