ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.
Internal NetworkPlugs in here
Internet Plugs in here
Management Port Plugs in here
(The only IP Address)
Level 2 Controls - Facebook
YouTube for Schools Support
Level 1 Controls (Partial list)
Who are they? Authentication
What are they doing on your network?
No Client side software allowed!
All devices iPad/iPhone, Android Windows, etc.
Monitor, Manage, Control & Secure
Malware attacks come from the Web Vector
Attacks last less than 24 hours
On Legitimate Websites
Companies hit by targeted attacks
Malware comes from legitimate sites
It’s not a matter of if, it’s a matter of when…
Source: M86 Security; Panda; Osterman Research; CSI Study
Organizations hit by Web attacks
CK-Console Based Tool
Globally meshed, fully automated, 24x7 operation
Over 4million users participating