SlideShare a Scribd company logo
8 Building Blocks for a High
Performance School Network
© Copyright 2014 Modrus
The Problem
2
The Problem
3
Mark Zuckerberg
Founder, Facebook
“Our policy at Facebook is literally to hire
as many talented engineers as we can
find. There just aren't enough people who
are trained and have these skills today.“
Eric Schmidt
Executive Chairman, Google
“For most people on Earth, the digital
revolution hasn't even started yet. Within
the next 10 years, all that will change.
The Problem
4
Greater network
and internet
security
Better monitoring
of who is
accessing what
Wider use of video
and graphical
content
Providing universal home
access for staff and students
Students and staff wanting to
connect to different kinds of
devices
Current pressures on School IT teams:
5
So, how can you
keep your school
networks on the
rails?
The Problem
6
Users typically lose up to
30 minutes a day waiting for
PC’s to load or reboot
(Gartner, 2009)
86% of users across Europe, Asia
and North America lose 18 hours
productivity or more a month. (Forrester,
April 2013)
The Problem
No. users affected
x
average cost per user
x
lost productivity %
100 staff
£25k average cost pp
Half an hour a day = 6% of working week
7
The Problem
No. users affected
x
average cost per user
x
lost productivity %
£150,000 lost per year
8
The Problem
9
Lowers both
staff and
student
morale
The Problem
10
Decreases
work
satisfaction
The Problem
11
Increases
stress in the
IT dept
The Problem
12
Loss of user
confidence
in IT Dept
So How Does Poor IT
Performance Impact
You?
8 building blocks for a high performance school IT network
8 Building
Blocks
Protecting whom from what?
• How do you make sure the right people can
access the right files?
• How can we stop the wrong people accessing
the wrong files?
• How do we separate student and staff networks
whilst enabling staff to appear on both?
• Where do we put the intelligence that manages
our network access rules?
16
1 Security
What does good security look like?
Correct
Access
Permissions
• The right people
access the data they
need
• The wrong people
don’t have access to
anything they
shouldn’t
18
Give authorized
users a secure
environment
• Users cannot do
anything that may
compromise their
environment
• No admin rights for
standard users
19
A good method
for elevating
permissions for
super-users
• A secure and
managed process for
raising the permission
levels of users
20
Reviewing
access
• Do people who have
left or moved roles still
have access to data?
21
Strong security
at the edge or
border
• Firewalls to block
external access
• VLANs to separate
networks
22
Certificates to
encrypt/
decrypt data
• Ensuring nothing gets
modified in transit
What’s actually going around our
network?
• Is your network a free-for-all where
“whoever gets there first gets the most”?
• Is more use of live streaming, video data
and digital photography in learning vastly
increasing your network traffic?
23
2 Resources
What does good network management look like?
Visibility of
performance
• Monitor switches
• Alerts on thresholds of
usage
25
Regular usage
reviews/
capability
checking
• Is the school running
low on ports?
• Do you need to
organise more
switches now and
reduce delays to
users when more
capacity is needed at
short notice?
26
Where are the
performance
bottlenecks?
• Are uplinks from edge
switches able to cope
with demand?
27
Quality of
service
• Can performance be
improved by
identifying different
data types and
prioritising?
How can we connect anything
anywhere and still manage it?
• How many people are likely to want to
connect and where?
• How do you manage staff and students
bringing their own devices to connect to
your network?
• How do you authenticate and track users
and focus on what is safe for them to
access?
28
3 Wireless
What does good wireless management look like?
Appropriate
levels of access
depending on
connection type
• Monitor switches
• Alerts on thresholds of
usage
30
Performance
monitoring,
specifically
capacity and
coverage
• Ensure you have
enough bandwidth or
throughput to cope
with demand
• Ensure you can get a
strong wireless signal
in all required areas
and not available
elsewhere
How can they get securely and
simply connected in?
• How do you control how visiting
teachers, parents and students connect
to the internet?
• How do you separate that network from
the core staff and students?
• How can you ensure guest devices and
traffic are secure?
31
4 Guests
What does good guest management look like?
Separation of
networks
• Only access limited
services, if any
• Undertake regular
penetration testing
33
Guest access is
simple and
supports a wide
variety of
connecting
devices
• They just work without
needing the IT team’s
intervention
So what is happening where and
when?
• How do you diagnose the symptoms
when you hear “my connection is slow”?
• How can you monitor:
– Which devices are doing what?
– How much bandwidth is being used ?
– Which websites are being accessed?
34
5 Monitoring & Reporting
What does good monitoring look like in schools?
Automatic
discovery
• Changes and
upgrades to devices
get automatically
factored in
36
Smart
classification
and mapping
• Classify devices and
map your network
• Helps identify
bottlenecks
• Pinpoints devices
which might be
causing problems
37
Performance
monitoring
• You must be able to
monitor available
resources, bandwidth
and device uptime
• Controlled re-starts of
devices can help
banish glue in
performance
38
Intelligent
alerting
• You can’t watch
everything every
minute
• Alerts that make you
aware of a situation
before it becomes
critical
39
Scalability and
failover
• Can you keep up with
demands?
• Build in redundancy
as part of the solution
to prepare for outages
and hardware failure
of your monitoring
solution
What are they and how do we avoid
them?
• How do we ensure the essential
protection from:
– Worms
– Trojans
– Spyware
– Adware
– Bots
40
6 Viruses & Malware
What does good Virus & Malware protection look like?
Up to date virus
and malware
definitions
• Check at least hourly
for new digital
signatures
42
Regular,
scheduled virus
scans on
devices
43
Email scanning
outside of your
network
• On cloud based
services etc.
• Makes sure viruses
don’t get as far as
your network
44
AV Scanning on
firewalls
• Prevent viruses
getting in at the border
45
Subscribing to
virus alerts and
notification
services
• Keep up to date with
latest news
• Global comms means
geography is no
longer a barrier to
virus infection
Homework from home?
• Can your students, staff and in some
cases parents access school
resources from home?
• Access to virtual desktops from
home
• Access to webmail from home for
staff and students
46
7 Remote Access
What does good remote access look like?
High level of
security in the
access method.
• Is a simple username
and password
enough?
• Should you insist on
two-factor
authentication?
48
Encryption on
connections
• Prevent data being
modified in transit
49
Control on what
is accessible
• Limiting what users
access externally
50
Do you allow
data to be
transferred in or
out of the
network?
• Do you monitor data
being transferred?
• Ensures data from a
controlled area isn’t
being moved to an
uncontrolled one
What if…?
• How do you ensure data doesn’t get
lost or corrupted?
• Do you have a rigorous regime of
regular maintenance and updates?
• Do you have more than one server?
51
8 Resilience
What does good remote access look like?
No single points
of failure
• Never have just one of
something
• Find ways to put
things in more than
one location
53
Physical
redundancy
• Have additional
hardware that will take
over in event of failure
54
Is the redundant
solution able to
cope with the
load in a failure
environment?
• E.g. A UPS is
designed to give
enough power to
enable a safe
shutdown – not power
the hardware in case
of failure
55
Geographic
resilience
• Internet lines that
don’t follow the same
route in to the building
• Hardware installed in
different locations
So what have
we learned?
Networks can be
A pain
Holding us back
Costing us money
A bit tricky
Security
Resources
Wireless
Guests
Monitoring & Reporting
Viruses & Malware
Remote Access
Resilience
www.modrus.com

More Related Content

PPT
Fetc byod best_prac
PPTX
Fetc byod best_prac
PPTX
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
PPTX
Use of PLEs by security and investigation professionals
PPTX
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
PDF
Security in the New World of Content and Documents
PPTX
Surviving a BYOD Implementation
PPTX
BYOD & Social Media: The Risks and Benefits for Education
Fetc byod best_prac
Fetc byod best_prac
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Use of PLEs by security and investigation professionals
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
Security in the New World of Content and Documents
Surviving a BYOD Implementation
BYOD & Social Media: The Risks and Benefits for Education

What's hot (19)

PPTX
Cyber Ed
PPTX
Educause2011PresentationFinal
PPTX
Incidents Up 39% and Other Impacts of Remote Work on IT
PPTX
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
PPT
Web Policies Presentation
PPTX
CompTIA Trends in Mobility
PPTX
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
PPTX
The challenge of security awareness
PDF
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
PPTX
C3 Presentation - Oct 2015
PPTX
Internet monitoring
PPTX
NAESP Conference - July 12, 2014
PPTX
GRRCON 2013: Imparting security awareness to all levels of users
PPTX
Network security
PDF
Information Security Awareness
PPTX
BEaPRO Presentation: Lafayette Elementary
PPT
New Hire Information Security Awareness
PPTX
Fall CUE Presentation: Building a Successful BYOD Program
PPTX
Education Privacy
Cyber Ed
Educause2011PresentationFinal
Incidents Up 39% and Other Impacts of Remote Work on IT
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Web Policies Presentation
CompTIA Trends in Mobility
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
The challenge of security awareness
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
C3 Presentation - Oct 2015
Internet monitoring
NAESP Conference - July 12, 2014
GRRCON 2013: Imparting security awareness to all levels of users
Network security
Information Security Awareness
BEaPRO Presentation: Lafayette Elementary
New Hire Information Security Awareness
Fall CUE Presentation: Building a Successful BYOD Program
Education Privacy
Ad

Viewers also liked (8)

PDF
High performance-learning-how-to-become-a-world-class-school
PDF
Supporting Professional Communities in the Next Web
PPT
Be the leader your dog thinks you are
PPTX
2014 Summer School Principals Meeting Presentation
PPTX
Year end performance review 2014
PPT
2011 Meet the Parents Session - 1NT (Year-End)
PPT
2011 Meet the Parents Session - 3NA (Year End)
PPTX
"DepEd Order No.2, s. 2015 Guidelines on the Establishment & Implementation o...
High performance-learning-how-to-become-a-world-class-school
Supporting Professional Communities in the Next Web
Be the leader your dog thinks you are
2014 Summer School Principals Meeting Presentation
Year end performance review 2014
2011 Meet the Parents Session - 1NT (Year-End)
2011 Meet the Parents Session - 3NA (Year End)
"DepEd Order No.2, s. 2015 Guidelines on the Establishment & Implementation o...
Ad

Similar to 8 building blocks for a high performance school IT network (20)

PDF
A practical guide to IT security-Up to University project
PPTX
Building An Education Network for the Future
PPTX
Mobile
PDF
Campus Mobility
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PDF
Protect the data - Cyber security - Breaches - Brand/Reputation
PDF
Information Security in Schools - Recommended Practice (January 2019)
PDF
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
PPTX
security_assessment_report_nidhi yadav.pptx
PPTX
Networks pres
PPT
Network security, change control, outsourcing
DOCX
• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
PPT
Supplement To Student Guide Seminar 03 A 3 Nov09
PDF
Solution manual for Business Data Communications- Infrastructure, Networking ...
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PPTX
1606662359-chapter-1-top-down-network-design.pptx
PPTX
Networks for Schools
PPT
Identifying and Using Network Hand Tools
PPTX
Empowering School Leaders to Manage and Lead I.T.
A practical guide to IT security-Up to University project
Building An Education Network for the Future
Mobile
Campus Mobility
PACE-IT, Security+1.3: Secure Network Design Elements and Components
Protect the data - Cyber security - Breaches - Brand/Reputation
Information Security in Schools - Recommended Practice (January 2019)
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
security_assessment_report_nidhi yadav.pptx
Networks pres
Network security, change control, outsourcing
• • ELEVENTH EDITION BUSINESS DATA NETWORKS AND
Supplement To Student Guide Seminar 03 A 3 Nov09
Solution manual for Business Data Communications- Infrastructure, Networking ...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
1606662359-chapter-1-top-down-network-design.pptx
Networks for Schools
Identifying and Using Network Hand Tools
Empowering School Leaders to Manage and Lead I.T.

Recently uploaded (20)

PDF
Hybrid model detection and classification of lung cancer
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
project resource management chapter-09.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
A Presentation on Touch Screen Technology
Hybrid model detection and classification of lung cancer
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Unlocking AI with Model Context Protocol (MCP)
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
Zenith AI: Advanced Artificial Intelligence
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
1 - Historical Antecedents, Social Consideration.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
project resource management chapter-09.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Enhancing emotion recognition model for a student engagement use case through...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A Presentation on Artificial Intelligence
Digital-Transformation-Roadmap-for-Companies.pptx
TLE Review Electricity (Electricity).pptx
A Presentation on Touch Screen Technology

8 building blocks for a high performance school IT network

  • 1. 8 Building Blocks for a High Performance School Network © Copyright 2014 Modrus
  • 3. The Problem 3 Mark Zuckerberg Founder, Facebook “Our policy at Facebook is literally to hire as many talented engineers as we can find. There just aren't enough people who are trained and have these skills today.“ Eric Schmidt Executive Chairman, Google “For most people on Earth, the digital revolution hasn't even started yet. Within the next 10 years, all that will change.
  • 4. The Problem 4 Greater network and internet security Better monitoring of who is accessing what Wider use of video and graphical content Providing universal home access for staff and students Students and staff wanting to connect to different kinds of devices Current pressures on School IT teams:
  • 5. 5 So, how can you keep your school networks on the rails?
  • 6. The Problem 6 Users typically lose up to 30 minutes a day waiting for PC’s to load or reboot (Gartner, 2009) 86% of users across Europe, Asia and North America lose 18 hours productivity or more a month. (Forrester, April 2013)
  • 7. The Problem No. users affected x average cost per user x lost productivity % 100 staff £25k average cost pp Half an hour a day = 6% of working week 7
  • 8. The Problem No. users affected x average cost per user x lost productivity % £150,000 lost per year 8
  • 9. The Problem 9 Lowers both staff and student morale
  • 12. The Problem 12 Loss of user confidence in IT Dept
  • 13. So How Does Poor IT Performance Impact You?
  • 16. Protecting whom from what? • How do you make sure the right people can access the right files? • How can we stop the wrong people accessing the wrong files? • How do we separate student and staff networks whilst enabling staff to appear on both? • Where do we put the intelligence that manages our network access rules? 16 1 Security
  • 17. What does good security look like? Correct Access Permissions • The right people access the data they need • The wrong people don’t have access to anything they shouldn’t
  • 18. 18 Give authorized users a secure environment • Users cannot do anything that may compromise their environment • No admin rights for standard users
  • 19. 19 A good method for elevating permissions for super-users • A secure and managed process for raising the permission levels of users
  • 20. 20 Reviewing access • Do people who have left or moved roles still have access to data?
  • 21. 21 Strong security at the edge or border • Firewalls to block external access • VLANs to separate networks
  • 22. 22 Certificates to encrypt/ decrypt data • Ensuring nothing gets modified in transit
  • 23. What’s actually going around our network? • Is your network a free-for-all where “whoever gets there first gets the most”? • Is more use of live streaming, video data and digital photography in learning vastly increasing your network traffic? 23 2 Resources
  • 24. What does good network management look like? Visibility of performance • Monitor switches • Alerts on thresholds of usage
  • 25. 25 Regular usage reviews/ capability checking • Is the school running low on ports? • Do you need to organise more switches now and reduce delays to users when more capacity is needed at short notice?
  • 26. 26 Where are the performance bottlenecks? • Are uplinks from edge switches able to cope with demand?
  • 27. 27 Quality of service • Can performance be improved by identifying different data types and prioritising?
  • 28. How can we connect anything anywhere and still manage it? • How many people are likely to want to connect and where? • How do you manage staff and students bringing their own devices to connect to your network? • How do you authenticate and track users and focus on what is safe for them to access? 28 3 Wireless
  • 29. What does good wireless management look like? Appropriate levels of access depending on connection type • Monitor switches • Alerts on thresholds of usage
  • 30. 30 Performance monitoring, specifically capacity and coverage • Ensure you have enough bandwidth or throughput to cope with demand • Ensure you can get a strong wireless signal in all required areas and not available elsewhere
  • 31. How can they get securely and simply connected in? • How do you control how visiting teachers, parents and students connect to the internet? • How do you separate that network from the core staff and students? • How can you ensure guest devices and traffic are secure? 31 4 Guests
  • 32. What does good guest management look like? Separation of networks • Only access limited services, if any • Undertake regular penetration testing
  • 33. 33 Guest access is simple and supports a wide variety of connecting devices • They just work without needing the IT team’s intervention
  • 34. So what is happening where and when? • How do you diagnose the symptoms when you hear “my connection is slow”? • How can you monitor: – Which devices are doing what? – How much bandwidth is being used ? – Which websites are being accessed? 34 5 Monitoring & Reporting
  • 35. What does good monitoring look like in schools? Automatic discovery • Changes and upgrades to devices get automatically factored in
  • 36. 36 Smart classification and mapping • Classify devices and map your network • Helps identify bottlenecks • Pinpoints devices which might be causing problems
  • 37. 37 Performance monitoring • You must be able to monitor available resources, bandwidth and device uptime • Controlled re-starts of devices can help banish glue in performance
  • 38. 38 Intelligent alerting • You can’t watch everything every minute • Alerts that make you aware of a situation before it becomes critical
  • 39. 39 Scalability and failover • Can you keep up with demands? • Build in redundancy as part of the solution to prepare for outages and hardware failure of your monitoring solution
  • 40. What are they and how do we avoid them? • How do we ensure the essential protection from: – Worms – Trojans – Spyware – Adware – Bots 40 6 Viruses & Malware
  • 41. What does good Virus & Malware protection look like? Up to date virus and malware definitions • Check at least hourly for new digital signatures
  • 43. 43 Email scanning outside of your network • On cloud based services etc. • Makes sure viruses don’t get as far as your network
  • 44. 44 AV Scanning on firewalls • Prevent viruses getting in at the border
  • 45. 45 Subscribing to virus alerts and notification services • Keep up to date with latest news • Global comms means geography is no longer a barrier to virus infection
  • 46. Homework from home? • Can your students, staff and in some cases parents access school resources from home? • Access to virtual desktops from home • Access to webmail from home for staff and students 46 7 Remote Access
  • 47. What does good remote access look like? High level of security in the access method. • Is a simple username and password enough? • Should you insist on two-factor authentication?
  • 48. 48 Encryption on connections • Prevent data being modified in transit
  • 49. 49 Control on what is accessible • Limiting what users access externally
  • 50. 50 Do you allow data to be transferred in or out of the network? • Do you monitor data being transferred? • Ensures data from a controlled area isn’t being moved to an uncontrolled one
  • 51. What if…? • How do you ensure data doesn’t get lost or corrupted? • Do you have a rigorous regime of regular maintenance and updates? • Do you have more than one server? 51 8 Resilience
  • 52. What does good remote access look like? No single points of failure • Never have just one of something • Find ways to put things in more than one location
  • 53. 53 Physical redundancy • Have additional hardware that will take over in event of failure
  • 54. 54 Is the redundant solution able to cope with the load in a failure environment? • E.g. A UPS is designed to give enough power to enable a safe shutdown – not power the hardware in case of failure
  • 55. 55 Geographic resilience • Internet lines that don’t follow the same route in to the building • Hardware installed in different locations
  • 56. So what have we learned?
  • 57. Networks can be A pain Holding us back Costing us money A bit tricky