SlideShare a Scribd company logo
Sophos UTM
Prepare your schools network for BYOD with Sophos UTM Wireless Protection
Agenda

                   Q&A            What is
                                  BYOD?



    How Sophos                              BYOD
    UTM can help
                         Agenda             Benefts



                                    BYOD
              Concerns &          Preparation
             Considerations



2
What is BYOD?

    • General term which may mean different things to
      different people
    • Big topic that covers more than just technology
    • Most people agree it means allowing personal devices to
      access business networks
    • Also used to describe programs where equipment is
      provided (1 – 1 initiatives)
    • BYOD concerns relate to both policy and infrastructure
    • This talk will focus mostly on infrastructure concerns


3
BYOD Benefits to Schools
Why the trend?

    • U.S. Department of Education suggested BYOD in 2010
      National Technology plan
     • http://www.ed.gov/technology/netp-2010/executive-summary
    • Technology may enhance:
     •   Creativity and Innovation
     •   Communication and Collaboration
     •   Critical thinking, Problem solving, Decision making
     •   Present concept of Digital Citizenship
    • Tech skills are essential for modern life and business
    • BYOD may save money
     • On equipment, app’s, and management


4
BYOD Preparations
What should you be thinking of if you’re planning a BYOD initiative?

    • BYOD Policy
     • What are we trying to accomplish?
     • What’s acceptable use for equipment and network?
    • Infrastructure
     • What do we need to support the policy?
     • Do we have the proper equipment or do we need to purchase?
    • Impact on community
     • Are teachers prepared to use and maybe support devices?
     • Privacy concerns, can all students afford devices, do parents
       support, etc…



5
BYOD Infrastructure Considerations
The Network

    • How many new users/devices are you adding onto your
      network? Twice as many? 3 times?
    • Will your current network handle that traffic?
    • What are the security risks? (How can we ensure that
      Guest and/or BYOD traffic is segregated?
    • Will current network and web security solutions be able
      to support BYOD policy?
    • How much extra work is this going to be for IT staff?




6
BYOD Infrastructure Considerations
The Network

    • Network & Web Security equipment should provide (at
      least):
     •   QOS functionality to shape bandwidth
     •   Content filtering to enforce CIPA
     •   Application Control (Next Generation Layer 7 Firewall)
     •   Ability to scale as demands increase
     •   Reporting




7
BYOD Infrastructure Considerations
Your Wireless solution and its capabilities


    •   Does it support multiple SSID’s (wireless zones)?
    •   What security policies does it offer?
    •   What levels of encryption does it offer?
    •   How easy it is to add capacity?
    •   What are the Guest capabilities?
    •   How much work for staff to deploy and manage?




8
BYOD Infrastructure Considerations
Your Wireless solution and its capabilities


    • Wireless Solution should provide (at a minimum):
     •   Multiple Wireless Zones
     •   At least WPA2 encryption
     •   Ability to integrate with security solutions
     •   Usage reporting
     •   Guest Options




9
How can Sophos help with BYOD?

     • Sophos Mobile Device Management solution

     • Sophos Endpoint protection for Laptops

     • Sophos UTM Wireless Protection




10
Sophos Wireless Protection

     •   Easy deployment of Access Points
     •   Simple setup and management of zones
     •   Enterprise level encryption
     •   Configurable Guest options
     •   Integrated protection via UTM security suite
     •   Easily scales to meet increased demand




11
Sophos UTM Wireless Protection
Components



                            Now also
                            available
                          Sophos AP 50




12
Sophos AP 10 / AP 30
Plug and Play Access Points for classrooms

     AP 10                                   AP 30
     • Up to 10 users                        • Up to 30 users
     • 150 Mbit/s throughput                 • 300 Mbit/s throughput
     • 1 x 10/100 Base TX                    • 1 x 10/100 Base TX
     • IEEE 802.11 b/g/n                     • IEEE 802.11 b/g/n
     • 1 x detachable dipole antenna         • 3 x internal antennas
     • Power consumption: < 8 Watt           • Power consumption: < 8 Watt
     • Desktop/wall mounting                 • Desktop/ceiling mounting
                                             • Power over Ethernet (IEEE 802.3af)



                                                PoE-Injector included!




13
Sophos AP 50
Plug and Play Access Points for common areas

     • Dual-band/dual-radio access point
     • IEEE 802.11 a/b/g/n support
     • Support for up to 50 users
     • 300 Mbit/s throughput
     • 1 x 10/100/1000 Base TX
     • PoE+ compatibility (IEEE 802.3at)
     • Power consumption: < 10 W
     • 2 x 2.4G/5G detachable antenna
     • Desktop/wall mounting



          PoE-Injector included!




14
Centralized Management
Built-in wireless controller




                               Sophos UTM




15
Easy installation



                                         Guest

                    Sophos UTM




                                 Staff
                     Student




16
Guest Portal Hotspot support
Most flexible UTM based
Hotspot solution

• Manage temporary Internet
  Access for guests
• Options for:
        Configurable Usage agreement and
         logos
        Automatic ‘Password of the day’
        Quota’s on time and usage


Part of UTM Wireless Subscription




17
Flexible access for the entire organization
Sophos Access Points can be placed anywhere in your organization.
Easily create multiple separate wireless zones.




18
Advantages
Sophos UTM Wireless Protection
     Easy installation and management
      • Centralized configuration (all work done via UTM GUI)
      • Plug and Play Access Point simplify deployment


     Secure and reliable
      • Integrated UTM security for wireless devices
      • Best protection for wireless connections (separate zones, isolate client
        connections, configure quota’s)


     Flexible access
      • Easy Internet access options for guests
      • Multiple SSID support for varying levels of access



19
Integrated security
Once connected to the UTM easily integrates with other security features



                                        Strong Encryption




                   Sophos UTM




           Integrated UTM Security




20
UTM Security features
Optional Subscriptions provide the security features you want
                                      UTM Endpoint
                                      Protection Antivirus

                                      • Antivirus
                                      • HIPS
                                      • Device Control
     UTM Wireless                                                  UTM Network
     Protection                                                    Protection
                                                       optional
                                                                   •   Intrusion prevention
     • Wireless controller         Essential Network               •   IPSec/SSL VPN & RED
     • Multi-zone (SSID) support   Firewall                        •   HTML5 VPN Portal
     • Captive Portal                                              •   Reporting
                                   • Stateful firewall
                                   • Network address translation
                                   • PPTP/L2TP remote access


     UTM Webserver                                                 UTM Web
     Protection                                                    Protection

                                                                   •   URL filter
     • Reverse proxy                                               •   Antivirus & antispyware
     • Web application firewall     UTM Email
                                                                   •   Application control
     • Antivirus                    Protection
                                                                   •   Reporting
                                    • Anti-spam & -phishing
                                    • Dual virus protection
                                    • Email encryption
21
Sophos UTM fit any size network
     Hardware                                                                                                            Multiple
                      UTM 110/120   UTM 220        UTM 320         UTM 425         UTM 525           UTM 625
     Appliance                                                                                                           + RED




                         Small      Medium          Medium           Large           Large             Large         Large networks
     Environment
                        network     network         network         network         network           network          + branches


     Network ports         4           8               8           6 & 2 SFP      10 & 4 SFP         10 & 8 SFP           Multiple

     Max.
     recommended         10/80        300             800            1.500           3.500             5.000             10.000+
     firewall users
     Max.
     recommended         10/35        75              200             600            1.300             2.000               5.000
     UTM users

     Software
     Appliance *                                   Runs on Intel-compatible PCs and servers


     Virtual                                         VMware Ready & Citrix Ready certified
     Appliance *                              Runs in Hyper-V, KVM, and other virtual environments




                                                                                                                *Pricing based #IPs/Users
22
Resources
Questions?


     • National Educational Technology Standards
       •   http://www.iste.org/STANDARDS


       http://digitalcitizenship.net/

       http://www.zdnet.com/how-to-write-a-byod-policy-7000003502/

       http://www.fathomdelivers.com/the-benefits-and-risks-of-byod-in-
       schools/




23
Staying ahead of the curve
Staying ahead of the curve
                                         US and Canada
      facebook.com/securitybysophos     1-866-866-2802
                                      NASales@sophos.com

      Sophos on Google+


                                       UK and Worldwide
      linkedin.com/company/sophos
                                        + 44 1235 55 9933
                                       Sales@sophos.com

      twitter.com/Sophos_News


      nakedsecurity.sophos.com


                                                    24

More Related Content

PDF
Is Your Network Ready for BYOD?
PPTX
UTM - The Complete Security Box
PPTX
Get the Most From Your Firewall
PPTX
Consider Sophos - Security Made Simple
PPT
4 Steps to Optimal Endpoint Settings
PPTX
8 Threats Your Anti-Virus Won't Stop
PPTX
Complete Security
PPTX
Endpoint Protection
Is Your Network Ready for BYOD?
UTM - The Complete Security Box
Get the Most From Your Firewall
Consider Sophos - Security Made Simple
4 Steps to Optimal Endpoint Settings
8 Threats Your Anti-Virus Won't Stop
Complete Security
Endpoint Protection

What's hot (20)

PPTX
BYOD - Protecting Your School
PPTX
Sophos utm-roadshow-south africa-2012
PPTX
What's cooking at Sophos - an introduction to Synchronized Security
PPT
Sophos Utm Presentation 2016
PPTX
Exposing the Money Behind Malware
PPTX
2013 Security Threat Report Presentation
PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Sophos Next-Generation Enduser Protection
PPTX
The next generation of IT security
PPTX
Sophos Mobile Control - Product Overview
PPTX
Cyberoam Firewall Presentation
PPTX
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
PPTX
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
PPTX
The Importance of Endpoint Protection - Featuring SEP 14
PPT
Tech 101: Understanding Firewalls
PPTX
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
PDF
Network Security Certification
PDF
Panda Security - Endpoint Protection
PPT
FireEye
BYOD - Protecting Your School
Sophos utm-roadshow-south africa-2012
What's cooking at Sophos - an introduction to Synchronized Security
Sophos Utm Presentation 2016
Exposing the Money Behind Malware
2013 Security Threat Report Presentation
Security: more important than ever - Sophos Day Belux 2014
Sophos Next-Generation Enduser Protection
The next generation of IT security
Sophos Mobile Control - Product Overview
Cyberoam Firewall Presentation
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
The Importance of Endpoint Protection - Featuring SEP 14
Tech 101: Understanding Firewalls
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Network Security Certification
Panda Security - Endpoint Protection
FireEye
Ad

Similar to Preparing Your School for BYOD with Sophos UTM Wireless Protection (20)

PDF
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
PDF
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
PDF
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
PDF
PPTX
Gab 2015 aymeric weinbach azure iot
PPTX
Juniper srx-branch-mid-range firewall.pptx
PPTX
6-IoT protocol.pptx
PDF
Introduction à l'écosystème de l'Internet des Objets
PPTX
Mesh Surveillance Camera | EnGenius
PPTX
Retail Location Security Complexities
PDF
Solving the BYOD Problem with Open Standards
PDF
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
PPTX
Minimizing Information Transparency
PDF
DEF CON 23 - vivek ramachadran - chellam
PDF
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
PDF
Presentatie Alcom - Meetup
PPT
SSL & TLS Architecture short
PPTX
Zero Trust for Private 5G and Edge
PPTX
Cloaking is the new perimeter
PPTX
Cloaking is the new perimeter
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
Gab 2015 aymeric weinbach azure iot
Juniper srx-branch-mid-range firewall.pptx
6-IoT protocol.pptx
Introduction à l'écosystème de l'Internet des Objets
Mesh Surveillance Camera | EnGenius
Retail Location Security Complexities
Solving the BYOD Problem with Open Standards
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Minimizing Information Transparency
DEF CON 23 - vivek ramachadran - chellam
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
Presentatie Alcom - Meetup
SSL & TLS Architecture short
Zero Trust for Private 5G and Edge
Cloaking is the new perimeter
Cloaking is the new perimeter
Ad

More from Sophos (7)

PPTX
Sophos Wireless Protection Overview
PPTX
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
PPTX
Sophos EndUser Protection
PDF
2013 Security Threat Report
PPTX
When Malware Goes Mobile
PPTX
IT Security DOs und DON’Ts (Italian)
PPTX
IT Security DOs and DON'Ts
Sophos Wireless Protection Overview
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Sophos EndUser Protection
2013 Security Threat Report
When Malware Goes Mobile
IT Security DOs und DON’Ts (Italian)
IT Security DOs and DON'Ts

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A novel scalable deep ensemble learning framework for big data classification...
Tartificialntelligence_presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Group 1 Presentation -Planning and Decision Making .pptx
NewMind AI Weekly Chronicles - August'25-Week II
OMC Textile Division Presentation 2021.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A comparative analysis of optical character recognition models for extracting...
Mushroom cultivation and it's methods.pdf
A Presentation on Artificial Intelligence
DP Operators-handbook-extract for the Mautical Institute
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Web App vs Mobile App What Should You Build First.pdf
Encapsulation theory and applications.pdf
Chapter 5: Probability Theory and Statistics

Preparing Your School for BYOD with Sophos UTM Wireless Protection

  • 1. Sophos UTM Prepare your schools network for BYOD with Sophos UTM Wireless Protection
  • 2. Agenda Q&A What is BYOD? How Sophos BYOD UTM can help Agenda Benefts BYOD Concerns & Preparation Considerations 2
  • 3. What is BYOD? • General term which may mean different things to different people • Big topic that covers more than just technology • Most people agree it means allowing personal devices to access business networks • Also used to describe programs where equipment is provided (1 – 1 initiatives) • BYOD concerns relate to both policy and infrastructure • This talk will focus mostly on infrastructure concerns 3
  • 4. BYOD Benefits to Schools Why the trend? • U.S. Department of Education suggested BYOD in 2010 National Technology plan • http://www.ed.gov/technology/netp-2010/executive-summary • Technology may enhance: • Creativity and Innovation • Communication and Collaboration • Critical thinking, Problem solving, Decision making • Present concept of Digital Citizenship • Tech skills are essential for modern life and business • BYOD may save money • On equipment, app’s, and management 4
  • 5. BYOD Preparations What should you be thinking of if you’re planning a BYOD initiative? • BYOD Policy • What are we trying to accomplish? • What’s acceptable use for equipment and network? • Infrastructure • What do we need to support the policy? • Do we have the proper equipment or do we need to purchase? • Impact on community • Are teachers prepared to use and maybe support devices? • Privacy concerns, can all students afford devices, do parents support, etc… 5
  • 6. BYOD Infrastructure Considerations The Network • How many new users/devices are you adding onto your network? Twice as many? 3 times? • Will your current network handle that traffic? • What are the security risks? (How can we ensure that Guest and/or BYOD traffic is segregated? • Will current network and web security solutions be able to support BYOD policy? • How much extra work is this going to be for IT staff? 6
  • 7. BYOD Infrastructure Considerations The Network • Network & Web Security equipment should provide (at least): • QOS functionality to shape bandwidth • Content filtering to enforce CIPA • Application Control (Next Generation Layer 7 Firewall) • Ability to scale as demands increase • Reporting 7
  • 8. BYOD Infrastructure Considerations Your Wireless solution and its capabilities • Does it support multiple SSID’s (wireless zones)? • What security policies does it offer? • What levels of encryption does it offer? • How easy it is to add capacity? • What are the Guest capabilities? • How much work for staff to deploy and manage? 8
  • 9. BYOD Infrastructure Considerations Your Wireless solution and its capabilities • Wireless Solution should provide (at a minimum): • Multiple Wireless Zones • At least WPA2 encryption • Ability to integrate with security solutions • Usage reporting • Guest Options 9
  • 10. How can Sophos help with BYOD? • Sophos Mobile Device Management solution • Sophos Endpoint protection for Laptops • Sophos UTM Wireless Protection 10
  • 11. Sophos Wireless Protection • Easy deployment of Access Points • Simple setup and management of zones • Enterprise level encryption • Configurable Guest options • Integrated protection via UTM security suite • Easily scales to meet increased demand 11
  • 12. Sophos UTM Wireless Protection Components Now also available Sophos AP 50 12
  • 13. Sophos AP 10 / AP 30 Plug and Play Access Points for classrooms AP 10 AP 30 • Up to 10 users • Up to 30 users • 150 Mbit/s throughput • 300 Mbit/s throughput • 1 x 10/100 Base TX • 1 x 10/100 Base TX • IEEE 802.11 b/g/n • IEEE 802.11 b/g/n • 1 x detachable dipole antenna • 3 x internal antennas • Power consumption: < 8 Watt • Power consumption: < 8 Watt • Desktop/wall mounting • Desktop/ceiling mounting • Power over Ethernet (IEEE 802.3af) PoE-Injector included! 13
  • 14. Sophos AP 50 Plug and Play Access Points for common areas • Dual-band/dual-radio access point • IEEE 802.11 a/b/g/n support • Support for up to 50 users • 300 Mbit/s throughput • 1 x 10/100/1000 Base TX • PoE+ compatibility (IEEE 802.3at) • Power consumption: < 10 W • 2 x 2.4G/5G detachable antenna • Desktop/wall mounting PoE-Injector included! 14
  • 15. Centralized Management Built-in wireless controller Sophos UTM 15
  • 16. Easy installation Guest Sophos UTM Staff Student 16
  • 17. Guest Portal Hotspot support Most flexible UTM based Hotspot solution • Manage temporary Internet Access for guests • Options for:  Configurable Usage agreement and logos  Automatic ‘Password of the day’  Quota’s on time and usage Part of UTM Wireless Subscription 17
  • 18. Flexible access for the entire organization Sophos Access Points can be placed anywhere in your organization. Easily create multiple separate wireless zones. 18
  • 19. Advantages Sophos UTM Wireless Protection Easy installation and management • Centralized configuration (all work done via UTM GUI) • Plug and Play Access Point simplify deployment Secure and reliable • Integrated UTM security for wireless devices • Best protection for wireless connections (separate zones, isolate client connections, configure quota’s) Flexible access • Easy Internet access options for guests • Multiple SSID support for varying levels of access 19
  • 20. Integrated security Once connected to the UTM easily integrates with other security features Strong Encryption Sophos UTM Integrated UTM Security 20
  • 21. UTM Security features Optional Subscriptions provide the security features you want UTM Endpoint Protection Antivirus • Antivirus • HIPS • Device Control UTM Wireless UTM Network Protection Protection optional • Intrusion prevention • Wireless controller Essential Network • IPSec/SSL VPN & RED • Multi-zone (SSID) support Firewall • HTML5 VPN Portal • Captive Portal • Reporting • Stateful firewall • Network address translation • PPTP/L2TP remote access UTM Webserver UTM Web Protection Protection • URL filter • Reverse proxy • Antivirus & antispyware • Web application firewall UTM Email • Application control • Antivirus Protection • Reporting • Anti-spam & -phishing • Dual virus protection • Email encryption 21
  • 22. Sophos UTM fit any size network Hardware Multiple UTM 110/120 UTM 220 UTM 320 UTM 425 UTM 525 UTM 625 Appliance + RED Small Medium Medium Large Large Large Large networks Environment network network network network network network + branches Network ports 4 8 8 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Multiple Max. recommended 10/80 300 800 1.500 3.500 5.000 10.000+ firewall users Max. recommended 10/35 75 200 600 1.300 2.000 5.000 UTM users Software Appliance * Runs on Intel-compatible PCs and servers Virtual VMware Ready & Citrix Ready certified Appliance * Runs in Hyper-V, KVM, and other virtual environments *Pricing based #IPs/Users 22
  • 23. Resources Questions? • National Educational Technology Standards • http://www.iste.org/STANDARDS http://digitalcitizenship.net/ http://www.zdnet.com/how-to-write-a-byod-policy-7000003502/ http://www.fathomdelivers.com/the-benefits-and-risks-of-byod-in- schools/ 23
  • 24. Staying ahead of the curve Staying ahead of the curve US and Canada facebook.com/securitybysophos 1-866-866-2802 NASales@sophos.com Sophos on Google+ UK and Worldwide linkedin.com/company/sophos + 44 1235 55 9933 Sales@sophos.com twitter.com/Sophos_News nakedsecurity.sophos.com 24