contentkeeper for k 12 education
Download
Skip this Video
Download Presentation
ContentKeeper for K-12 Education

Loading in 2 Seconds...

play fullscreen
1 / 21

ContentKeeper for K-12 Education - PowerPoint PPT Presentation


  • 67 Views
  • Uploaded on

ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' ContentKeeper for K-12 Education' - cleave


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
contentkeeper for k 12 education

ContentKeeperfor K-12 Education

Solution Overview

Presented by

Date

agenda
Agenda
  • Next-Gen Learning Requirements
  • Why ContentKeeperfor K-12 Education
    • Advantages of the Architecture
    • Proven Scalability
    • Feature Benefits
    • Closed Loop Collaborative Filtering™
  • Demo/Questions
contentkeeper overview
ContentKeeper Overview
  • Corporate Headquarters: Canberra Australia
    • Founded in 1999
    • Customers: Over 1000 global customers and more than 4.5 million users
      • 80% Australian Federal business
      • Majority of Australian Education business
    • Employees: 50+ worldwide
    • 6 International Offices
  • Solutions:
    • Web Productivity & Security Solutions
    • Summary and Detailed Reporting
    • Proactive Malware Detection
  • Market Recognition:
    • Gartner SWG Magic Quadrant recognition since 2008
  • Focus: Developing high speed, scalable, fault tolerant, technologically advanced solutions for large education, government and private organizations
next gen requirements
Next-Gen Requirements
  • CIPA Compliance
  • Support Social Learning
    • Granular Social Media Controls
    • YouTube for Schools
  • Enable Mobility for all Devices
    • BYOD and 1:1 deployments
  • SSL Decoding & Content Scanning
  • Smarter Balance/Online Assessment
  • Proactive vs. Reactive Malware Detection
architecture
Architecture
  • Physical Layer 2 Ethernet Bridge
    • Highly Secure
    • Highly Scalable
    • Highly Available
    • IPv6 Support
    • Highly Flexible: Start with filtering, extend as desired
    • All traffic coming to and from the Internet

Internal NetworkPlugs in here

Internet Plugs in here

Management Port Plugs in here

(The only IP Address)

proven scalability
Proven Scalability
  • Scales beyond 10Gbit/s
  • Australian Statewide Education deployment
    • 550,000 endpoints
  • Scalability depends on implemented policy
    • Up to 60,000 users p/box
  • Virginia Beach School District
    • 60,000 endpoints
features benefits overview
Features & Benefits Overview
  • Layer 2 Ethernet bridge
  • CIPA Compliance
  • Granular Social Media Controls
  • BYOD Web Access Controls for all Devices
  • 1:1 Support for Windows, iOS/OS X & Android
  • Full SSL Session Decoding & Inspection
  • Elimination of Proxy Anonymizer issues
  • DLP/Content Scanning
  • Advanced Proactive Malware Engines
  • Delegated Administration & Reporting
granular social media controls
Granular Social Media Controls
  • Set Granular Policies by User on Specific Web 2.0/Social Media Application Activities
    • Setup a policy for each required control group
    • Assign level 1 & level 2 policies as required
      • Enable/Disable, Read-only, Time-of-Day
      • Admin Over-ride, Block, Don’t Log

Level 2 Controls - Facebook

YouTube for Schools Support

Level 1 Controls (Partial list)

byod web access controls
BYOD – Web Access Controls

Who are they? Authentication

What are they doing on your network?

No Client side software allowed!

All devices iPad/iPhone, Android Windows, etc.

Monitor, Manage, Control & Secure

enable mobility
Enable Mobility
  • 1:1 Initiatives/Mobile Users
    • Enforce policy to mobile users when they are away from your network: 3G, Wi-Fi, Bluetooth…
    • Windows, iOS/OS X & Android
why malware is an issue
Why Malware is an Issue

Malware attacks come from the Web Vector

92%

Increasingly Dynamic

Attacks

Increasingly Targeted

Attacks last less than 24 hours

54%

On Legitimate Websites

Companies hit by targeted attacks

45%

Malware comes from legitimate sites

It’s not a matter of if, it’s a matter of when…

83%

Source: M86 Security; Panda; Osterman Research; CSI Study

72%

Organizations hit by Web attacks

Result:

malware attacks education beware
Malware Attacks: Education Beware!
  • Education #1 vertical for malware attacks
    • February, 2013, SC Magazine Report
    • 182% above median vertical malware encounter rate
  • Why?
    • Signature based Anti-Virus is largely ineffective against today’s Web threats
    • Students push boundaries:
      • Heavy users of malware targeted websites like social networking
      • Poor password security
      • Common to click on / share anything without levels of care or awareness compared to workers in other industries
    • Problems with proxy avoidance (anonymous proxies) bypass rules and protections – exposes network to threats
proactive malware defense technologies
Proactive Malware Defense Technologies
  • Behavioral Analysis Engine (BAE)
    • Browser object analysis
    • Detects and analyzes obfuscated code
  • Cloud Sandboxing (CSB)
    • Full Windows sandboxing for all other files
  • Full forensic reporting
  • Additional tools provided such as console drag & drop for local files & URL links
  • Threat isolation

CK-Console Based Tool

closed loop collaborative filtering
Closed Loop Collaborative Filtering™
  • Automatic Global collection with hourly URL & real-time (malware protection) updates
  • Automatic discovery of new sites & new threats
  • Social Media/Web 2.0 control set/UI updates
  • Automatic local & cloud based analysis
  • Automatic Categorization & threat rating
  • Automatic Data Center Validation
  • Automatic Distribution
  • Automatic Re-Categorization
  • Stringent, Automatic & manual Quality Control

Globally meshed, fully automated, 24x7 operation

Over 4million users participating

reporting overview
Reporting Overview
  • The Advanced Reporting Module allows you to drill down and get detailed information on Internet use and share those reports with who you need to…
ad