contentkeeper for k 12 education n.
Skip this Video
Loading SlideShow in 5 Seconds..
ContentKeeper for K-12 Education PowerPoint Presentation
Download Presentation
ContentKeeper for K-12 Education

Loading in 2 Seconds...

play fullscreen
1 / 21

ContentKeeper for K-12 Education - PowerPoint PPT Presentation

  • Uploaded on

ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'ContentKeeper for K-12 Education' - cleave

Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
contentkeeper for k 12 education

ContentKeeperfor K-12 Education

Solution Overview

Presented by


  • Next-Gen Learning Requirements
  • Why ContentKeeperfor K-12 Education
    • Advantages of the Architecture
    • Proven Scalability
    • Feature Benefits
    • Closed Loop Collaborative Filtering™
  • Demo/Questions
contentkeeper overview
ContentKeeper Overview
  • Corporate Headquarters: Canberra Australia
    • Founded in 1999
    • Customers: Over 1000 global customers and more than 4.5 million users
      • 80% Australian Federal business
      • Majority of Australian Education business
    • Employees: 50+ worldwide
    • 6 International Offices
  • Solutions:
    • Web Productivity & Security Solutions
    • Summary and Detailed Reporting
    • Proactive Malware Detection
  • Market Recognition:
    • Gartner SWG Magic Quadrant recognition since 2008
  • Focus: Developing high speed, scalable, fault tolerant, technologically advanced solutions for large education, government and private organizations
next gen requirements
Next-Gen Requirements
  • CIPA Compliance
  • Support Social Learning
    • Granular Social Media Controls
    • YouTube for Schools
  • Enable Mobility for all Devices
    • BYOD and 1:1 deployments
  • SSL Decoding & Content Scanning
  • Smarter Balance/Online Assessment
  • Proactive vs. Reactive Malware Detection
  • Physical Layer 2 Ethernet Bridge
    • Highly Secure
    • Highly Scalable
    • Highly Available
    • IPv6 Support
    • Highly Flexible: Start with filtering, extend as desired
    • All traffic coming to and from the Internet

Internal NetworkPlugs in here

Internet Plugs in here

Management Port Plugs in here

(The only IP Address)

proven scalability
Proven Scalability
  • Scales beyond 10Gbit/s
  • Australian Statewide Education deployment
    • 550,000 endpoints
  • Scalability depends on implemented policy
    • Up to 60,000 users p/box
  • Virginia Beach School District
    • 60,000 endpoints
features benefits overview
Features & Benefits Overview
  • Layer 2 Ethernet bridge
  • CIPA Compliance
  • Granular Social Media Controls
  • BYOD Web Access Controls for all Devices
  • 1:1 Support for Windows, iOS/OS X & Android
  • Full SSL Session Decoding & Inspection
  • Elimination of Proxy Anonymizer issues
  • DLP/Content Scanning
  • Advanced Proactive Malware Engines
  • Delegated Administration & Reporting
granular social media controls
Granular Social Media Controls
  • Set Granular Policies by User on Specific Web 2.0/Social Media Application Activities
    • Setup a policy for each required control group
    • Assign level 1 & level 2 policies as required
      • Enable/Disable, Read-only, Time-of-Day
      • Admin Over-ride, Block, Don’t Log

Level 2 Controls - Facebook

YouTube for Schools Support

Level 1 Controls (Partial list)

byod web access controls
BYOD – Web Access Controls

Who are they? Authentication

What are they doing on your network?

No Client side software allowed!

All devices iPad/iPhone, Android Windows, etc.

Monitor, Manage, Control & Secure

enable mobility
Enable Mobility
  • 1:1 Initiatives/Mobile Users
    • Enforce policy to mobile users when they are away from your network: 3G, Wi-Fi, Bluetooth…
    • Windows, iOS/OS X & Android
why malware is an issue
Why Malware is an Issue

Malware attacks come from the Web Vector


Increasingly Dynamic


Increasingly Targeted

Attacks last less than 24 hours


On Legitimate Websites

Companies hit by targeted attacks


Malware comes from legitimate sites

It’s not a matter of if, it’s a matter of when…


Source: M86 Security; Panda; Osterman Research; CSI Study


Organizations hit by Web attacks


malware attacks education beware
Malware Attacks: Education Beware!
  • Education #1 vertical for malware attacks
    • February, 2013, SC Magazine Report
    • 182% above median vertical malware encounter rate
  • Why?
    • Signature based Anti-Virus is largely ineffective against today’s Web threats
    • Students push boundaries:
      • Heavy users of malware targeted websites like social networking
      • Poor password security
      • Common to click on / share anything without levels of care or awareness compared to workers in other industries
    • Problems with proxy avoidance (anonymous proxies) bypass rules and protections – exposes network to threats
proactive malware defense technologies
Proactive Malware Defense Technologies
  • Behavioral Analysis Engine (BAE)
    • Browser object analysis
    • Detects and analyzes obfuscated code
  • Cloud Sandboxing (CSB)
    • Full Windows sandboxing for all other files
  • Full forensic reporting
  • Additional tools provided such as console drag & drop for local files & URL links
  • Threat isolation

CK-Console Based Tool

closed loop collaborative filtering
Closed Loop Collaborative Filtering™
  • Automatic Global collection with hourly URL & real-time (malware protection) updates
  • Automatic discovery of new sites & new threats
  • Social Media/Web 2.0 control set/UI updates
  • Automatic local & cloud based analysis
  • Automatic Categorization & threat rating
  • Automatic Data Center Validation
  • Automatic Distribution
  • Automatic Re-Categorization
  • Stringent, Automatic & manual Quality Control

Globally meshed, fully automated, 24x7 operation

Over 4million users participating

reporting overview
Reporting Overview
  • The Advanced Reporting Module allows you to drill down and get detailed information on Internet use and share those reports with who you need to…