Network Security

Keeping student and faculty data safe is the top concern on campuses today. With the proliferation of tablets, laptops and cell phones, schools are among the most vulnerable to cyberattacks from Trojans, bots, phishing and malware. New initiatives such as BYOD (Bring-Your-Own device) and cloud computing, further compound these vulnerability issues. Education is the second most targeted industry sector for data breaches 1, according to recent industry research. These attacks can come from inside – for example, students hacking the registrar’s office to change grades; or from outside sources – such as criminals searching for credit card numbers.
Kaspersky
SYM_Horiz
SophosLogo

It’s simply not enough to wait until a breach occurs.

52% of BYOD users connect to an open network
A wifi attack can take less than 2 seconds
There are nearly 172 million samples of malware

Delivering Comprehensive Security for Virtual Infrastructures, Physical and Mobile Devices

  • Management Console: IT administrators can view and manage the security landscape from one screen.
  • Security Platform: Built from the ground-up, all security components – console, security modules and tools – talk and work together seamlessly.
  • Single Cost: All tools are delivered from one vendor in one installation so budgeting and cost justification is simplified.
KAS_COMPLEXITY_250x250

Standard Features

Mobile Security

  • Anti-Malware: Features traditional signature-based, proactive and cloud-based methods
  • Over-the-Air Provisioning: Pre-configure and deploy applications centrally

Endpoint Protection

  • Behavioral Analysis: Proactive protection for threats not yet in signature databases
  • Cloud-Assisted Safeguards: Faster response to malware threats than other methods

Endpoint Controls

  • Application Control: Set policies to allow, block or regulate applications
  • Web Control: Endpoint-based surfing follows the user on the network or when roaming

Advanced Features

Data Protection

  • Comprehensive Encryption: Secure information with 256 bit encryption
  • Secure Data Sharing: Easily protect data when sharing via removable devices or email

System Management

  • Network Admission Control: Create guest policies to automatically recognize devices
  • Patch Management: Automatically scan for vulnerabilities and distribute patches

Endpoint Controls

  • Application Control: Set policies to allow, block or regulate applications
  • Web Control: Endpoint-based surfing follows the user on the network or when roaming