ContentKeeper for K-12 Education - PowerPoint PPT Presentation

Contentkeeper for k 12 education
1 / 21

  • Uploaded on
  • Presentation posted in: General

ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentation

ContentKeeper for K-12 Education

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Contentkeeper for k 12 education

ContentKeeperfor K-12 Education

Solution Overview

Presented by




  • Next-Gen Learning Requirements

  • Why ContentKeeperfor K-12 Education

    • Advantages of the Architecture

    • Proven Scalability

    • Feature Benefits

    • Closed Loop Collaborative Filtering™

  • Demo/Questions

Contentkeeper overview

ContentKeeper Overview

  • Corporate Headquarters: Canberra Australia

    • Founded in 1999

    • Customers: Over 1000 global customers and more than 4.5 million users

      • 80% Australian Federal business

      • Majority of Australian Education business

    • Employees: 50+ worldwide

    • 6 International Offices

  • Solutions:

    • Web Productivity & Security Solutions

    • Summary and Detailed Reporting

    • Proactive Malware Detection

  • Market Recognition:

    • Gartner SWG Magic Quadrant recognition since 2008

  • Focus: Developing high speed, scalable, fault tolerant, technologically advanced solutions for large education, government and private organizations

Next gen learning requirements

Next-Gen Learning Requirements

Next gen requirements

Next-Gen Requirements

  • CIPA Compliance

  • Support Social Learning

    • Granular Social Media Controls

    • YouTube for Schools

  • Enable Mobility for all Devices

    • BYOD and 1:1 deployments

  • SSL Decoding & Content Scanning

  • Smarter Balance/Online Assessment

  • Proactive vs. Reactive Malware Detection

Why contentkeeper for k 12 education

Why ContentKeeperfor K-12 Education



  • Physical Layer 2 Ethernet Bridge

    • Highly Secure

    • Highly Scalable

    • Highly Available

    • IPv6 Support

    • Highly Flexible: Start with filtering, extend as desired

    • All traffic coming to and from the Internet

Internal NetworkPlugs in here

Internet Plugs in here

Management Port Plugs in here

(The only IP Address)

Proven scalability

Proven Scalability

  • Scales beyond 10Gbit/s

  • Australian Statewide Education deployment

    • 550,000 endpoints

  • Scalability depends on implemented policy

    • Up to 60,000 users p/box

  • Virginia Beach School District

    • 60,000 endpoints

Features benefits overview

Features & Benefits Overview

  • Layer 2 Ethernet bridge

  • CIPA Compliance

  • Granular Social Media Controls

  • BYOD Web Access Controls for all Devices

  • 1:1 Support for Windows, iOS/OS X & Android

  • Full SSL Session Decoding & Inspection

  • Elimination of Proxy Anonymizer issues

  • DLP/Content Scanning

  • Advanced Proactive Malware Engines

  • Delegated Administration & Reporting

Granular social media controls

Granular Social Media Controls

  • Set Granular Policies by User on Specific Web 2.0/Social Media Application Activities

    • Setup a policy for each required control group

    • Assign level 1 & level 2 policies as required

      • Enable/Disable, Read-only, Time-of-Day

      • Admin Over-ride, Block, Don’t Log

Level 2 Controls - Facebook

YouTube for Schools Support

Level 1 Controls (Partial list)

Byod web access controls

BYOD – Web Access Controls

Who are they? Authentication

What are they doing on your network?

No Client side software allowed!

All devices iPad/iPhone, Android Windows, etc.

Monitor, Manage, Control & Secure

Byod accountability reporting

BYOD – Accountability & Reporting

Enable mobility

Enable Mobility

  • 1:1 Initiatives/Mobile Users

    • Enforce policy to mobile users when they are away from your network: 3G, Wi-Fi, Bluetooth…

    • Windows, iOS/OS X & Android

Full ssl https decoding filtering

Full SSL / HTTPS Decoding & Filtering

Why malware is an issue

Why Malware is an Issue

Malware attacks come from the Web Vector


Increasingly Dynamic


Increasingly Targeted

Attacks last less than 24 hours


On Legitimate Websites

Companies hit by targeted attacks


Malware comes from legitimate sites

It’s not a matter of if, it’s a matter of when…


Source: M86 Security; Panda; Osterman Research; CSI Study


Organizations hit by Web attacks


Malware attacks education beware

Malware Attacks: Education Beware!

  • Education #1 vertical for malware attacks

    • February, 2013, SC Magazine Report

    • 182% above median vertical malware encounter rate

  • Why?

    • Signature based Anti-Virus is largely ineffective against today’s Web threats

    • Students push boundaries:

      • Heavy users of malware targeted websites like social networking

      • Poor password security

      • Common to click on / share anything without levels of care or awareness compared to workers in other industries

    • Problems with proxy avoidance (anonymous proxies) bypass rules and protections – exposes network to threats

Multi layered advanced threat protection

Multi-Layered Advanced Threat Protection

Proactive malware defense technologies

Proactive Malware Defense Technologies

  • Behavioral Analysis Engine (BAE)

    • Browser object analysis

    • Detects and analyzes obfuscated code

  • Cloud Sandboxing (CSB)

    • Full Windows sandboxing for all other files

  • Full forensic reporting

  • Additional tools provided such as console drag & drop for local files & URL links

  • Threat isolation

CK-Console Based Tool

Closed loop collaborative filtering

Closed Loop Collaborative Filtering™

  • Automatic Global collection with hourly URL & real-time (malware protection) updates

  • Automatic discovery of new sites & new threats

  • Social Media/Web 2.0 control set/UI updates

  • Automatic local & cloud based analysis

  • Automatic Categorization & threat rating

  • Automatic Data Center Validation

  • Automatic Distribution

  • Automatic Re-Categorization

  • Stringent, Automatic & manual Quality Control

Globally meshed, fully automated, 24x7 operation

Over 4million users participating

Demo questions


Reporting overview

Reporting Overview

  • The Advanced Reporting Module allows you to drill down and get detailed information on Internet use and share those reports with who you need to…

  • Login