1 Keeping Students and Data SafeVersion 1.0 | April 2016
2 K-12 Challenges There are several IT challenges faced by public and private schools and school districts today.
3 K-12 Challenges Keeping students and data safeLimited budget and IT resources Securing school infrastructure from network threats Providing disaster recovery solutions for data Assessment Readiness Most schools or school districts are constantly dealing with being budget and IT resource constrained. These constraints can make it more difficult for a school to be ready to ward off attacks of all kinds and it makes securing their network, students, and staff of primary importance. School environments also have to deal with user data… whether it is student grades, immunization records or other school information. This data must be fully backed up and recoverable to ensure business continuity should a disaster occur. Another threat vector to deal with is how to keep students safe in an environment that is quickly outpacing our current method of learning. And finally, meeting online assessment requirements plays a big part of the challenges faced… not only to be compliant but to make sure that your network is prepared to manage the increasing availability requirements and bandwidth usage.
4 Trends To compound the challenges, schools also face a series of trends that drive how they respond to securing their infrastructure.
5 Mobility To start let’s talk about Mobility. Mobile devices have largely made the network perimeter for organizations borderless. And what I mean by this is if you were to think about how your networks were designed years ago, you’d typically had a network perimeter that surrounded the majority of the resources that were on your network. If I asked you to draw me a diagram from years ago, it would look fairly simple. You’d have some computers, some users, some servers, and all of these things would be in a neat, little box. That neat little network box was your network perimeter. Today that picture actually changes dramatically because you have a lot of mobile devices – smart phones, tablets, laptops, Chromebooks, etc. that are constantly traversing on and off of the network.
6 Mobility Challenges Ensuring security on all devicesManaging devices on and off campus Safe browsing experience Implementation of campus-wide Wi-Fi Some of the challenges that come with Mobility include how you actually ensure that the same set of security policies that you have for your on-network devices and users also apply to your devices and users when they go off-network. When your users use public Wi-Fi such as at Starbucks and they want to use the device such as the Chromebook that you’ve issued to them, how can you actually ensure the security on those devices? At the end of the day a lot of these devices, especially under 1:1 initiatives, are still the property of the school. The management and security of those devices becomes very important as well. CIPA compliance also applies, not only to the experience students have while browsing the web on campus, but it also applies to the experience the student has while browsing off campus. So you need to figure out how to actually ensure a safe browsing experience not only on campus but also off campus. And that only covers the 1:1 initiative aspects of a lot of mobility programs that schools are running which is that these devices are owned by the schools and handed out to the students. There is another set of challenges around BYOD environments where schools are now being forced to provide campus free Wi-Fi to all sorts of devices. As a result the IT department is now having to figure out how to support a plethora of devices that students are also bringing onto campus. How do you actually implement campus wide Wi-Fi and at the same time still provide the same level of security and management for personal devices that are coming onto the network as well as devices that are already on the network and devices that you’ve given out to students to take home with them?
7 Cloud Migration Let’s talk about the next trend, Cloud Migration.
8 Cloud Migration ChallengesInternet connectivity and availability Managing Bandwidth Implementation of Online Assessments Security and privacy of data and applications We actually see a number of schools moving to cloud based or SaaS apps (software as a service.) One of the biggest challenges that we see as schools move to SaaS applications whether, for example, it be for online grading purposes or online file sharing purposes is that they need to secure the proper amount of internet connectivity and available bandwidth. This is a similar problem for online testing initiatives because a lot of the online testing is done via SaaS applications. The challenge specifically for schools is really around how you manage capacity and/or bandwidth of all of the online testing standards and initiatives that you may have. For example, some of the more well-known ones are PARCC and Smarter Balanced Assessment Consortium. You also have to make sure you are securing the privacy of the data in the application that you are actually using. No school, student, or parent wants a student’s grades or test scores made publically available during a hacking incident. You have to figure out how you can secure the integrity and the privacy of that data. Speaker Side Notes (for your information): PARCC (Partnership for Assessment of Readiness for College and Careers) which is a group of states working together to develop a set of assessments that measure whether students are on track to be successful in college and their careers. These are high quality, computer-based K–12 assessments in Mathematics and English Language Arts/Literacy. PARCC is made up of: Colorado, District of Columbia, Illinois, Maryland, Massachusetts, New Jersey, New Mexico, and Rhode Island. The states in PARCC educate millions of elementary, middle and high school students across the country. In addition, Pennsylvania is a "participating state." Smarter Balanced Assessment Consortium comprises of 18 states, one territory, and the Bureau of Indian Education focusing on creating online exams. Member states: California, Connecticut, Delaware, Hawaii, Idaho, Iowa, Michigan, Montana, Nevada, New Hampshire, North Carolina, North Dakota, Oregon, South Dakota, US Virgin Islands, Vermont, Washington, West Virginia, and Wyoming.
9 Online Student Safety Now let’s talk Online Student Safety.
10 Online Student Safety ChallengesManaging online student safety Ensuring regulatory compliance Lack of workflow between teachers and IT department Paper overload The online student safety challenges are pretty clear. As learning curriculum and learning materials increasingly move to a digital, online world, you have to figure out how you can actual manage online student safety. There are a set of regulatory compliances like CIPA compliance that most schools have to make sure that they are in good standing with. What ends up happening as a result of these two challenges is that IT teams tend to be very overbearing on the type of content that a teacher is actually able to use in a classroom. So they err on the side of caution and block a lot of content and if you want access to it, you have to ask to have it unblocked. What that has created in an inefficient workflow between teachers and the IT department. Then there is an overall paper overload problem. Because of the regulatory compliance and schools needing parents to sign off on many documents, there is now a paper overload problem. We’ll talk about how Barracuda solutions can help alleviate this problem as well.
11 Importance of Electronic DataFinally, there is an importance around electronic data and the need to protect it.
12 Importance of Electronic Data ChallengesExcessive operating costs for data and storage Data loss at school or the district level Protecting both physical and virtual environments Protecting data has its own set of challenges around excessive operating costs, data loss and protecting both physical and virtual environments, but the biggest challenge is that there is just more and more data that needs to be backed up whether that be a student’s immunization records or grades. A lot of the data is sensitive and schools don’t want to lose it nor do they want someone to steal it. The need to backup the data becomes more and more critical.
13 Constraints And lastly you do have a number of constraints that you have to deal with.
14 Constraints Limited IT resources Restricted budgets Lack of timeKeeping pace with the latest technology These constraints should be familiar. We know that you have limited IT resources and chances are that your school or district has a small staff of 2 or 3 IT personal or in a lot of cases you only have one person who ends up wearing many hats. This IT resource ends up responsible for everything from securing your network infrastructure to being the help desk person assisting teachers with any technical issues they may encounter. There is also the issue of restricted budgets. You end up having to stretch the dollars that you have while trying to avoid settling for technology that will become obsolete sooner versus later. And when you have a limited staff, then lack of time becomes a common occurrence. Trying to manage all of your school’s technology requirements can become quite a feat. Plus at the end of the day all of these constraints makes it even more difficult to keep pace with the latest technology.
15 Secure Your Network, Data, and UsersNow if you look at it from a holistic standpoint, we can simplify this down to doing three things… securing your network, your data, and your users. I’d like to show you what you can do to simplify IT for education while securing your ecosystem.
16 Secure Your Network Secure your network perimeterRegulate network traffic Provide bandwidth optimization Centrally manage multiple locations The first component to secure is your network. A key effort in education is not only to secure your network perimeter but to have the ability to regulate network traffic and manage bandwidth utilization. And finally, you can’t be everywhere at once. As a person managing a network, you need to be able to centrally provide policies, monitor connectivity and provide WAN optimization.
17 Secure Your Data Provide disaster recovery with backup and restoreArchive and attachments for compliance and preservation Make data available for eDiscovery Ensure information is secure everywhere Securing your data takes on a different aspect of IT… where in the previous section we were securing our network perimeter and managing network traffic, securing your data is more a question of being able to provide disaster recover and making data available for eDiscovery. And it isn’t only a question of disaster recover, but also how quickly you can recover from disasters and where that backup is stored… are your requirements to save data in the cloud, on premises, or at a remote location? Are your environments in a physical datacenter, cloud-based, or in virtualized environments? Wherever the data resides, it is up to every organization that it remains secure yet accessible.
18 Secure Your Users Manage online student safetyReduce administrative and operational costs Provide alternative to paper-based workflow Lastly, you need to secure your users. Securing students and facility when they are online is a big focus for IT admins. There is also a need to reduce the use of paper flowing between students, parents and the school. The paper-based workflow can be cumbersome and pose administrative challenges. Compound this with the fact that it is perpetuating the pull away from electronic records and professionals feel the concern that this could be a never-ending problem. If, however, you move away from paper-based workflow, you have the potential to not only reduce administrative and operational costs, but also to simplify the entire transaction, securely and effectively.
19 Secure Your Network
20 Increasing Availability RequirementsE-learning initiatives Google Apps for Education Learning Management Systems User-generated content Social media Photos and videos Common Core & online testing requirements There are a number of multi-media sites and content that is driving the requirements for increased availability. There are a lot of schools that use tools such as Google Apps for Education or use the curriculum taught on Khan Academy. The use of these types of tools actually drive up the amount of bandwidth consumption that is flowing through your network. You also have social media content. A lot of that content is user generated and very rich in nature including a lot of images and videos, and schools are trying to walk a fine line between allowing social media content versus completely blocking it. And that is also driving up availability requirements. Similarly, we mentioned PARCC before and one of the specific requirements around PARCC is that they actually have to allocate a specific amount of bandwidth for every 1,000 students by this year. There are pretty big changes coming in the way we think about network availability and capacity. This is really driving a lot of upgrades on firewall infrastructures as well as the web proxy infrastructures as schools move forward.
21 Improve Network QualityIntelligently regulate network traffic Preserve bandwidth by disabling application-specific sub functions Ensure high availability by controlling and throttling acceptable traffic Speed up education-critical applications High Priority Low Priority Blocked When dealing with the increasing availability requirements you need to think about improving your network quality. With our NextGen Firewalls you can intelligently regulate network traffic. What this means is rather than just blocking out applications you don’t want students to use, we are making sure that the things that are important are still getting to the right places as quickly as possible. For example, items like Apple updates or Windows updates can be set to a lower priority because they are not as critical while you can make sure your learning management system or other business critical applications have high priority. We can also degrade or out right block traffic that is deemed as inappropriate or frivolous such as Facebook. You can also throttle down lower priority items so that they get so slow that the user eventually gives up.
22 Know What Your Users are DoingProvide full user awareness Create policies based on users and groups Create powerful, granular firewall rules Provide full user awareness with DC Agent and TS Agent Utilize detailed reports Allow for ALL Allow for STAFF Disallow for ALL You also need to know what your users are doing on your network. User and application awareness provides intelligence and visibility to allow you to craft business rules to help you manage bandwidth . You can easily customize network access, application usage and bandwidth allocation for specific users and groups. For example, you can allow access to Edmodo to all users on the network but you can limit Skype to only the school staff and outright disallow Spotify to all users on the network. Note to speaker: Edmodo is a global education network (K-12 social learning network) that helps connect all learners with the people and resources needed to reach their full potential. Spotify: digital music service
23 Intelligently Regulate Network TrafficEDU Apps % DSL 1 Web Browsing % DSL 2 VoIP % Also with our Firewalls you can simultaneous manage the use of multiples IPs. A lot of schools will have a backup internet line that is not used and is available only in case of failover. Rather than paying for something that you are not using and having it sit there dormant, why not utilize it? With our Firewalls you can set-up multiple outbound links and then you can dedicate traffic to those links based on their speeds. As an example, we have 100% of our EDU apps which are considered business critical going through our main T1 line. We also have two secondary lines that are slower lines and we use those for other purposes such as web browsing or Voice Over IP (VOIP) traffic.
24 Intelligently Regulate Network TrafficEDU Apps % DSL 1 Web Browsing % DSL 2 VoIP % Now in the event that one of these lines fails we can switch on the fly so that we can re-direct…
25 Intelligently Regulate Network TrafficEDU Apps 80% VoIP % DSL 1 Web Browsing % VoIP % DSL 2 VoIP % …the traffic. In this example, our DSL2 line went down which normally carries all of our VoIP traffic. Because that line went down we split our VoIP traffic between our two remaining lines. 70% of our VoIP traffic is now on the DLS 1 line and 20% on the T1 line. We’ve effectively cut our web browsing down to 30%. Now VoIP is going to take precedence over our web browsing based on the priorities we’ve set.
26 Secure Your Data
27 Complex Traditional Backup SolutionsFile/Application Servers Backup Software Removable Media Device Removable Media Courier Services Offsite Location Labor We can all agree that traditional backup is complicated. With the need to protect both physical and virtual environments, Microsoft Exchange, SharePoint, and SQL Servers, just to name a few – these are highly diverse environments that typically require different retention policies and backup methods. Most backup solutions in the market today require multiple vendors and complex deployments, so you have to buy your backup servers and storage from one vendor and backup software from another. Then you have to worry about how to replicate the data offsite with clunky removable media and all the labor involved in getting your tapes to a remote location. (for small- and mid-market customers add this talk track) Not only that, being the backup admin is probably only one sliver of your convoluted IT admin responsibilities, as you’re stretched to handle desktops, mobile deployments, and networking as well. It shouldn’t be so difficult.
28 Backup 101 At least two copies of your dataAt least one copy should be at a remote location There are some basic steps that you’ll need to do to in order to make sure that your data is protected and secure. The first step is to have at least two copies of your data. The second step is to make sure at least one copy is in a remote location. While we’ve seen a common practice of having one copy at the school and another copy at the district, you need to make sure that the secondary site where the copy of your data resides is in a location not prone to the same disaster/incident as your main location.
29 Backup 201 Ability to access data during disasterAbility to keep your institution up and running Now that you have two copies of your data and at least one of the copies is at a remote site, you need to make sure you have a way to access that data in the event of a disaster. It is going to be key to be able to keep schools up and running. You need to make sure that you have the ability to quickly retrieve your data from your secondary location and get it back up and running in a timely manner. This is especially true if you are storing important student information such as parent contact information or medical history that may need to be accessed in the event of a disruption or disaster.
30 Backup and Restore Headquarters Remote OfficeBarracuda believes it should be easy. With backup software, local storage, and offsite replication built into an all-in-one appliance, Barracuda Backup is truly the unified cost-efficient data protection solution for all your environments. For that we have the Barracuda Backup solution. It is an on-premises appliance that allows you to send file information for backup on-premises but it also allows you to integrate directly to our Barracuda Backup cloud. All the information that sits locally on your Barracuda Backup appliance, can either be replicated disk to disk to another site at another location or can go disk to cloud and be stored in the secure Barracuda public cloud environment.
31 Disaster Recovery HeadquartersSo during a disaster where you lose access to your data, you can use the Barracuda Backup to restore all your information to keep up and running during a disaster.
32 In Case of Site DisasterHeadquarters Headquarters Remote Office In cases where you have a site disaster where the entire site becomes unavailable, you can restore from a Barracuda Backup in a remote office or from the Barracuda Cloud to ensure that you are up and running fast.
33 Secure Your Users The last thing you need to do is to secure your users. Secure your students, secure your facility.
34 Need for Purpose Built Web SecurityEvolving threat landscape Need to protect against multi-vector attacks Need to filter inappropriate and malicious content Social Media and cloud-based applications Need to regulate and monitor rather than just block Increasing mobility Need to consistently protect on and off-network users Increasing network complexity and web usage Need for visibility into all aspects of network activity Need to improve productivity and regulate bandwidth When securing your users, it really comes down to web security. With the ever evolving threat landscape you have to protect against multi-vector attacks and continuously filter out inappropriate and malicious content. You also need to have the ability to regulate and monitor what your students are doing on social media and within other cloud-based applications. You also need to protect your users when they are using mobile devices on and off your network. At the end of the day, it really comes down to having visibility into all network activities.
35 Online Student Safety Increasing amount of activity & user-generated content Cyber-bullying Bomb threats Majority of social media traffic is now secure More difficult to control and have visibility First when it comes to online student safety, there is an increasing amount of activity and user-generated content from social media sites such as Facebook, Twitter, and Instagram. Unfortunately, the people we are dealing with are typically under the age of 18. Naturally there is a lot of cyber bullying and suspicious or inappropriate activity that is actually happening when you allow users to create and generate their own content. We’ve seen a lot of cases where cyber bullying was a legitimate issue for a school and the legitimate concern for whether they should open up Facebook or other social media tools. The challenges that schools have around this is that the majority of this traffic is actually secure. Two-thirds of all web traffic today is SSL Encrypted which means it is very difficult for a firewall or most content filtering systems out there to have visibility or control over that type of traffic.
36 SSL Scanning Increasing amount of traffic is now secureGrowing need to monitor SSL-encrypted content Inspect HTTPS traffic Let’s talk a little bit about SSL scanning first. Because of the fact that two-thirds of web traffic today is SSL encrypted, it becomes very important for a web proxy infrastructure to de-crypt SSL traffic. To be able to enforce granular policies on things like Facebook, YouTube, and Google become very important.
37 Social Media with BarracudaGranular web application control & monitoring for social media Suspicious activities alerts Trigger alerts in real-time to prevent abuse Profanity/cyber-bullying Guns/violence/terrorism Adult/pornography Create your own custom keywords Archive social media communication for e-discovery Barracuda Web Security Gateway & Message Archiver And one of the things you can actually do with Social Media with Barracuda is get very granular. It is not a block all or allow all policy where you say I want to block all of Facebook. You can actually have the freedom and flexibility to say I want to allow Facebook, the main site, but I want to block games and Facebook chat. This allows schools to have a lot more flexibility and freedom to figure out what social media policy makes sense for them and then how to go about implementing it as appropriate. At the same time we still understand that kids will be kids. There is always a set of suspicious activities that will happen if you allow people to create user generated content. Because we have the ability to have complete visibility, even though the data is encrypted, we can actually trigger alerts in real-time to prevent certain types of abuse. We are constantly scanning for suspicious keywords with regards to profanity, cyber bullying, terrorism, etc. You can also create your own list of custom keywords as well. If we find and flag one of these keywords, we have an integration available between the Barracuda Web Security Gateway and Barracuda Message Archiver that automatically archives the information so that if you ever need to bring it into a court of law, it is very easy for you to meet those eDiscovery compliance requirements.
38 Granular Web App ControlEnforce Safe Search on all major search engines Google, Yahoo, Bing Google Apps for Education enforcement Allow access for the school’s Google Apps Block access for personal Google Apps SSL inspection to filter, control, and monitor encrypted web traffic We also offer granular web application control. You can enforce safe search on all the major search engines (Google, Yahoo, Bing). Each one of these search engines provides a separate window into the search engine: one that has unfiltered content which is the standard search engine that is used most often and then another for filtered content. The filtered content search is where the search engine decides which content is offensive and removes it from the search results. It can also block specific keywords. For example, on Google you can’t do searches for specific body parts. Our solutions can help you enforce the safe search feature. We also provide Google Apps for Education enforcement. One of the challenges that can come up as an administrator who is using Google Apps for Education is allowing your own Google Apps domain while preventing students from using their personal Google applications. A great example of this is with Gmail accounts. You may want to keep track of what the students are ing back and forth to one another. By allowing them to access their personal accounts, you are giving them a way around. We can provide a block to user’s personal Google Accounts but allow the school sponsored version of apps. It does require SSL inspection which allows you to filter, monitor and control traffic.
39 Extend Security for All DevicesPCs, Macs, Windows tablets Web Security Agent software client Lightweight, tamper-proof, centrally managed Mobile Devices Barracuda Safe Browser for iOS devices No proxy settings or VPN required Now let’s talk about 1:1 initiatives. The first challenge is that you need to ensure that you have a set of security policies for both on-network devices and users as well as when users go off-network. The solution to this is to install tools such remote agents on those devices. For PCs, Macs, and Windows tablets, Barracuda offers a Web Security Agent that basically is an end point client that you install on those end point devices. It is lightweight and tamper-proof. Students can’t go in and log out of the agent or shut the agent down. It is centrally managed and you can push out as many of these agents that you want. And then there is a set of Mobile Devices like iOS devices that schools are supporting through 1:1 initiatives through iPads or BYOD environments where students can bring in whatever type of device that they want. For that there are two ways to solve this 1) we offer a Safe Browsing alternative to Safari. What schools can do is lock down the browser app on their iPads and enforce and push out the Barracuda Safe Browser instead. The Barracuda Safe Browser doesn’t require any proxy settings or VPN setting to set-up. It is directly provisioned back to the web security gateway you have and all those policies are pushed to the Safe Browser. Now to facilitate the management of all of this, Barracuda offers a free Mobile Device Manager. Also, known as MDM. You can use our cloud-based MDM service to not only enroll, activate and provision devices, but you can push down payloads, proxy settings, the safe browser, along with a number of other Barracuda apps. MDM allows you to enhance the security and management on both iOS and Android devices. The second piece that makes mobility initiatives challenging is that you actually have to track the remote activity of the user. Regardless if they are on-campus or have taken the device off network, you still need to have visibility into all of the user activities. Any of the Barracuda remote agents that we’ve talked about today whether it is the Safe Browser or using web security agents, will allow you to keep track of all of your devices. You have visibility into all of the user activities so that you know where they are, you know what sites they are browsing, and how long they are on those sites. And best of all you can manage it all from the web security gateway interface, not two or three different interfaces that you have to learn and work through. We don’t believe in per feature or per user fees at Barracuda. Everything we’ve talked about regarding remote filtering agents and the Mobile Device Manager is completely unlimited and free.
40 Barracuda Chromebook Security ExtensionLightweight browser plug-in Single Sign-on User based policy management Google Apps for Education integration Improved resiliency According to Gartner and other leading IT industry analysts, Google Chromebook deployments continue to rise in the K-12 market. Just recently it was noted that Chromebooks were now the leading devices in K-12 schools, covering over 50% of the market nationwide. With the huge expansion of Chromebook deployments for use both on and off campus, IT admins need to have the ability to easily and quickly enforce content security policies. In the past it was easy to deploy remote filtering on Windows and Mac machines, along with iPhones, but the browser-based configuration and lack of an operating system made Chromebooks difficult to manage. You cannot install software the same way as you can on a traditional laptop or mobile device. To solve this problem, Barracuda Web Security Gateway includes the Barracuda Chromebooks Security Extension. It is a lightweight browser plug-in. It provides single sign-on access, user based policy management, Google Apps for Education integration, and improved resiliency. The Chromebook plug-in actually takes the agent to the next generation. It communicates with the Web Security Gateway and downloads the user’s policies and caches them locally. It will check periodically with the Web Security Gateway as policies and user access information is updated. All policy enforcement is done directly in the plug-in itself. The plug-in can communicate with our Web Categorization Service in the cloud directly and knows the user’s policies and which sites the user is allowed to access or not. Using the Barracuda Chromebook Security Extension provides the same user experience regardless of device, all the same web content filtering and again it doesn’t have the concept of failing open or closed. Instead it falls back to the last known good configuration, improving its resiliency and allowing it to still continue to work even in an event of a failure or the inability to communicate with the Web Security Gateway.
41 Wi-Fi on Campus/BYOD Web Filter integration with wireless access points Aerohive Aruba Meru Ruckus Wireless Also, I want to talk about Wi-Fi on-campus. This is the culmination of a lot of schools trying to be able to support and adopt bring your own device initiatives and what they’ve done is basically offer free Wi-Fi on campus for all devices. Now the challenge with that is there are actually a lot of devices that go through Wi-Fi but don’t actually authenticate to the network. And so, what ends up happening is that you have no idea who is actually behind that device. The web security gateway integration with a number of different wireless access points that we have out there allows the web security gateway to get very granular visibility into who the user was and what device they were actually using when they connected to the campus Wi-Fi. Barracuda integrates with Aerohive, Aruba, Meru, and Ruckus Wireless. If you are a customer of any of these different vendors you can actually take the same authentication information that your user has used to jump onto the Wi-Fi and pass it over to the web security gateway so that you get the same level of user identity and visibility into the traffic for your personal BYOD devices as you do for your school devices.
42 Streamline Online Teaching EffectivenessEliminate workflow overhead with temporary access tokens Define permissions, rules, and limits of users & tokens Request token to access blocked content for a temporary period There are a lot of inefficiencies in the workflow between teachers and the IT department as it relates to accessing online content. It can take an average of 24 hours for an IT ticket related to teachers asking for white listing of websites to be turned around. An effective way to streamline this workflow issue is the use of temporary access tokens. It is a feature on the Barracuda Web Security Gateway that allows the IT department to be more proactive. It allows them to recognize that teachers may need access or temporary access to certain websites that may be incorrectly categorized. With the tokens, all teachers have to do is generate a random token and then input that token to the blocked page that they are trying to access. They will then get the temporary access they need. The parameters for that access are pre-defined by the IT department. The IT department can say “here is the set of teachers that I want to allow to have temporary access and here is the maximum amount of time that the access should be for.” For example, if it is a one hour class then in theory the teacher only needs a temporary access token for one hour. You can input these types of parameters and definitions. There are also a set of sites that should never be whitelisted. For example, playboy.com should never be whitelisted. You can actually specify URLs and categories that are completely blacklisted so that the tokens don’t work for these types of sites. We really designed this feature with the K-12 market in mind to eliminate this friction you have between the teacher and the IT department.
43 Move to a Paperless SchoolPermission slips Technology usage policies Emergency contact information Social media use policies The last item I’ll touch on is how you actually move to a paperless school. We’ve actually found that the average school manages 11,000 signatures on paper every single school year. Most of this is around permission slips, tech usage policies, emergency contact information, etc.
44 CudaSign Secure your agreements Take schools paperlessNever search for signed paper agreements Gain control over document workflows Electronically secure critical documents Take schools paperless No need for printers, scanners, and fax machines Eliminate risk of losing or misfiling documents CudaSign, Barracuda’s eSignature solution, offers an easy way to track and manage those same documents. It is all done electronically. For example, you the document that you want a parent to sign, they sign it on their mobile device and then it is very easy for you to track whether or not they have signed.
45 Overcoming IT ConstraintsEarlier we talked about a number of IT constraints including limited IT resources and lack of time. This constraints can also impact you when…
46 Barracuda Addresses Office 365 ChallengesSpam Prevention and Security Block threats including spam, viruses, malware, phishing Built-in encryption and data loss prevention (DLP) Granular quarantines, exception lists, and blocked sender lists Compliance & eDiscovery Capture and secure copy of every Minimize risk by storing outside production environment Extensive search and discovery capabilities w/granular legal hold Backup & Recovery Automates backup of Exchange Online and OneDrive for Business Protects all (incl. attachments) and complete folder structure Restore or download data to different sources …implementing or migrating to Microsoft Office 365. Dealing with legacy data, maintaining availability, ensuring solid security, managing compliance archiving, and finally backup and restore –can all be challenges in Office 365. Barracuda has introduced a suite of products along with a methodology that is designed to help you overcome some of the more significant downsides of Office 365 and allow your students and staff to operate in a secure, efficient, and productive manner.
47 A 3-Step Methodology for ProductivityPrepare Migrate Operate Provide security, compliance & data protection Prepare your data and network Work with a partner to migrate To make it easier to understand, our three-step methodology for Office 365 productivity breaks things down into phases: prepare- prepare your data for migration, and prepare your network for a cloud-focused environment; migrate, where partner services and expertise become a key component of an efficient, cost-effective, and successful migration; and operate, ensuring you have enhanced security, compliance archiving, and backup for Exchange Online and OneDrive for Business.
48 The Value of Barracuda We’ve talked about a lot of solutions to help you in your environment. What we haven’t talked about is Barracuda as a whole.
49 Easy-To-Use The first thing is that our solutions are very easy to use with a low learning curve. We realize that you don’t have time to get spooled up on a solution that will take a lot of time to master. Our solutions are easy to navigate and most of our customers are up and running within 30 minutes.
50 Common User InterfacesTo go along with ease of use, our products have a common user interface so the ramp up time from understanding one product to the next is low. The Barracuda NextGen Firewall X on the right and the Barracuda Web Security Gateway on the left have a similar user interface to make navigation easy to understand. Barracuda Web Security Gateway Barracuda NextGen Firewall X
51 Central Management Barracuda Cloud ControlManage multiple Barracuda products Central global policy management Consolidated reports Mobile application for remote control Free! Barracuda appliances, both virtual and physical, can be centrally managed from Barracuda Cloud Control. This is a free web application and provides management of all your Barracuda products from a single pane of glass. You can create and update policies, configure settings, and generate reports all from one place. So if you have multiple Barracuda products in your network, such as Barracuda Security Gateways, Barracuda Web Security Gateways, and Barracuda Web Application Firewalls, Barracuda Cloud Control eliminates the need to log into each of the devices separately to manage them.
52 Barracuda Threat IntelligenceThis is one of my favorite slides as it really conveys the value proposition of Barracuda. Unlike competitors who only make a product for a single threat vector (and hence only see threats for that vector), Barracuda secures all your network threat vectors and sees several different varieties of threats. We have honey pots around the world, over 180,000 deployments gathering data, customer submissions, and more… we take all this data, churn it through our real-time protection system and then send updates to all of our solutions in the field to ensure that you have the most up-to-date security we can offer.
53 Simplified IT 30-Day free evaluation Simple pricing model 24x7 support4 Year Hardware Refresh When people ask us what we stand for, I point out that we simplify IT… we make solutions that make an IT guy’s job easier. We really take this to heart with our simple pricing model and our 30-day free evaluation. Try one of our solutions in your environment… take it for a spin. Most of customers have said that the free trial was extremely helpful in their purchasing decision as they could see the solution work in their environment. We offer 24x7 in region support around the world. If you’re calling from EMEA, you will get a support person in EMEA. Calling from the US? You’ll get a support person from the US. We talk about how we have fanatical support and we really do pride ourselves on this. In fact, 9 out of 10 customers would recommend Barracuda Networks based on the support alone! And finally, I want to touch upon our Hardware Refresh Program. If you maintain our Instant Replacement subscription, every four years, we will give you a new version of the same model for free. As processing power and capacity are always increasing, that means you’ll always be getting the latest solution Barracuda has to offer every four years!
54 E-Rate Eligible ProductsBarracuda NextGen Firewall F Barracuda NextGen Firewall X Barracuda Web Application Firewall And if you are taking advantage of the E-Rate program, we also have products eligible under E-Rate. The eligible products are our Barracuda NextGen Firewall X-Series, Barracuda NextGen Firewall F-Series, and Barracuda Web Application Firewall. Speaker Side Notes (you don’t necessarily need to mention this info during your presentation: Barracuda NextGen Firewall X-Series and F-Series are 85% eligible Barracuda Web Application Firewall is 100% eligible. (Note that we don’t talk about WAF during the presentation since we don’t sell a heavy volume of these products in the K-12 market). Barracuda Web Security Gateway is not eligible for E-Rate. Web filtering (regardless of vendor) is not eligible under the current USAC guidelines. Recipients of E-Rate funding are required to certify that they are CIPA compliant; however, web filtering is specifically excluded from the list of reimbursable expenses.
55 Moving Forward
56 Simplify IT for EducationNext Steps Understand how you can maximize your network bandwidth Build a disaster recovery plan to guarantee no school interruptions Gain visibility into what your students are doing online Simplify IT for Education We’ve talked about a lot of different challenges and solutions today. As far as next steps go, I’d like to leave you with some key things to think about. First, understand how you can maximize your network bandwidth. We know that with the move to more cloud-based applications and the implementation of online assessments that your network’s bandwidth is going to be impacted. You want to have the ability to regulate network traffic and preserve bandwidth for highly critical applications. Also, the ability to customize network access, application usage, and bandwidth allocation for specific users and groups becomes key in maximizing your network bandwidth. Second, build a disaster recovery plan to guarantee no school interruptions. Remember that when you build your plan that you should be make sure you have at least two copies of your data in a remote location. You also need to make sure that you have a way to quickly access that data in the event of a disaster to avoid any disruptions. Third, you need to gain visibility into what your students are doing online. We know that two-thirds of all web traffic is SSL encrypted and that number is only going up. How does the growing number of SSL traffic limit your visibility? Whether it is a Firewall, a web security gateway or another solution that you are investing in, you should think about if you have enough visibility and control into that SSL traffic when you need it further down the road. And when you are ready to move forward, Barracuda offers 30 day evaluations, online demos or you can simply call us.
57