Lightspeed Filtering Mark Shrimpton Schools Broadband Team EiS.

Slides:



Advertisements
Similar presentations
1 Conference Etiquette 1 Video Attendees: - Please mute your microphones until you are ready to ask a question. On Site Attendees: - Please mute your cell.
Advertisements

FIM MOBILE PRESENTATION
Business Solutions Network Security Solutions Gateway Security
 Phrase Search › Double quotes “”  Search Within a Specific Web Site › Results= given web site  Terms You Want to Exclude › “ - ”  Fill.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
Hosted Revolution Ltd Hosted Exchange October 2009 V2.01.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Secure Lync mobile Authentication
Secure SharePoint mobile connectivity
Authentication E-safety Filtering. e-safety, Internet & Lightspeed briefings 1.Why the meeting? Important decisions to be made on the services and infrastructure.
GETS Transformation Kick Off Active Directory and Blackberry Migration Firewall and Network Changes 04/21/
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Module 3 Windows Server 2008 Branch Office Scenario.
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
TOSIBOX LOCK security options 1 1.
Access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt.
Your storage on the ground; Your files in the cloud.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Networks QUME 185 Introduction to Computer Applications.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
ACTIVE DIRECTORY : AN INTRODUCTION The Network Team Knox County Schools.
Session 7 Windows Platform Eng. Dina Alkhoudari. Learning Objectives Active Directory review Managing users and groups Single Master Operations Delegation.
Appendix A UM in Microsoft® Exchange Server 2010.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Page 1 System and Group Policies Lecture 7 Hassan Shuja 11/02/2004.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
Usable Privacy and Security and Mobile Social Services Jason Hong
OVERVIEW OF ACTIVE DIRECTORY
Enterprise Messaging & Collaboration. e-Interact Modules.
Logical and Physical Network Design 1. Active Directory Objects Objects Represent Network Resources (Users,Groups,Computers,Printers) Attributes Store.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Astaro Security Gateway V7.5 Screenshots. Astaro Overview – Page 2 © Astaro 2009 Dashboard.
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Module 8: Planning for Windows Server 2008 Active Directory Services.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
IMPORTANT: This slide is for guidance only. Be sure to delete it prior to your presentation. About this deck.
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
Web Content Security Unlock the Power of the Web
Hybrid Cloud Web Filtering Platform
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Active Directory Administration
Power BI Security Best Practices
Your Business Opportunity
Unit 27: Network Operating Systems
Windows Active Directory Environment
Office 365 – How NOT to do it UKNOF43.

Presentation transcript:

Lightspeed Filtering Mark Shrimpton Schools Broadband Team EiS

Schools Broadbands Requirements Provide flexible filtering, suitable for entire age range Support expanding bandwidth requirements estimated to be ~10Gbps within 5 years. Replicate policies over multiple Internet gateways to ensure resilience should a WAN centre fail Integrate into hundreds of separate Active Directory forests Provide delegated admin to 600+ schools Provide granular filtering based on OU group/user, IP address, range, time of day Provide full reporting to allow us to comply with RIPA requests

Infrastructure

Rockets put into route Schools Broadband VPN Internet transits through UoK, Canterbury and EIS, Maidstone Filtering now in-line to Internet transit –Additional equipment meant changes to BGP advertisements Filtering policy challenges due to the added HTTPS filtering Introduction to 10Gb links Implementation Challenges

Filtering Policies

Mobile Filtering From-anywhere filtering, without the need for a VPN Password-protected uninstall. Reporting of off-network activity, including Blocked URLs, Blocked URLs by Category, Unknown URLs, URLs Visited. Forced Safe Search for Google and Yahoo search engines. Cross-platform support for Windows, Android, and iOS devices.

Customisations

Reporting

Traffic Dashboard

Reporting Reporting Front Page

Reporting Traffic by Internal IP

Reporting Top Blocked Domains

Reporting Top Blocked Categories

Reporting Search-engine Queries

Reporting Filtering Search-engine Queries

Other Features Management AntiVirus Power Management