F IGURING OUT FILTERING : CAN WE PROTECT AND SERVE ? Ramesh Kapoor – Chief Information Officer Bill Johnsen – Director, Instructional Technology Virginia.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

Enabling Secure Internet Access with ISA Server
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
LittleOrange Internet Security an Endpoint Security Appliance.
Course 201 – Administration, Content Inspection and SSL VPN
Mobile learning and security DELC 2011
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
LOGO Computer Networks Firewalls Computer Networks Firewalls Prof. Teodora Bakardjieva Varna Free University.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
Human-Computer Interface Course 5. ISPs and Internet connection.
Hacker Zombie Computer Reflectors Target.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Module 7: Advanced Application and Web Filtering.
What is Web 2.0? We, the users, are Web 2.0…we create sites that allow people to interact, exchange, and collaborate with each other via the World Wide.
Virginia Beach City Public Schools Bill Johnsen
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Security fundamentals Topic 10 Securing the network perimeter.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NetTech Solutions Protecting the Computer Lesson 10.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Balancing Safety and Access: Moving Beyond the Acceptable Use Policy Bill Johnsen Virginia Beach City Public Schools
Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
ECMM6018 Enterprise Networking For Electronic Commerce Tutorial 1 Installing A Web Server.
Final Project: Advanced Security Blade IPS and DLP blades.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
Barracuda Firewall The Next-Generation Firewall for Everyone
TMG Client Protection 6NPS – Session 7.
Enabling Secure Internet Access with TMG
Securing the Network Perimeter with ISA 2004
Basic Policy Overview Palo Alto.
Services Provided by Network Operating Systems
What is Web Browsers - What is Blogs-
Identity & Access Management
دیواره ی آتش.
Protection Mechanisms in Security Management
The Dark Side of the Internet
Using Software Restriction Policies
Presentation transcript:

F IGURING OUT FILTERING : CAN WE PROTECT AND SERVE ? Ramesh Kapoor – Chief Information Officer Bill Johnsen – Director, Instructional Technology Virginia Beach City Public Schools

S ECURITY RFP I NTERNET C ONTENT F ILTERING R EQUIREMENTS Filter all traffic (HTTP, FTP, SMTP, etc.) Filter non-standard ports Block HTTP exploits Block spyware, keyloggers, adware, malware, etc. Block external proxies and other anonymizers Scan FTP/HTTP downloads Scan Active X Intrusion prevention Bandwidth shaping URL filtering (based on list) Dynamic content filtering

S OLUTION S ELECTED ContentKeeper Implemented August, 2007 Provided for different levels of filtering for different Active Directory groups URL filtering Blocks uncategorized sites Dynamic content inspection and filtering File types Key words Detects new proxy servers/tunneling

I MPLEMENTATION L ESSONS Vendor classification of sites What appeared appropriately blocked was too restrictive Difficulty with new “social” sites Realized centrally how much Internet was used for authentic instruction Streamlined the request for unblocking process Audit sites that are unblocked Need to carefully consider amount of filtering for staff productivity

T HE B ALANCE

The Millennials 21 st Century Learner Social Networking Wikis Blogs RSS Chat Video Content creation Collaboration And on, and on