210 likes | 367 Views
ContentKeeper for K-12 Education. Solution Overview. Presented by Date. Agenda. Next-Gen Learning Requirements Why ContentKeeper for K-12 Education Advantages of the Architecture Proven Scalability Feature Benefits Closed Loop Collaborative Filtering™ Demo/Questions.
E N D
ContentKeeperfor K-12 Education Solution Overview Presented by Date
Agenda • Next-Gen Learning Requirements • Why ContentKeeperfor K-12 Education • Advantages of the Architecture • Proven Scalability • Feature Benefits • Closed Loop Collaborative Filtering™ • Demo/Questions
ContentKeeper Overview • Corporate Headquarters: Canberra Australia • Founded in 1999 • Customers: Over 1000 global customers and more than 4.5 million users • 80% Australian Federal business • Majority of Australian Education business • Employees: 50+ worldwide • 6 International Offices • Solutions: • Web Productivity & Security Solutions • Summary and Detailed Reporting • Proactive Malware Detection • Market Recognition: • Gartner SWG Magic Quadrant recognition since 2008 • Focus: Developing high speed, scalable, fault tolerant, technologically advanced solutions for large education, government and private organizations
Next-Gen Requirements • CIPA Compliance • Support Social Learning • Granular Social Media Controls • YouTube for Schools • Enable Mobility for all Devices • BYOD and 1:1 deployments • SSL Decoding & Content Scanning • Smarter Balance/Online Assessment • Proactive vs. Reactive Malware Detection
Architecture • Physical Layer 2 Ethernet Bridge • Highly Secure • Highly Scalable • Highly Available • IPv6 Support • Highly Flexible: Start with filtering, extend as desired • All traffic coming to and from the Internet Internal NetworkPlugs in here Internet Plugs in here Management Port Plugs in here (The only IP Address)
Proven Scalability • Scales beyond 10Gbit/s • Australian Statewide Education deployment • 550,000 endpoints • Scalability depends on implemented policy • Up to 60,000 users p/box • Virginia Beach School District • 60,000 endpoints
Features & Benefits Overview • Layer 2 Ethernet bridge • CIPA Compliance • Granular Social Media Controls • BYOD Web Access Controls for all Devices • 1:1 Support for Windows, iOS/OS X & Android • Full SSL Session Decoding & Inspection • Elimination of Proxy Anonymizer issues • DLP/Content Scanning • Advanced Proactive Malware Engines • Delegated Administration & Reporting
Granular Social Media Controls • Set Granular Policies by User on Specific Web 2.0/Social Media Application Activities • Setup a policy for each required control group • Assign level 1 & level 2 policies as required • Enable/Disable, Read-only, Time-of-Day • Admin Over-ride, Block, Don’t Log Level 2 Controls - Facebook YouTube for Schools Support Level 1 Controls (Partial list)
BYOD – Web Access Controls Who are they? Authentication What are they doing on your network? No Client side software allowed! All devices iPad/iPhone, Android Windows, etc. Monitor, Manage, Control & Secure
Enable Mobility • 1:1 Initiatives/Mobile Users • Enforce policy to mobile users when they are away from your network: 3G, Wi-Fi, Bluetooth… • Windows, iOS/OS X & Android
Why Malware is an Issue Malware attacks come from the Web Vector 92% Increasingly Dynamic Attacks Increasingly Targeted Attacks last less than 24 hours 54% On Legitimate Websites Companies hit by targeted attacks 45% Malware comes from legitimate sites It’s not a matter of if, it’s a matter of when… 83% Source: M86 Security; Panda; Osterman Research; CSI Study 72% Organizations hit by Web attacks Result:
Malware Attacks: Education Beware! • Education #1 vertical for malware attacks • February, 2013, SC Magazine Report • 182% above median vertical malware encounter rate • Why? • Signature based Anti-Virus is largely ineffective against today’s Web threats • Students push boundaries: • Heavy users of malware targeted websites like social networking • Poor password security • Common to click on / share anything without levels of care or awareness compared to workers in other industries • Problems with proxy avoidance (anonymous proxies) bypass rules and protections – exposes network to threats
Proactive Malware Defense Technologies • Behavioral Analysis Engine (BAE) • Browser object analysis • Detects and analyzes obfuscated code • Cloud Sandboxing (CSB) • Full Windows sandboxing for all other files • Full forensic reporting • Additional tools provided such as console drag & drop for local files & URL links • Threat isolation CK-Console Based Tool
Closed Loop Collaborative Filtering™ • Automatic Global collection with hourly URL & real-time (malware protection) updates • Automatic discovery of new sites & new threats • Social Media/Web 2.0 control set/UI updates • Automatic local & cloud based analysis • Automatic Categorization & threat rating • Automatic Data Center Validation • Automatic Distribution • Automatic Re-Categorization • Stringent, Automatic & manual Quality Control Globally meshed, fully automated, 24x7 operation Over 4million users participating
Reporting Overview • The Advanced Reporting Module allows you to drill down and get detailed information on Internet use and share those reports with who you need to…