The journey to a SMART University

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Given Connections Solution
Axis Intelligent Video Intelligence where you need it.
1 Kuwait Central Agency for information technology.
Securing Information Systems
IT ISSUES & TRENDS, 2015 Faculty Technology Day Wednesday, August 19, 2025.
The 4G world: Joe Mele When video becomes the new voice…
 Wiam Younes & George Semlch Carnegie Mellon University & Robert Morris University.
Testing Engine Saint Leo University Center for Online Learning Dr. Deborah Pendarvis Saint Leo University.
Internet Dangers Technology Communication Tools E-Literate.
FFIEC Cyber Security Assessment Tool
Separate Domains of IT Infrastructure CS Domains of IT 1. User Domain 2.Workstation Domain 3.LAN Domain 4.LAN to WAN Domain 5.WAN Domain 6.Remote.
2 Student benefits:   Technology access   Improved Instruction through the use of technology   Efficiency gained through use of technology   More.
Safe’n’Sec IT security solutions for enterprises of any size.
MIS323 – Business Telecommunications Chapter 10 Security.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Management System Ali Saeed Khan 29 th April, 2016.
FY 2017 Budget Development General Operating Funds Presented to the Campus-Wide Business Managers
Managed IT Solutions More Reliable Networks Are Our Business
IT: Be the Change and Culture You Want IT to Be
Julie Barkman Teacher Library & Information Studies Sydney TAFE
Technology Policy and School Staff and Faculty
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
e-Learning Our view and experience
Cyber Security Zafar Sadik
Comprehensive Security and Compliance at an Affordable Price.
Chancellor Pam Shockley-Zalabak
Smart Building Solution
UCL’s Information Strategy & implementation plans
Network Life Cycle Created by Michael Law
Introduction Neharicca Child Security Services - ERP system helps an education institution to become compliant with nationally acknowledged best practices.
April Chancellor’s Forum
RCCU Zephyr South West Regional Cyber Crime Unit.
Smart Building Solution
Information Hub.
Jon Peppler, Menlo Security Channels
On Using Semantic Complex Event Processing for Dynamic Demand Response
The way to serve University Students & Alumni
Network Access Control 101 Securing the Critical Edge of Your Network
Add your services to Microsoft 365 Business
Andy Hall – Cyber & Tech INSURANCE Specialist
Consulting Services for IoT
Cyber Defense Matrix Cyber Defense Matrix
Prepared By : Binay Tiwari
Technology Policy and School Staff and Faculty
Securing the Threats of Tomorrow, Today.
Artificial Intelligence in Manufacturing
Shan Sundar.
| UNC.
SurfCFCC Secure Wireless Access For Students, Faculty, and Staff.
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
Windows 10 Enterprise E3 for Small and Medium Business
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Behavior Intervention Team
TrinityIoT Premises Monitoring.
Financing the Future Five-Year Financial Forecast
Steps on the Digital Journey
Mariceli Vargas Student Life & Activities
Of giving every NMU student a brighter future World class solutions, Scalable Solutions Delivered with love + generosity.
Cisco Meraki Digital Solutions for K-12 Education
<offer name> with Microsoft 365 Business Secure Deployment
Alliance for Telecommunications Industry Solutions (ATIS) Update
My Journey to You, Our Journey Together
Information Technology Organization Overview RFP #220-05
South African Approach
IoT in Healthcare: Life or Death
50% Introducing the Cybersecurity Assessment
Presentation transcript:

The journey to a SMART University Nicholas Krul – Higher Education Solution Specialist nick@nec.xon.co.za

What is a SMART campus? Always-on connectivity Advanced Cyber-Security E-Learning Safe Environment Academic Credibility Data-driven

Technologies that support a SMART campus

What are today’s priorities? Financial Security Education Revenue: Enrolments & Fees Research output Intellectual Property Real Estate Costs: Facilities IT Human Resources Physical: Access control Crime prevention Cyber: Data loss Ransomware Malware Phishing Denial of service Etc etc etc Delivery: Lecture-hall based Online / e-learning Correspondence Assessment: Assignments Exams

The role of the African NREN TODAY TOMORROW

Students & researchers The campus of today PHYSICAL Access Control CCTV Identification Students & researchers Faculty & staff CYBER Network & IT infrastructure Data BYOD

The campus of today with technology integration Access Control CCTV Identification Network & IT infrastructure Data BYOD

OUTPUT INPUT Data The campus of tomorrow Network Systems Reactive Users Proactive Data Devices Predictive Analytics

Benefits of the SMART university Improved physical and cyber safety Less financial burden and increased revenue More credible academic results and research output ………………………………………………………..

How SMART is your campus?