WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) 990-8686 11/06/2009 www2.widener.edu/wins

Slides:



Advertisements
Similar presentations
Updating from 7.5/8.0 to 8.5 Technical Review Presenter: Mark Danus, Sales Engineer/Training Manager Conference #: Pin#:
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Network Systems Sales LLC
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
EDUCAUSE Security 2006 Internet John Brown University.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
Protecting Students on the School Computer Network Enfield High School.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Continuing the work of the Bill & Melinda Gates Foundation Presented by: Jeff Stauffer WebJunction Service Manager Date: 3 February 2005.
WINS Monthly Meeting www2.widener.edu/wins 2/3/2006 WINS Monthly Meeting www2.widener.edu/wins.
Malicious Software.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /03/2009 www2.widener.edu/wins
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
BUILD SECURE PRODUCTS AND SERVICES
Office 365 is cloud-based productivity, hosted by Microsoft.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
3.6 Fundamentals of cyber security
CONNECTING TO THE INTERNET
Network security threats
WINS Monthly Meeting www2. widener. edu/wins internet2
NSE4-5.4 Dumps
Information Security Session October 24, 2005
Test 3 review FTP & Cybersecurity
Hosted Security.
Presentation transcript:

WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /06/2009 www2.widener.edu/wins

Agenda Introductions WINS Past WINS Present WINS Future Sunesys Role Virtualization Insight Q&A

Introductions Name Title Location

WINS Past In January of 2000, Widener University developed the WINS organization, to leverage advantages of the economies of scale inaugurated through Widener’s extensive and sophisticated network infrastructure. Widener University recognizes its commitment to the broader educational community – especially our strategic partners in K through 12 educations – with network capacity created from the development of a Gigabit Ethernet backbone that can sustain additional traffic without diluting services to the staff, faculty and students of the Widener University. The primary goal of WINS is to provide vital networking services to school districts, educational entities, and possibly government agencies that cannot afford either the expertise or the hardware to manage and control their own network operations independently. In February of 2000, a cooperative agreement was signed between WINS and the Delaware County Fiber Optic Network. During the months of March and April, all school districts were cut over to the Widener University Network for Internet access.

Features

Backbone Maintenance

Bandwidth

Widener NOC

Services

Services Defined NAT - Network Address Translation (NAT) allows you to use private IP addresses for addressing on your internal network, and allow all hosts on the internal networks to access the Internet using one public IP address. NAT allows multiple machines to connect to the Internet using a single public IP address. Additionally, using NAT for Internet access protects internal network computers from unwanted access attempts. Inline Content Filter - Web filtering blocks access to harmful, inappropriate, and dangerous websites which may contain phishing/pharming attacks, malware such as spyware, or objectionable content that can expose organizations to civil or criminal liability. Anti-Virus - The Antivirus Service provides fully automated updates to ensure protection against the latest content level threats. It employs advanced virus, spyware, and heuristic detection engines that prevent both new and evolving virus, spyware, and malware threats and vulnerabilities from gaining access to your network and its valuable content and applications. Anti-Spam - The Antispam service offers a wealth of features to detect, tag, quarantine, and block spam messages and their malicious attachments.

Services Defined DNS Primary/Secondary - Domain Name Server, represents a computer, which is charged with the task of translating domain names into IP addresses. Thanks to the DNS service we can type access websites by only typing their alpha-numeric names (domain names) in the browser instead of their IP addresses, which are the real server-side names of the websites. There are two basic types of DNS - primary DNS and secondary DNS, which are generally applied to each newly registered domain. They are name server computers where the record of your domain name is stored. The information on both servers is identical. The two DNS values are usually configured by your ISP or hosting provider and given to you as a very important part of your domain registration order details. District Firewall Support – Widener University has partnered with Fortinet, a leading provider of network security appliances and the leader of the unified threat management (UTM) market worldwide. Districts that have purchased this product line are provided installation, configuration, consulting, and troubleshooting support, at no cost. Shaping YouTube Blocking - Many K-12 schools in the United States, Canada & Worldwide block access to YouTube due to sexual, violent, and unusual content, and due to bandwidth consumption.

Services Defined Shaping P2P Blocking - Copyright infringement is the act of violating the exclusive rights of a copyright owner. Peer-to-peer (P2P) is a method of file sharing that allows normal users ("peers") to connect directly to other users to share files. P2P typically requires a "client" - a software program installed on their personal computer - to share files. Examples of clients are Kazaa, Limewire, BearShare, etc. and the various BitTorrent clients. These clients connect to other clients over the Internet and allow users to send files that they have marked as "shared" to other users, as well as to download copies of files that other users have shared. Because of its decentralized and unregulated nature, peer-to-peer filesharing is often used to share copyrighted works that those sharing the works do not have the right to share. However, it is important to remember that peer-to-peer is not anonymous, not secret, and can be unsafe!

WINS Future On behalf of Widener University, I am pleased to forward a new three-year agreement to you for action in support of the technology services offered through our Widener Integrated Network Services program. For the past ten years, Widener, and participating school districts have developed a strong working relationship to offer affordable Internet access, network maintenance assistance and technology expertise as together we have sought to improve the flow of information between and among the participating organizations. The enclosed agreement, scheduled to run from July 1, 2010 through June 30, 2013, remains essentially the same as prior years. We have added information pertaining to services offered and revised the available bandwidth specifications. Our first year pricing remains the same as the current year. We propose to support directly, procedures associated with the agreement and district participation in e-rate, by providing the Widener University SPIN number and processing all documentation as required. Widener will respond to individual Districts’ 470 Bid forms based upon the terms of this agreement, determine individual district fee for service based on historic methodologies for assessment, and coordinate e-rate refunds. Widener and the participating organizations have truly benefited from this partnership. In future it is hoped that we can add to this partnership through sharing of ideas and expertise of teachers and faculty to continue serving the needs of the students we all serve.

Sunesys Role This proposal does require Fiber Transport services provided by Sunesys today, to be modified in a way that creates a direct connection from your location to Widener University. Sunesys has indicated that the monthly fee will be $1,000, for a managed services facility that is eligible for E-Rate discounts. A onetime installation fee of $2,500 may be split or waived by Widener University to assist with this burden. Contracts with Sunesys will be the districts responsibility to award and pay. The attached Internet agreement fee of $22,135 does not include any costs associated with Fiber connectivity required. Nicole (Controy) Jackson Business Development Manager Sunesys, LLC 185 Titus Ave Warrington, PA (267) office (267) mobile (267) fax

Virtualization Insight In the last meeting, many of you shared Virtualization visions. … Many of you have just started down the runway and some of you have just taken flight. Ron Harris at Rose Tree has hit turbulence along the way and is willing to share his experience! Please feel free to share your experience as well so we can all learn!

Questions & Answers Next Meeting Dec 4th, 2009!