SlideShare una empresa de Scribd logo
1 de 59
8 Building Blocks for a High
Performance School Network
© Copyright 2014 Modrus
The Problem
2
The Problem
3
Mark Zuckerberg
Founder, Facebook
“Our policy at Facebook is literally to hire
as many talented engineers as we can
find. There just aren't enough people who
are trained and have these skills today.“
Eric Schmidt
Executive Chairman, Google
“For most people on Earth, the digital
revolution hasn't even started yet. Within
the next 10 years, all that will change.
The Problem
4
Greater network
and internet
security
Better monitoring
of who is
accessing what
Wider use of video
and graphical
content
Providing universal home
access for staff and students
Students and staff wanting to
connect to different kinds of
devices
Current pressures on School IT teams:
5
So, how can you
keep your school
networks on the
rails?
The Problem
6
Users typically lose up to
30 minutes a day waiting for
PC’s to load or reboot
(Gartner, 2009)
86% of users across Europe, Asia
and North America lose 18 hours
productivity or more a month. (Forrester,
April 2013)
The Problem
No. users affected
x
average cost per user
x
lost productivity %
100 staff
£25k average cost pp
Half an hour a day = 6% of working week
7
The Problem
No. users affected
x
average cost per user
x
lost productivity %
£150,000 lost per year
8
The Problem
9
Lowers both
staff and
student
morale
The Problem
10
Decreases
work
satisfaction
The Problem
11
Increases
stress in the
IT dept
The Problem
12
Loss of user
confidence
in IT Dept
So How Does Poor IT
Performance Impact
You?
8 Building
Blocks
Protecting whom from what?
• How do you make sure the right people can
access the right files?
• How can we stop the wrong people accessing
the wrong files?
• How do we separate student and staff networks
whilst enabling staff to appear on both?
• Where do we put the intelligence that manages
our network access rules?
16
1 Security
What does good security look like?
Correct
Access
Permissions
• The right people
access the data they
need
• The wrong people
don’t have access to
anything they
shouldn’t
18
Give authorized
users a secure
environment
• Users cannot do
anything that may
compromise their
environment
• No admin rights for
standard users
19
A good method
for elevating
permissions for
super-users
• A secure and
managed process for
raising the permission
levels of users
20
Reviewing
access
• Do people who have
left or moved roles still
have access to data?
21
Strong security
at the edge or
border
• Firewalls to block
external access
• VLANs to separate
networks
22
Certificates to
encrypt/
decrypt data
• Ensuring nothing gets
modified in transit
What’s actually going around our
network?
• Is your network a free-for-all where
“whoever gets there first gets the most”?
• Is more use of live streaming, video data
and digital photography in learning vastly
increasing your network traffic?
23
2 Resources
What does good network management look like?
Visibility of
performance
• Monitor switches
• Alerts on thresholds of
usage
25
Regular usage
reviews/
capability
checking
• Is the school running
low on ports?
• Do you need to
organise more
switches now and
reduce delays to
users when more
capacity is needed at
short notice?
26
Where are the
performance
bottlenecks?
• Are uplinks from edge
switches able to cope
with demand?
27
Quality of
service
• Can performance be
improved by
identifying different
data types and
prioritising?
How can we connect anything
anywhere and still manage it?
• How many people are likely to want to
connect and where?
• How do you manage staff and students
bringing their own devices to connect to
your network?
• How do you authenticate and track users
and focus on what is safe for them to
access?
28
3 Wireless
What does good wireless management look like?
Appropriate
levels of access
depending on
connection type
• Monitor switches
• Alerts on thresholds of
usage
30
Performance
monitoring,
specifically
capacity and
coverage
• Ensure you have
enough bandwidth or
throughput to cope
with demand
• Ensure you can get a
strong wireless signal
in all required areas
and not available
elsewhere
How can they get securely and
simply connected in?
• How do you control how visiting
teachers, parents and students connect
to the internet?
• How do you separate that network from
the core staff and students?
• How can you ensure guest devices and
traffic are secure?
31
4 Guests
What does good guest management look like?
Separation of
networks
• Only access limited
services, if any
• Undertake regular
penetration testing
33
Guest access is
simple and
supports a wide
variety of
connecting
devices
• They just work without
needing the IT team’s
intervention
So what is happening where and
when?
• How do you diagnose the symptoms
when you hear “my connection is slow”?
• How can you monitor:
– Which devices are doing what?
– How much bandwidth is being used ?
– Which websites are being accessed?
34
5 Monitoring & Reporting
What does good monitoring look like in schools?
Automatic
discovery
• Changes and
upgrades to devices
get automatically
factored in
36
Smart
classification
and mapping
• Classify devices and
map your network
• Helps identify
bottlenecks
• Pinpoints devices
which might be
causing problems
37
Performance
monitoring
• You must be able to
monitor available
resources, bandwidth
and device uptime
• Controlled re-starts of
devices can help
banish glue in
performance
38
Intelligent
alerting
• You can’t watch
everything every
minute
• Alerts that make you
aware of a situation
before it becomes
critical
39
Scalability and
failover
• Can you keep up with
demands?
• Build in redundancy
as part of the solution
to prepare for outages
and hardware failure
of your monitoring
solution
What are they and how do we avoid
them?
• How do we ensure the essential
protection from:
– Worms
– Trojans
– Spyware
– Adware
– Bots
40
6 Viruses & Malware
What does good Virus & Malware protection look like?
Up to date virus
and malware
definitions
• Check at least hourly
for new digital
signatures
42
Regular,
scheduled virus
scans on
devices
43
Email scanning
outside of your
network
• On cloud based
services etc.
• Makes sure viruses
don’t get as far as
your network
44
AV Scanning on
firewalls
• Prevent viruses
getting in at the border
45
Subscribing to
virus alerts and
notification
services
• Keep up to date with
latest news
• Global comms means
geography is no
longer a barrier to
virus infection
Homework from home?
• Can your students, staff and in some
cases parents access school
resources from home?
• Access to virtual desktops from
home
• Access to webmail from home for
staff and students
46
7 Remote Access
What does good remote access look like?
High level of
security in the
access method.
• Is a simple username
and password
enough?
• Should you insist on
two-factor
authentication?
48
Encryption on
connections
• Prevent data being
modified in transit
49
Control on what
is accessible
• Limiting what users
access externally
50
Do you allow
data to be
transferred in or
out of the
network?
• Do you monitor data
being transferred?
• Ensures data from a
controlled area isn’t
being moved to an
uncontrolled one
What if…?
• How do you ensure data doesn’t get
lost or corrupted?
• Do you have a rigorous regime of
regular maintenance and updates?
• Do you have more than one server?
51
8 Resilience
What does good remote access look like?
No single points
of failure
• Never have just one of
something
• Find ways to put
things in more than
one location
53
Physical
redundancy
• Have additional
hardware that will take
over in event of failure
54
Is the redundant
solution able to
cope with the
load in a failure
environment?
• E.g. A UPS is
designed to give
enough power to
enable a safe
shutdown – not power
the hardware in case
of failure
55
Geographic
resilience
• Internet lines that
don’t follow the same
route in to the building
• Hardware installed in
different locations
So what have
we learned?
Networks can be
A pain
Holding us back
Costing us money
A bit tricky
Security
Resources
Wireless
Guests
Monitoring & Reporting
Viruses & Malware
Remote Access
Resilience
www.modrus.com

Más contenido relacionado

La actualidad más candente

Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
tbanks
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
Atlantic Training, LLC.
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
emilyensign
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program
emilyensign
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
emilyensign
 

La actualidad más candente (20)

Cyber Ed
Cyber EdCyber Ed
Cyber Ed
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Incidents Up 39% and Other Impacts of Remote Work on IT
Incidents Up 39% and Other Impacts of Remote Work on ITIncidents Up 39% and Other Impacts of Remote Work on IT
Incidents Up 39% and Other Impacts of Remote Work on IT
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Network security
Network securityNetwork security
Network security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 

Destacado

High performance-learning-how-to-become-a-world-class-school
High performance-learning-how-to-become-a-world-class-schoolHigh performance-learning-how-to-become-a-world-class-school
High performance-learning-how-to-become-a-world-class-school
Oscar Hernandez
 

Destacado (8)

High performance-learning-how-to-become-a-world-class-school
High performance-learning-how-to-become-a-world-class-schoolHigh performance-learning-how-to-become-a-world-class-school
High performance-learning-how-to-become-a-world-class-school
 
Supporting Professional Communities in the Next Web
Supporting Professional Communities in the Next Web Supporting Professional Communities in the Next Web
Supporting Professional Communities in the Next Web
 
Be the leader your dog thinks you are
Be the leader your dog thinks you areBe the leader your dog thinks you are
Be the leader your dog thinks you are
 
2014 Summer School Principals Meeting Presentation
2014 Summer School Principals Meeting Presentation2014 Summer School Principals Meeting Presentation
2014 Summer School Principals Meeting Presentation
 
Year end performance review 2014
Year end performance review 2014 Year end performance review 2014
Year end performance review 2014
 
2011 Meet the Parents Session - 1NT (Year-End)
2011 Meet the Parents Session - 1NT (Year-End)2011 Meet the Parents Session - 1NT (Year-End)
2011 Meet the Parents Session - 1NT (Year-End)
 
2011 Meet the Parents Session - 3NA (Year End)
2011 Meet the Parents Session - 3NA (Year End)2011 Meet the Parents Session - 3NA (Year End)
2011 Meet the Parents Session - 3NA (Year End)
 
"DepEd Order No.2, s. 2015 Guidelines on the Establishment & Implementation o...
"DepEd Order No.2, s. 2015 Guidelines on the Establishment & Implementation o..."DepEd Order No.2, s. 2015 Guidelines on the Establishment & Implementation o...
"DepEd Order No.2, s. 2015 Guidelines on the Establishment & Implementation o...
 

Similar a 8 building blocks for a high performance school IT network

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 

Similar a 8 building blocks for a high performance school IT network (20)

Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Using emerging digital technology for learning in prisons
Using emerging digital technology for learning in prisonsUsing emerging digital technology for learning in prisons
Using emerging digital technology for learning in prisons
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44
 
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy ChallengeTrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
What is federated single sign-on?
What is federated single sign-on?What is federated single sign-on?
What is federated single sign-on?
 
Chris Shillum: Overview of the RA21 proejct presentation
Chris Shillum: Overview of the RA21 proejct presentationChris Shillum: Overview of the RA21 proejct presentation
Chris Shillum: Overview of the RA21 proejct presentation
 
Dr Abel Sanchez at Bristlecone Pulse 2017 MIT
Dr Abel Sanchez at Bristlecone Pulse 2017 MITDr Abel Sanchez at Bristlecone Pulse 2017 MIT
Dr Abel Sanchez at Bristlecone Pulse 2017 MIT
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

8 building blocks for a high performance school IT network

  • 1. 8 Building Blocks for a High Performance School Network © Copyright 2014 Modrus
  • 3. The Problem 3 Mark Zuckerberg Founder, Facebook “Our policy at Facebook is literally to hire as many talented engineers as we can find. There just aren't enough people who are trained and have these skills today.“ Eric Schmidt Executive Chairman, Google “For most people on Earth, the digital revolution hasn't even started yet. Within the next 10 years, all that will change.
  • 4. The Problem 4 Greater network and internet security Better monitoring of who is accessing what Wider use of video and graphical content Providing universal home access for staff and students Students and staff wanting to connect to different kinds of devices Current pressures on School IT teams:
  • 5. 5 So, how can you keep your school networks on the rails?
  • 6. The Problem 6 Users typically lose up to 30 minutes a day waiting for PC’s to load or reboot (Gartner, 2009) 86% of users across Europe, Asia and North America lose 18 hours productivity or more a month. (Forrester, April 2013)
  • 7. The Problem No. users affected x average cost per user x lost productivity % 100 staff £25k average cost pp Half an hour a day = 6% of working week 7
  • 8. The Problem No. users affected x average cost per user x lost productivity % £150,000 lost per year 8
  • 9. The Problem 9 Lowers both staff and student morale
  • 12. The Problem 12 Loss of user confidence in IT Dept
  • 13. So How Does Poor IT Performance Impact You?
  • 14.
  • 16. Protecting whom from what? • How do you make sure the right people can access the right files? • How can we stop the wrong people accessing the wrong files? • How do we separate student and staff networks whilst enabling staff to appear on both? • Where do we put the intelligence that manages our network access rules? 16 1 Security
  • 17. What does good security look like? Correct Access Permissions • The right people access the data they need • The wrong people don’t have access to anything they shouldn’t
  • 18. 18 Give authorized users a secure environment • Users cannot do anything that may compromise their environment • No admin rights for standard users
  • 19. 19 A good method for elevating permissions for super-users • A secure and managed process for raising the permission levels of users
  • 20. 20 Reviewing access • Do people who have left or moved roles still have access to data?
  • 21. 21 Strong security at the edge or border • Firewalls to block external access • VLANs to separate networks
  • 22. 22 Certificates to encrypt/ decrypt data • Ensuring nothing gets modified in transit
  • 23. What’s actually going around our network? • Is your network a free-for-all where “whoever gets there first gets the most”? • Is more use of live streaming, video data and digital photography in learning vastly increasing your network traffic? 23 2 Resources
  • 24. What does good network management look like? Visibility of performance • Monitor switches • Alerts on thresholds of usage
  • 25. 25 Regular usage reviews/ capability checking • Is the school running low on ports? • Do you need to organise more switches now and reduce delays to users when more capacity is needed at short notice?
  • 26. 26 Where are the performance bottlenecks? • Are uplinks from edge switches able to cope with demand?
  • 27. 27 Quality of service • Can performance be improved by identifying different data types and prioritising?
  • 28. How can we connect anything anywhere and still manage it? • How many people are likely to want to connect and where? • How do you manage staff and students bringing their own devices to connect to your network? • How do you authenticate and track users and focus on what is safe for them to access? 28 3 Wireless
  • 29. What does good wireless management look like? Appropriate levels of access depending on connection type • Monitor switches • Alerts on thresholds of usage
  • 30. 30 Performance monitoring, specifically capacity and coverage • Ensure you have enough bandwidth or throughput to cope with demand • Ensure you can get a strong wireless signal in all required areas and not available elsewhere
  • 31. How can they get securely and simply connected in? • How do you control how visiting teachers, parents and students connect to the internet? • How do you separate that network from the core staff and students? • How can you ensure guest devices and traffic are secure? 31 4 Guests
  • 32. What does good guest management look like? Separation of networks • Only access limited services, if any • Undertake regular penetration testing
  • 33. 33 Guest access is simple and supports a wide variety of connecting devices • They just work without needing the IT team’s intervention
  • 34. So what is happening where and when? • How do you diagnose the symptoms when you hear “my connection is slow”? • How can you monitor: – Which devices are doing what? – How much bandwidth is being used ? – Which websites are being accessed? 34 5 Monitoring & Reporting
  • 35. What does good monitoring look like in schools? Automatic discovery • Changes and upgrades to devices get automatically factored in
  • 36. 36 Smart classification and mapping • Classify devices and map your network • Helps identify bottlenecks • Pinpoints devices which might be causing problems
  • 37. 37 Performance monitoring • You must be able to monitor available resources, bandwidth and device uptime • Controlled re-starts of devices can help banish glue in performance
  • 38. 38 Intelligent alerting • You can’t watch everything every minute • Alerts that make you aware of a situation before it becomes critical
  • 39. 39 Scalability and failover • Can you keep up with demands? • Build in redundancy as part of the solution to prepare for outages and hardware failure of your monitoring solution
  • 40. What are they and how do we avoid them? • How do we ensure the essential protection from: – Worms – Trojans – Spyware – Adware – Bots 40 6 Viruses & Malware
  • 41. What does good Virus & Malware protection look like? Up to date virus and malware definitions • Check at least hourly for new digital signatures
  • 43. 43 Email scanning outside of your network • On cloud based services etc. • Makes sure viruses don’t get as far as your network
  • 44. 44 AV Scanning on firewalls • Prevent viruses getting in at the border
  • 45. 45 Subscribing to virus alerts and notification services • Keep up to date with latest news • Global comms means geography is no longer a barrier to virus infection
  • 46. Homework from home? • Can your students, staff and in some cases parents access school resources from home? • Access to virtual desktops from home • Access to webmail from home for staff and students 46 7 Remote Access
  • 47. What does good remote access look like? High level of security in the access method. • Is a simple username and password enough? • Should you insist on two-factor authentication?
  • 48. 48 Encryption on connections • Prevent data being modified in transit
  • 49. 49 Control on what is accessible • Limiting what users access externally
  • 50. 50 Do you allow data to be transferred in or out of the network? • Do you monitor data being transferred? • Ensures data from a controlled area isn’t being moved to an uncontrolled one
  • 51. What if…? • How do you ensure data doesn’t get lost or corrupted? • Do you have a rigorous regime of regular maintenance and updates? • Do you have more than one server? 51 8 Resilience
  • 52. What does good remote access look like? No single points of failure • Never have just one of something • Find ways to put things in more than one location
  • 53. 53 Physical redundancy • Have additional hardware that will take over in event of failure
  • 54. 54 Is the redundant solution able to cope with the load in a failure environment? • E.g. A UPS is designed to give enough power to enable a safe shutdown – not power the hardware in case of failure
  • 55. 55 Geographic resilience • Internet lines that don’t follow the same route in to the building • Hardware installed in different locations
  • 56. So what have we learned?
  • 57. Networks can be A pain Holding us back Costing us money A bit tricky