SlideShare ist ein Scribd-Unternehmen logo
1 von 24
BYOD - protecting your school
Prepare your school’s network with Sophos UTM Wireless Protection
Agenda

                   Q&A            What is
                                  BYOD?



    How Sophos                              BYOD
    UTM can help
                         Agenda             Benefts



                                    BYOD
              Concerns &          Preparation
             Considerations



2
What is BYOD?

    • General term which may mean different things to
      different people
    • Big topic that covers more than just technology
    • Most people agree it means allowing personal devices to
      access business networks
    • Also used to describe programs where equipment is
      provided (1:1 initiatives)
    • BYOD concerns relate to both policy and infrastructure
    • Today, we’ll focus mostly on infrastructure concerns


3
BYOD Benefits to Schools
Why the trend?

    • U.S. Department of Education suggested BYOD in 2010
      National Technology plan
     • http://www.ed.gov/technology/netp-2010/executive-summary
    • Technology may enhance:
     •   Creativity and Innovation
     •   Communication and Collaboration
     •   Critical thinking, Problem solving, Decision-making
     •   Present concept of Digital Citizenship
    • Tech skills are essential for modern life and business
    • BYOD may save money
     • On equipment, apps, and management


4
BYOD Preparations
What should you be thinking of if you’re planning a BYOD initiative?

    • BYOD Policy
     • What are we trying to accomplish?
     • What’s acceptable use for equipment and network?
    • Infrastructure
     • What do we need to support the policy?
     • Do we have the proper equipment or do we need to purchase?
    • Impact on community
     • Are teachers prepared to use and maybe support devices?
     • Privacy concerns, can all students afford devices, do parents
       support, etc…



5
BYOD Infrastructure Considerations
The Network

    • How many new users/devices are you adding onto your
      network? Twice as many? 3 times?
    • Will your current network handle that traffic?
    • What are the security risks? (How can we ensure that
      Guest and/or BYOD traffic is segregated?
    • Will current network and web security solutions be able
      to support BYOD policy?
    • How much extra work is this going to be for IT staff?




6
BYOD Infrastructure Considerations
The Network

    • Network & Web Security equipment should provide (at
      least):
     •   QOS functionality to shape bandwidth
     •   Content filtering to enforce CIPA
     •   Application Control (Next Generation Layer 7 Firewall)
     •   Ability to scale as demands increase
     •   Reporting




7
BYOD Infrastructure Considerations
Your Wireless solution and its capabilities


    •   Does it support multiple SSID’s (wireless zones)?
    •   What security policies does it offer?
    •   What levels of encryption does it offer?
    •   How easy it is to add capacity?
    •   What are the Guest capabilities?
    •   How much work for staff to deploy and manage?




8
BYOD Infrastructure Considerations
Your Wireless solution and its capabilities


    • Wireless Solution should provide (at a minimum):
     •   Multiple Wireless Zones
     •   At least WPA2 encryption
     •   Ability to integrate with security solutions
     •   Usage reporting
     •   Guest Options




9
How can Sophos help with BYOD?

     • Sophos Mobile Device Management solution

     • Sophos Endpoint protection for Laptops

     • Sophos UTM Wireless Protection




10
Sophos Wireless Protection

     •   Easy deployment of Access Points
     •   Simple setup and management of zones
     •   Enterprise level encryption
     •   Configurable Guest options
     •   Integrated protection via UTM security suite
     •   Easily scales to meet increased demand




11
Sophos UTM Wireless Protection
Components



                            Now also
                            available
                          Sophos AP 50




12
Sophos AP 10 / AP 30
Plug and Play Access Points for classrooms

     AP 10                                   AP 30
     • Up to 10 users                        • Up to 30 users
     • 150 Mbit/s throughput                 • 300 Mbit/s throughput
     • 1 x 10/100 Base TX                    • 1 x 10/100 Base TX
     • IEEE 802.11 b/g/n                     • IEEE 802.11 b/g/n
     • 1 x detachable dipole antenna         • 3 x internal antennas
     • Power consumption: < 8 Watt           • Power consumption: < 8 Watt
     • Desktop/wall mounting                 • Desktop/ceiling mounting
                                             • Power over Ethernet (IEEE 802.3af)



                                                PoE-Injector included!




13
Sophos AP 50
Plug and Play Access Points for common areas

     • Dual-band/dual-radio access point
     • IEEE 802.11 a/b/g/n support
     • Support for up to 50 users
     • 300 Mbit/s throughput
     • 1 x 10/100/1000 Base TX
     • PoE+ compatibility (IEEE 802.3at)
     • Power consumption: < 10 W
     • 2 x 2.4G/5G detachable antenna
     • Desktop/wall mounting



          PoE-Injector included!




14
Centralized Management
Built-in wireless controller




                               Sophos UTM




15
Easy installation



                                         Guest

                    Sophos UTM




                                 Staff
                     Student




16
Guest Portal Hotspot support
Most flexible UTM based
Hotspot solution

• Manage temporary Internet
  Access for guests
• Options for:
        Configurable Usage agreement and
         logos
        Automatic ‘Password of the day’
        Quota’s on time and usage


Part of UTM Wireless Subscription




17
Flexible access for the entire organization
Sophos Access Points can be placed anywhere in your organization.
Easily create multiple separate wireless zones.




18
Advantages
Sophos UTM Wireless Protection
     Easy installation and management
      • Centralized configuration (all work done via UTM GUI)
      • Plug and Play Access Point simplify deployment


     Secure and reliable
      • Integrated UTM security for wireless devices
      • Best protection for wireless connections (separate zones, isolate client
        connections, configure quota’s)


     Flexible access
      • Easy Internet access options for guests
      • Multiple SSID support for varying levels of access



19
Integrated security
Once connected to the UTM easily integrates with other security features



                                        Strong Encryption




                   Sophos UTM




           Integrated UTM Security




20
UTM Security features
Optional Subscriptions provide the security features you want
                                      UTM Endpoint
                                      Protection Antivirus

                                      • Antivirus
                                      • HIPS
                                      • Device Control
     UTM Wireless                                                  UTM Network
     Protection                                                    Protection
                                                       optional
                                                                   •   Intrusion prevention
     • Wireless controller         Essential Network               •   IPSec/SSL VPN & RED
     • Multi-zone (SSID) support   Firewall                        •   HTML5 VPN Portal
     • Captive Portal                                              •   Reporting
                                   • Stateful firewall
                                   • Network address translation
                                   • PPTP/L2TP remote access


     UTM Webserver                                                 UTM Web
     Protection                                                    Protection

                                                                   •   URL filter
     • Reverse proxy                                               •   Antivirus & antispyware
     • Web application firewall     UTM Email
                                                                   •   Application control
     • Antivirus                    Protection
                                                                   •   Reporting
                                    • Anti-spam & -phishing
                                    • Dual virus protection
                                    • Email encryption
21
Sophos UTM fit any size network
     Hardware                                                                                                            Multiple
                      UTM 110/120   UTM 220        UTM 320         UTM 425         UTM 525           UTM 625
     Appliance                                                                                                           + RED




                         Small      Medium          Medium           Large           Large             Large         Large networks
     Environment
                        network     network         network         network         network           network          + branches


     Network ports        4            8               8           6 & 2 SFP      10 & 4 SFP         10 & 8 SFP           Multiple

     Max.
     recommended         10/80        300             800            1.500           3.500             5.000             10.000+
     firewall users
     Max.
     recommended         10/35        75              200             600            1.300             2.000               5.000
     UTM users

     Software
     Appliance *                                   Runs on Intel-compatible PCs and servers


     Virtual                                         VMware Ready & Citrix Ready certified
     Appliance *                              Runs in Hyper-V, KVM, and other virtual environments




                                                                                                                *Pricing based #IPs/Users
22
Resources
Questions?


     • National Educational Technology Standards
       •   http://www.iste.org/STANDARDS


       http://digitalcitizenship.net/

       http://www.zdnet.com/how-to-write-a-byod-policy-7000003502/

       http://www.fathomdelivers.com/the-benefits-and-risks-of-byod-in-
       schools/




23
Staying ahead of the curve


                                     US and Canada
                                     1-866-866-2802
                                  NASales@sophos.com




http://nakedsecurity.sophos.com

Weitere ähnliche Inhalte

Was ist angesagt?

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMAndris Soroka
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 

Was ist angesagt? (20)

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Ccnsp
CcnspCcnsp
Ccnsp
 

Ähnlich wie Protecting Your School with BYOD Wireless Protection

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...Priyanka Aash
 
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)Ari Zoldan
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdfPawachMetharattanara
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Governments ENabled with IPv6
 
Introduction à l'écosystème de l'Internet des Objets
Introduction à l'écosystème de l'Internet des Objets  Introduction à l'écosystème de l'Internet des Objets
Introduction à l'écosystème de l'Internet des Objets Geeks Anonymes
 
Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security ComplexitiesEtienne Liebetrau
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusEngi Admi
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamFelipe Prado
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsChristina Inge
 
Presentatie Alcom - Meetup
Presentatie Alcom - Meetup Presentatie Alcom - Meetup
Presentatie Alcom - Meetup Jesse van Doren
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfTM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfssuser8b324e
 
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...SIPfoundry
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 

Ähnlich wie Protecting Your School with BYOD Wireless Protection (20)

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
 
Introduction à l'écosystème de l'Internet des Objets
Introduction à l'écosystème de l'Internet des Objets  Introduction à l'écosystème de l'Internet des Objets
Introduction à l'écosystème de l'Internet des Objets
 
Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security Complexities
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGenius
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open Standards
 
Presentatie Alcom - Meetup
Presentatie Alcom - Meetup Presentatie Alcom - Meetup
Presentatie Alcom - Meetup
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfTM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
 
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 

Mehr von Sophos

Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareSophos
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat ReportSophos
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes MobileSophos
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)Sophos
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 

Mehr von Sophos (9)

Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Protecting Your School with BYOD Wireless Protection

  • 1. BYOD - protecting your school Prepare your school’s network with Sophos UTM Wireless Protection
  • 2. Agenda Q&A What is BYOD? How Sophos BYOD UTM can help Agenda Benefts BYOD Concerns & Preparation Considerations 2
  • 3. What is BYOD? • General term which may mean different things to different people • Big topic that covers more than just technology • Most people agree it means allowing personal devices to access business networks • Also used to describe programs where equipment is provided (1:1 initiatives) • BYOD concerns relate to both policy and infrastructure • Today, we’ll focus mostly on infrastructure concerns 3
  • 4. BYOD Benefits to Schools Why the trend? • U.S. Department of Education suggested BYOD in 2010 National Technology plan • http://www.ed.gov/technology/netp-2010/executive-summary • Technology may enhance: • Creativity and Innovation • Communication and Collaboration • Critical thinking, Problem solving, Decision-making • Present concept of Digital Citizenship • Tech skills are essential for modern life and business • BYOD may save money • On equipment, apps, and management 4
  • 5. BYOD Preparations What should you be thinking of if you’re planning a BYOD initiative? • BYOD Policy • What are we trying to accomplish? • What’s acceptable use for equipment and network? • Infrastructure • What do we need to support the policy? • Do we have the proper equipment or do we need to purchase? • Impact on community • Are teachers prepared to use and maybe support devices? • Privacy concerns, can all students afford devices, do parents support, etc… 5
  • 6. BYOD Infrastructure Considerations The Network • How many new users/devices are you adding onto your network? Twice as many? 3 times? • Will your current network handle that traffic? • What are the security risks? (How can we ensure that Guest and/or BYOD traffic is segregated? • Will current network and web security solutions be able to support BYOD policy? • How much extra work is this going to be for IT staff? 6
  • 7. BYOD Infrastructure Considerations The Network • Network & Web Security equipment should provide (at least): • QOS functionality to shape bandwidth • Content filtering to enforce CIPA • Application Control (Next Generation Layer 7 Firewall) • Ability to scale as demands increase • Reporting 7
  • 8. BYOD Infrastructure Considerations Your Wireless solution and its capabilities • Does it support multiple SSID’s (wireless zones)? • What security policies does it offer? • What levels of encryption does it offer? • How easy it is to add capacity? • What are the Guest capabilities? • How much work for staff to deploy and manage? 8
  • 9. BYOD Infrastructure Considerations Your Wireless solution and its capabilities • Wireless Solution should provide (at a minimum): • Multiple Wireless Zones • At least WPA2 encryption • Ability to integrate with security solutions • Usage reporting • Guest Options 9
  • 10. How can Sophos help with BYOD? • Sophos Mobile Device Management solution • Sophos Endpoint protection for Laptops • Sophos UTM Wireless Protection 10
  • 11. Sophos Wireless Protection • Easy deployment of Access Points • Simple setup and management of zones • Enterprise level encryption • Configurable Guest options • Integrated protection via UTM security suite • Easily scales to meet increased demand 11
  • 12. Sophos UTM Wireless Protection Components Now also available Sophos AP 50 12
  • 13. Sophos AP 10 / AP 30 Plug and Play Access Points for classrooms AP 10 AP 30 • Up to 10 users • Up to 30 users • 150 Mbit/s throughput • 300 Mbit/s throughput • 1 x 10/100 Base TX • 1 x 10/100 Base TX • IEEE 802.11 b/g/n • IEEE 802.11 b/g/n • 1 x detachable dipole antenna • 3 x internal antennas • Power consumption: < 8 Watt • Power consumption: < 8 Watt • Desktop/wall mounting • Desktop/ceiling mounting • Power over Ethernet (IEEE 802.3af) PoE-Injector included! 13
  • 14. Sophos AP 50 Plug and Play Access Points for common areas • Dual-band/dual-radio access point • IEEE 802.11 a/b/g/n support • Support for up to 50 users • 300 Mbit/s throughput • 1 x 10/100/1000 Base TX • PoE+ compatibility (IEEE 802.3at) • Power consumption: < 10 W • 2 x 2.4G/5G detachable antenna • Desktop/wall mounting PoE-Injector included! 14
  • 15. Centralized Management Built-in wireless controller Sophos UTM 15
  • 16. Easy installation Guest Sophos UTM Staff Student 16
  • 17. Guest Portal Hotspot support Most flexible UTM based Hotspot solution • Manage temporary Internet Access for guests • Options for:  Configurable Usage agreement and logos  Automatic ‘Password of the day’  Quota’s on time and usage Part of UTM Wireless Subscription 17
  • 18. Flexible access for the entire organization Sophos Access Points can be placed anywhere in your organization. Easily create multiple separate wireless zones. 18
  • 19. Advantages Sophos UTM Wireless Protection Easy installation and management • Centralized configuration (all work done via UTM GUI) • Plug and Play Access Point simplify deployment Secure and reliable • Integrated UTM security for wireless devices • Best protection for wireless connections (separate zones, isolate client connections, configure quota’s) Flexible access • Easy Internet access options for guests • Multiple SSID support for varying levels of access 19
  • 20. Integrated security Once connected to the UTM easily integrates with other security features Strong Encryption Sophos UTM Integrated UTM Security 20
  • 21. UTM Security features Optional Subscriptions provide the security features you want UTM Endpoint Protection Antivirus • Antivirus • HIPS • Device Control UTM Wireless UTM Network Protection Protection optional • Intrusion prevention • Wireless controller Essential Network • IPSec/SSL VPN & RED • Multi-zone (SSID) support Firewall • HTML5 VPN Portal • Captive Portal • Reporting • Stateful firewall • Network address translation • PPTP/L2TP remote access UTM Webserver UTM Web Protection Protection • URL filter • Reverse proxy • Antivirus & antispyware • Web application firewall UTM Email • Application control • Antivirus Protection • Reporting • Anti-spam & -phishing • Dual virus protection • Email encryption 21
  • 22. Sophos UTM fit any size network Hardware Multiple UTM 110/120 UTM 220 UTM 320 UTM 425 UTM 525 UTM 625 Appliance + RED Small Medium Medium Large Large Large Large networks Environment network network network network network network + branches Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple Max. recommended 10/80 300 800 1.500 3.500 5.000 10.000+ firewall users Max. recommended 10/35 75 200 600 1.300 2.000 5.000 UTM users Software Appliance * Runs on Intel-compatible PCs and servers Virtual VMware Ready & Citrix Ready certified Appliance * Runs in Hyper-V, KVM, and other virtual environments *Pricing based #IPs/Users 22
  • 23. Resources Questions? • National Educational Technology Standards • http://www.iste.org/STANDARDS http://digitalcitizenship.net/ http://www.zdnet.com/how-to-write-a-byod-policy-7000003502/ http://www.fathomdelivers.com/the-benefits-and-risks-of-byod-in- schools/ 23
  • 24. Staying ahead of the curve US and Canada 1-866-866-2802 NASales@sophos.com http://nakedsecurity.sophos.com

Hinweis der Redaktion

  1. What is BYOD – BRING YOUR OWN DEVICE- Used to describe the practice of allowing personal technology (laptops, Ipads, phones, etc…) access to privileged resources such as networks and/or data. Allowing personal devices to be used in this manner offers flexibility to the employees and can provide real cost savings to the business. - To ensure that this data is not lost and to ensure employees are using resources appropriately BYOD policies often include the use of Endpoint and Mobile Device Management solutions. This presentation focuses on parts of BYOD that are often of the most concern to educational organizations.
  2. Part of the reason many schools are implementing BYOD programs is that it was suggested by the U.S. Dept of Education in their 2010 National Technology Plan. “The goal is to ensure that every student and educator has at least one Internet access device and appropriate software and resources for research, communication, multimedia content creation, and collaboration for use in and out of school. These devices may be owned by the student or family, owned by the school, or some combination of the two. The use of devices owned by students will require advances in network filtering and improved support systems.”http://www.ed.gov/technology/netp-2010/executive-summary
  3. - In preparing for a BYOD program the infrastructure must be confirmed. Questions concerning roles, responsibilities, acceptable devices, funding, training, and parents’ opinions need to be answered. - Other considerations include goals for the policy, degree of control, and purchasing/supporting of devices.- Lastly, but equally important are, technical, privacy, and security considerations, administrative considerations, and legal considerations.
  4. Some infrastructure questions: Do we need to add new equipment and how much will it cost? How will it connect to my existing systems? If I can use existing equipment does it have the proper features to ensure success? What effect will this new project have on existing network traffic and overall security? Many schools not only have tight IT budgets, but also limited IT staff who are reluctant to open the floodgates and welcome many unknown devices onto their network.
  5. Staff acceptance is another important consideration. Some teachers may be intimidated by new technology, and reluctant to BYOD. A possible solution is to hold an event prior to rolling out BYOD for staff so they could see and touch various devices, (phones, tablets, etc..) and discuss ideas on how they could be used in the classroom.
  6. The Sophos UTM Wireless solution is designed to provide simple, secure wireless connectivity to users. The solution consists of plug and play access points and the Sophos UTM controller.
  7. - This slide shows our Access Points (the AP 10 on the left and AP 30 on the right).- The AP 10 is for up to 10 users with a maximum throughput of 150 Mbit/s. This WLAN solution is directed towards smaller office environments.- The AP 30 is for up to 30 users with a maximum throughput of 300 Mbit/s. This PoE aligned Access Point is available in the design of a smoke detector for a ceiling mount and is directed towards larger office environments.This appliance covers higher requirements for amount of users, signal reach and performance.
  8. 3 operating-modes:- Disclaimer-page- Password of the day-WiFi-ticket management
  9. Summary
  10. -Cover small networks and remote locations with up to 10 users to large networks with up to 5000 users.- Software can be also installed on your own servers.- The same set of security applications, including features such as Active/Active Clustering, WAN Uplink Balancing or Active Directory Integration, is available on all Sophos UTM models.- Everyhardware appliance contains an integrated hard drive for local spam quarantine and log/reporting information.- The UTM525 and 625 models offer the highest availability through a redundant hard drive and power supply.