Contentkeeper for k 12 education
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

ContentKeeper for K-12 Education PowerPoint PPT Presentation


  • 51 Views
  • Uploaded on
  • Presentation posted in: General

ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.

Download Presentation

ContentKeeper for K-12 Education

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Contentkeeper for k 12 education

ContentKeeperfor K-12 Education

Solution Overview

Presented by

Date


Agenda

Agenda

  • Next-Gen Learning Requirements

  • Why ContentKeeperfor K-12 Education

    • Advantages of the Architecture

    • Proven Scalability

    • Feature Benefits

    • Closed Loop Collaborative Filtering™

  • Demo/Questions


Contentkeeper overview

ContentKeeper Overview

  • Corporate Headquarters: Canberra Australia

    • Founded in 1999

    • Customers: Over 1000 global customers and more than 4.5 million users

      • 80% Australian Federal business

      • Majority of Australian Education business

    • Employees: 50+ worldwide

    • 6 International Offices

  • Solutions:

    • Web Productivity & Security Solutions

    • Summary and Detailed Reporting

    • Proactive Malware Detection

  • Market Recognition:

    • Gartner SWG Magic Quadrant recognition since 2008

  • Focus: Developing high speed, scalable, fault tolerant, technologically advanced solutions for large education, government and private organizations


Next gen learning requirements

Next-Gen Learning Requirements


Next gen requirements

Next-Gen Requirements

  • CIPA Compliance

  • Support Social Learning

    • Granular Social Media Controls

    • YouTube for Schools

  • Enable Mobility for all Devices

    • BYOD and 1:1 deployments

  • SSL Decoding & Content Scanning

  • Smarter Balance/Online Assessment

  • Proactive vs. Reactive Malware Detection


Why contentkeeper for k 12 education

Why ContentKeeperfor K-12 Education


Architecture

Architecture

  • Physical Layer 2 Ethernet Bridge

    • Highly Secure

    • Highly Scalable

    • Highly Available

    • IPv6 Support

    • Highly Flexible: Start with filtering, extend as desired

    • All traffic coming to and from the Internet

Internal NetworkPlugs in here

Internet Plugs in here

Management Port Plugs in here

(The only IP Address)


Proven scalability

Proven Scalability

  • Scales beyond 10Gbit/s

  • Australian Statewide Education deployment

    • 550,000 endpoints

  • Scalability depends on implemented policy

    • Up to 60,000 users p/box

  • Virginia Beach School District

    • 60,000 endpoints


Features benefits overview

Features & Benefits Overview

  • Layer 2 Ethernet bridge

  • CIPA Compliance

  • Granular Social Media Controls

  • BYOD Web Access Controls for all Devices

  • 1:1 Support for Windows, iOS/OS X & Android

  • Full SSL Session Decoding & Inspection

  • Elimination of Proxy Anonymizer issues

  • DLP/Content Scanning

  • Advanced Proactive Malware Engines

  • Delegated Administration & Reporting


Granular social media controls

Granular Social Media Controls

  • Set Granular Policies by User on Specific Web 2.0/Social Media Application Activities

    • Setup a policy for each required control group

    • Assign level 1 & level 2 policies as required

      • Enable/Disable, Read-only, Time-of-Day

      • Admin Over-ride, Block, Don’t Log

Level 2 Controls - Facebook

YouTube for Schools Support

Level 1 Controls (Partial list)


Byod web access controls

BYOD – Web Access Controls

Who are they? Authentication

What are they doing on your network?

No Client side software allowed!

All devices iPad/iPhone, Android Windows, etc.

Monitor, Manage, Control & Secure


Byod accountability reporting

BYOD – Accountability & Reporting


Enable mobility

Enable Mobility

  • 1:1 Initiatives/Mobile Users

    • Enforce policy to mobile users when they are away from your network: 3G, Wi-Fi, Bluetooth…

    • Windows, iOS/OS X & Android


Full ssl https decoding filtering

Full SSL / HTTPS Decoding & Filtering


Why malware is an issue

Why Malware is an Issue

Malware attacks come from the Web Vector

92%

Increasingly Dynamic

Attacks

Increasingly Targeted

Attacks last less than 24 hours

54%

On Legitimate Websites

Companies hit by targeted attacks

45%

Malware comes from legitimate sites

It’s not a matter of if, it’s a matter of when…

83%

Source: M86 Security; Panda; Osterman Research; CSI Study

72%

Organizations hit by Web attacks

Result:


Malware attacks education beware

Malware Attacks: Education Beware!

  • Education #1 vertical for malware attacks

    • February, 2013, SC Magazine Report

    • 182% above median vertical malware encounter rate

  • Why?

    • Signature based Anti-Virus is largely ineffective against today’s Web threats

    • Students push boundaries:

      • Heavy users of malware targeted websites like social networking

      • Poor password security

      • Common to click on / share anything without levels of care or awareness compared to workers in other industries

    • Problems with proxy avoidance (anonymous proxies) bypass rules and protections – exposes network to threats


Multi layered advanced threat protection

Multi-Layered Advanced Threat Protection


Proactive malware defense technologies

Proactive Malware Defense Technologies

  • Behavioral Analysis Engine (BAE)

    • Browser object analysis

    • Detects and analyzes obfuscated code

  • Cloud Sandboxing (CSB)

    • Full Windows sandboxing for all other files

  • Full forensic reporting

  • Additional tools provided such as console drag & drop for local files & URL links

  • Threat isolation

CK-Console Based Tool


Closed loop collaborative filtering

Closed Loop Collaborative Filtering™

  • Automatic Global collection with hourly URL & real-time (malware protection) updates

  • Automatic discovery of new sites & new threats

  • Social Media/Web 2.0 control set/UI updates

  • Automatic local & cloud based analysis

  • Automatic Categorization & threat rating

  • Automatic Data Center Validation

  • Automatic Distribution

  • Automatic Re-Categorization

  • Stringent, Automatic & manual Quality Control

Globally meshed, fully automated, 24x7 operation

Over 4million users participating


Demo questions

Demo/Questions?


Reporting overview

Reporting Overview

  • The Advanced Reporting Module allows you to drill down and get detailed information on Internet use and share those reports with who you need to…


  • Login