210 likes | 225 Vues
Explore current trends impacting K-12 education, such as constrained budgets and increasing internet use, and discover how to ensure information security while empowering teachers, engaging parents, and meeting educational standards.
E N D
Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08
Current Trends That ImpactOur Conversation • Constrained budgets • Increasing use of Internet • Parent communications • Online assignment/announcementboards • Curriculum delivery • School and district Web sites w/ links • Increased need/adoption of high-speed connections • Support for student computer labs/usage • Increased regulation of electronic information-handling
The Net Net High-speed Internet usage has becomea “given”among students andtheir families. But there’s no give in the system…
Serving Multiple Constituencies • Helping students excel with best infrastructure possible • Empowering teachersto do their best work • Meeting mandatedachievement standards • Doing everything possibleto engage parents • Operating inside budget • Satisfying regulatory requirements for information safety
More Reliance on The Internet • School e-mail to communicate withparents and students • Delivery of curriculum videosor structured tutorials • Inter-connection of campusesvia VPN • Increasing reliance onsupport services delivered by third-parties • Hosted assignment and activity boards • School Web sites as transactional environments • Fundraising and scheduling
Countering the Cost of IT • Protecting the systems you have • Preventing hacking/intrusions • Blocking viruses and other malware • Preventing bandwidth “piracy” forwired and wireless networks • Maximizing return on your investmentin new systems • Getting full value of your high-speed connections • Guarding against the liabilities of misuse or shortfall vs. regulations • Securing personal information • Assuring smooth, successful audits for regulatory compliance
IT Challenges • Resources – tight budgets…doing more with less • Compliance – satisfying the letterand spirit of information protectionregulations • Management – dealing with disparate systems, a “perimeterless” organization and the ability to scale
Information Security Considerations • Intrusion prevention and detectionfor wired and wireless networks • Content filtering to preventunacceptable Internet usage • Anti-virus and anti-malware • Backup and recovery;file retention and protection • Minimal latency to assure full use of available bandwidth • Centralized security management and reporting to assure regulatory compliance and completeness of audits
Information Security Considerations • Clever student hackers • Make sport of beating the system • Trying to hijack school systems forpersonal use • Peer-to-peer file sharing;networked gaming; etc. • May try to alter or destroy schoolrecords; vandalize school Web site • Inadvertent or deliberate access tounacceptable online content • General purpose threats: viruses; spyware; spam; phishing
An Integrated, Layered Approach Comprehensive security addresses all your needs and enables rapid response to new opportunities Auditing Reporting Enforced Protection Centralized Management Content Filtering Intrusion Prevention Anti-virus Firewalls Backup Connectivity Distributed Wireless Virtual Private Networking (VPN)
Expanded Network Security Requirements As threats move up, network safeguard requirements increase Threats Move to Application Layer Protection/Performance Increases 2008? Multi-tiered High-Speed Protection Unknown/Malicious Application Traffic 2007 Application Layer Access Controls Growth in Real-time Traffic File & Content Inspection 2005 More-Evasive Attacks Application Layer Support Protection Requirements Network Borne AVThreats Deep Packet Inspection & IPS 2003 DoS, High Speed Worms Stateful inspection Source: Gartner
Application Layer Filtering • Does more than just watch/block ports • More robust security with easiermanagement and better user experience • Prevents access to proxy-basedapplications (YouTube, etc.) • Can be dialed-down to producepainfully slow access • Frustrated users blame connectionand don’t try work-arounds • SonicWALL NSA Series delivers highest throughput in the industry; minimal latency • Maximizes value of your high-speed connection • Reduces/eliminates the need for increased bandwidth
SonicWALL Today • Market Leader: Secure Networking, Secure Content Management and Business Continuity • Technology:Rich portfolio of innovative and interoperable solutions that outperform others in their range and that are easy to install, use and manage • Support: Significant investment in support to in-source and improve technical competency. Great attention to customer satisfaction, first day resolution and response time Our industry footprint has expanded to anticipate the changing market requirements
Industry Recognition SSL VPN Best in Class
Strong Compliance Support Policy and Management Enforcement • Centralized Management (Encrypted and Authenticated) • Strong Access Control (Read, Write, etc.) • Comprehensive Audit Trails (Monitoring, Reporting, Logging) • Dynamic Vulnerability Management (UTM Subscriptions) FISMA E-Rate CIPA NCLB
SonicWALL Solutions Provide • Application-layer perimeter security, inc. wireless access • Control of third-party points of access • Service providers • Contractors • Content filtering • Control of “casual contact” like email communications and outbound Web access • Data backup and recovery • Centralized security management and reporting to assure regulatory compliance
Basic Secure Network:Distributed Multi-Campus Staff Admin UTM UTM SSL VPN CDP CDP Secure Wireless DISTRICT Service Providers Home Users/ Parents SecureWireless Network Mgt. Mobile Staff Student / Guest Campus
Biblionet Groningen DePaul University Goucher College Kansas City, Missouri School District Rush Croft Sports College South Dakota School District Southwestern Law School SonicWALL Education ReferenceCustomers
Summary • The quality of your programs is increasingly tied to your Internet-based activities • Your high-speed Internet connection is a precious asset • Misuse of your connection leaves you vulnerable to liability and threatens your programs and your budget • SonicWALL has proven network security solutionsthat can do the most for your budget andyour high-speed Internet connection