information security in k-12 education freedom to teach / freedom to learn 4.3.08

21
Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Post on 18-Dec-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Information Security in K-12 Education

Freedom to Teach / Freedom to Learn

4.3.08

Page 2: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Current Trends That ImpactOur Conversation

Constrained budgets

Increasing use of Internet Parent communications Online assignment/announcement

boards Curriculum delivery School and district Web sites w/ links

Increased need/adoption of high-speed connections

Support for student computer labs/usage

Increased regulation of electronic information-handling

Page 3: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

The Net Net

High-speed Internet usage has become

a “given”among students and

their families.

But there’s no give in the system…

Page 4: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Serving Multiple Constituencies

Helping students excel with best infrastructure possible

Empowering teachersto do their best work

Meeting mandatedachievement standards

Doing everything possibleto engage parents

Operating inside budget

Satisfying regulatory requirements for information safety

Page 5: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

More Reliance on The Internet

School e-mail to communicate withparents and students

Delivery of curriculum videosor structured tutorials

Inter-connection of campusesvia VPN

Increasing reliance onsupport services delivered by third-parties Hosted assignment and activity boards

School Web sites as transactional environments Fundraising and scheduling

Page 6: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Countering the Cost of IT

Protecting the systems you have Preventing hacking/intrusions Blocking viruses and other malware Preventing bandwidth “piracy” for

wired and wireless networks

Maximizing return on your investmentin new systems Getting full value of your high-speed connections

Guarding against the liabilities of misuse or shortfall vs. regulations Securing personal information Assuring smooth, successful audits for regulatory compliance

Page 7: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

IT Challenges

Resources – tight budgets…doing more with less

Compliance – satisfying the letterand spirit of information protectionregulations

Management – dealing with disparate systems, a “perimeterless” organization and the ability to scale

Page 8: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Information Security Considerations

Intrusion prevention and detectionfor wired and wireless networks

Content filtering to preventunacceptable Internet usage

Anti-virus and anti-malware

Backup and recovery;file retention and protection

Minimal latency to assure full use of available bandwidth

Centralized security management and reporting to assure regulatory compliance and completeness of audits

Page 9: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Information Security Considerations

Clever student hackers Make sport of beating the system Trying to hijack school systems for

personal use Peer-to-peer file sharing;

networked gaming; etc.

May try to alter or destroy schoolrecords; vandalize school Web site

Inadvertent or deliberate access tounacceptable online content

General purpose threats: viruses; spyware; spam; phishing

Page 10: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

An Integrated, Layered Approach

Comprehensive security addresses all your needs and enables rapid response to new opportunities

FirewallsVirtual Private

Networking (VPN)

Distributed Wireless

Anti-virusIntrusion

Prevention

Content Filtering

Reporting

Backup Connectivity

Centralized Management

Enforced Protection

Auditing

Page 11: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Expanded Network Security Requirements

DoS, High Speed Worms

2008?

Source: Gartner

Threats Move to Application Layer Threats Move to

Application Layer

2003

Protection/Performance Increases

Unknown/Malicious Application Traffic 2007Growth in Real-time

Traffic

Network Borne AVThreats

Stateful inspection

Multi-tiered High-Speed Protection

Application Layer Support

File & Content Inspection

Deep Packet Inspection & IPS

2005

Pro

tect

ion

Req

uir

emen

ts

Mo

re-E

vasi

ve A

ttac

ks

As threats move up, network safeguard requirements increase

Application Layer Access Controls

Page 12: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Application Layer Filtering

Does more than just watch/block ports More robust security with easier

management and better user experience

Prevents access to proxy-basedapplications (YouTube, etc.) Can be dialed-down to produce

painfully slow access Frustrated users blame connection

and don’t try work-arounds

SonicWALL NSA Series delivers highest throughput in the industry; minimal latency Maximizes value of your high-speed connection Reduces/eliminates the need for increased bandwidth

Page 13: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

SonicWALL Today

Market Leader: Secure Networking, Secure Content Management and Business Continuity

Technology: Rich portfolio of innovative and interoperable solutions that outperform others in their range and that are easy to install, use and manage

Support: Significant investment in support to in-source and improve technical competency. Great attention to customer satisfaction, first day resolution and response time

Our industry footprint has expanded to anticipate the changing market requirements

Page 14: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Industry Recognition

SSL VPN Best in Class

Page 15: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Strong Compliance Support

Policy and Management Enforcement

Centralized Management (Encrypted and Authenticated)

Strong Access Control (Read, Write, etc.)

Comprehensive Audit Trails (Monitoring, Reporting, Logging)

Dynamic Vulnerability Management (UTM Subscriptions)

NCLB

FISMA

CIPAE-Rate

Page 16: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

SonicWALL Solutions Provide

Content filtering

Control of “casual contact” like email communications and outbound Web access

Data backup and recovery

Centralized security management and reporting to assure regulatory compliance

Application-layer perimeter security, inc. wireless access

Control of third-party points of access Service providers Contractors

Page 17: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Basic Secure Network:Distributed Multi-Campus

Staff

Admin

CDP

Campus

Mobile Staff

Service Providers

Net

wor

k M

gt.

SecureWireless

DISTRICT

CDP

Home Users/ Parents

Student / Guest

Secure Wireless SSL VPNUTM UTM

Page 18: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Make Your Budget Go Farther

AudienceCare-About

Challenges SonicWALL Solution

Reason Why

Safe learning environment

Student-initiated intrusions Inappropriate content access

Network Security/UTM SSL VPN Content FilteringSecure WirelessEmail Security

Deep packet inspection and application-layer filtering deliver category-leading protection

More effective learning environment/best education possible

Distance & online learning delivery Support student laptops Students accessing proxy content Maximizing value/ROI of higher-speed networks

Network Security/UTM Secure Wireless VPN

Category-leading throughput for maximum network performance Application layer filtering blocks proxy access Business-class performance; easy to set up and maintain - frees staff to focus on public-facing initiatives

Responsible budget management

Tight budgets More demands for IT Increasing network expenses

All Lower initial cost Lower TCO Superior network performance can reduce bandwidth needs

Regulatory compliance

More regulations Complex/confusing mandates

Content Filtering Network Security/UTM CDP

Meets CIPA requirements Meets all Federal standards Enables information-retention/protection compliance

Page 19: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

SonicWALL Education ReferenceCustomers

Biblionet Groningen

DePaul University

Goucher College

Kansas City, Missouri School District

Rush Croft Sports College

South Dakota School District

Southwestern Law School

Page 20: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Summary

The quality of your programs is increasingly tied to your Internet-based activities

Your high-speed Internet connection is a precious asset

Misuse of your connection leaves you vulnerable to liability and threatens your programs and your budget

SonicWALL has proven network security solutionsthat can do the most for your budget andyour high-speed Internet connection

Page 21: Information Security in K-12 Education Freedom to Teach / Freedom to Learn 4.3.08

Thank You!