ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Internal NetworkPlugs in here
Internet Plugs in here
Management Port Plugs in here
(The only IP Address)
Level 2 Controls - Facebook
YouTube for Schools Support
Level 1 Controls (Partial list)
Who are they? Authentication
What are they doing on your network?
No Client side software allowed!
All devices iPad/iPhone, Android Windows, etc.
Monitor, Manage, Control & Secure
Malware attacks come from the Web Vector
Attacks last less than 24 hours
On Legitimate Websites
Companies hit by targeted attacks
Malware comes from legitimate sites
It’s not a matter of if, it’s a matter of when…
Source: M86 Security; Panda; Osterman Research; CSI Study
Organizations hit by Web attacks
CK-Console Based Tool
Globally meshed, fully automated, 24x7 operation
Over 4million users participating