SlideShare a Scribd company logo
1 of 7
Download to read offline
Protect Students. Secure Data.
Improve Productivity.
Advanced IT Solutions to Secure and Enrich Your Learning Environment
Student Safety First.
eLearning and the adoption of mobility initiatives, social media, online
collaboration, and other types of technological engagement are the most
significant and exciting changes to emerge for education establishments in the 21st
century. The paradigm shift brought on by these new teaching and learning
methods also opens a new frontier of simple to sophisticated threats that require a
new way of thinking about IT solutions. It also makes the heroic feats IT performs at
your school more crucial than ever.
At Altinet, we understand the unprecedented challenges that you and your staff
are facing. We offer the industry’s most advanced, cost-effective solutions to
maintain a safe, secure, and thriving eLearning environment and school
community. Whether your needs are on-premises, cloud-hosted, or a blend of both,
at Altinet, we’ve got you covered.
KEY	
  CUSTOMER	
  CHALLENGES	
  	
   ALTINET	
  SOLUTION	
  
Web	
  2.0	
  Control	
   The	
  need	
  to	
  monitor	
  Web	
  2.0	
  has	
  increased	
  over	
  the	
  last	
  3	
  years	
  and	
  all	
  our	
  solu9ons	
  have	
  
granular	
  controls	
  over	
  web	
  applica9ons	
  and	
  social	
  media	
  pla=orms	
  such	
  as	
  Facebook	
  &	
  
YouTube.	
  With	
  educa9on	
  specific	
  features	
  such	
  as	
  blocking	
  Facebook	
  posts	
  and	
  ac9va9ng	
  
YouTube	
  for	
  Educa9on.	
  	
  
ApplicaAon	
  Controls	
   In	
  addi9on	
  to	
  the	
  Web	
  2.0	
  controls	
  we	
  also	
  control	
  applica9ons	
  at	
  the	
  port	
  level	
  using	
  deep	
  
packet	
  inspec9on	
  technology,	
  therefore	
  ensuring	
  all	
  school	
  have	
  layer	
  7	
  blocking	
  
capabili9es.	
  	
  	
  
SLL	
  InspecAon	
  	
   SLL	
  Inspec9on	
  is	
  included	
  on	
  all	
  Al9net	
  products	
  allowing	
  IT	
  Administrators	
  to	
  monitor	
  and	
  
control	
  content	
  that	
  is	
  normally	
  hidden.	
  	
  	
  
Comprehensive	
  ReporAng	
   Per	
  User/Per	
  Group	
  repor9ng	
  allowing	
  in	
  depth	
  annalysis	
  into	
  web	
  ac9vity	
  at	
  specific	
  9mes/
dates.	
  	
  
Real-­‐Time	
  Content	
  Filtering	
  	
   We	
  offer	
  the	
  opportunity	
  to	
  have	
  real-­‐9me	
  filtering,	
  meaning	
  solu9ons	
  are	
  not	
  100%	
  reliant	
  
on	
  URL	
  databases,	
  therefore	
  providing	
  zero-­‐second	
  threat	
  protec9on.	
  
Web Content Filtering.
“It’s	
  so	
  simple!	
  The	
  Web	
  Filter	
  does	
  all	
  of	
  the	
  work	
  and	
  
makes	
  it	
  easy	
  for	
  us	
  to	
  allow	
  our	
  users	
  to	
  safely	
  surf	
  the	
  
Web.”	
  
	
  
Al9net	
  work	
  with	
  a	
  variety	
  of	
  Web	
  Content	
  Filtering	
  vendors	
  to	
  ensure	
  that	
  each	
  school	
  is	
  geVng	
  the	
  level	
  of	
  
granularity	
  that	
  is	
  required.	
  Web	
  2.0,	
  Social	
  Media	
  controls	
  and	
  Applica9on	
  Monitoring	
  are	
  included	
  as	
  
standard	
  to	
  ensure	
  your	
  visibility	
  over	
  the	
  network	
  is	
  complete.	
  BYOD	
  requirements	
  are	
  con9nuously	
  
expanding	
  and	
  the	
  integra9on	
  with	
  wireless	
  solu9ons	
  is	
  one	
  of	
  Al9net’s	
  strengths	
  in	
  deployment.	
  	
  	
  
KEY	
  CUSTOMER	
  CHALLENGES	
  	
   ALTINET	
  SOLUTION	
  
Spam	
  ProtecAon	
  	
   We	
  work	
  with	
  the	
  market	
  leaders	
  in	
  protec9ng	
  customers	
  from	
  Spam.	
  Iden9fying	
  
email	
  from	
  known	
  spammers	
  or	
  blacklisted	
  domains.	
  Our	
  solu9ons	
  leverage	
  mul9ple	
  
industry-­‐leading	
  techniques	
  to	
  reduce	
  the	
  spam	
  entering	
  your	
  network.	
  
Virus	
  ProtecAon	
  	
   All	
  our	
  solu9ons	
  include	
  Virus	
  protec9on.	
  We	
  work	
  on	
  reducing	
  the	
  poten9al	
  for	
  
destruc9on	
  and	
  the	
  release	
  of	
  informa9on	
  through	
  cyber	
  a_acks	
  via	
  email.	
  Therefore	
  
all	
  emails	
  inbound	
  &	
  outbound	
  are	
  scanned	
  and	
  monitored.	
  	
  
Office	
  365	
  IntegraAon	
  	
   We	
  understand	
  the	
  migra9on	
  to	
  Office	
  365	
  in	
  educa9on	
  and	
  have	
  adapted	
  out	
  
product	
  offering	
  to	
  meet	
  these	
  requirements.	
  	
  
Data	
  Leak	
  PrevenAon	
  	
   Our	
  solu9ons	
  offer	
  a	
  new	
  a	
  number	
  of	
  encryp9on	
  features	
  to	
  ensure	
  that	
  your	
  data	
  is	
  
protected	
  from	
  the	
  outside	
  world.	
  This	
  include	
  256-­‐Bit	
  Encryp9on	
  to	
  encrypt	
  email	
  
traffic	
  between	
  the	
  sites.	
  	
  
Inbound/Outbound	
  Filtering	
   Inbound	
  &	
  Outbound	
  filtering	
  to	
  protect	
  all	
  traffic	
  and	
  prevent	
  sensi9ve	
  data	
  leaving	
  
your	
  network	
  as	
  well	
  as	
  spam	
  traffic	
  entering,	
  therefore	
  ensuring	
  a	
  full	
  threat	
  
protec9on	
  policy	
  is	
  implemented.	
  
Email Spam & Virus Security.
“The	
  solu>on	
  which	
  Al>net	
  have	
  implemented	
  
has	
  enabled	
  us	
  to	
  focus	
  on	
  other	
  areas	
  of	
  out	
  
network	
  with	
  the	
  confidence	
  that	
  our	
  email	
  is	
  
fully	
  protected	
  and	
  spam	
  free	
  .”	
  
	
  
All	
  Al9net’s	
  Email	
  Spam	
  &	
  Virus	
  Security	
  solu9ons	
  look	
  to	
  increase	
  the	
  protec9on	
  from	
  inbound	
  &	
  outbound	
  
email	
  traffic,	
  whilst	
  at	
  the	
  same	
  9me	
  leveraging	
  the	
  next-­‐genera9on	
  email	
  solu9ons	
  such	
  as	
  Office	
  365.	
  	
  We	
  
implement	
  complete	
  email	
  management	
  solu9ons	
  to	
  	
  increase	
  security	
  on-­‐premise	
  and	
  in	
  the	
  cloud	
  	
  and	
  
reduce	
  management	
  9me.	
  
Data Backup & Storage.
BACKUP	
  SOFTWARE	
   BACKUP	
  HARDWARE	
   CLOUD	
  BACKUP	
  
Incremental	
  backups	
  removing	
  this	
  need	
  for	
  
full	
  daily/monthly	
  backups	
  
Dedicated	
  Hardware	
  Appliances	
  designed	
  
for	
  the	
  required	
  network.	
  Devices	
  range	
  
from	
  	
  500GB-­‐20TB.	
  
All	
  the	
  storage	
  you	
  need	
  to	
  replicate	
  
backups	
  to	
  the	
  cloud	
  and	
  extend	
  reten9ons	
  
Inline	
  or	
  Global	
  Data	
  deduplicaAon	
  reducing	
  
the	
  storage	
  capacity	
  and	
  overall	
  saving	
  costs	
  
Redundant	
  RAID	
  included	
  on	
  all	
  appliances	
  
for	
  DR	
  
Geographically	
  distributed	
  enterprise	
  grade	
  
data	
  centers	
  to	
  prevent	
  data	
  loss	
  
Virtual	
  &	
  Physical	
  machine	
  integra9on	
  on	
  
one	
  solu9on	
  	
  
Swappable	
  disks	
  included	
  on	
  all	
  appliances	
  
with	
  the	
  hot	
  swappable	
  disks	
  on	
  specific	
  
devices	
  	
  	
  
Off-­‐Site	
  VaulAng	
  Included	
  
Granular	
  file	
  based	
  backup	
  recovery	
  as	
  a	
  full	
  
restore	
  or	
  individual	
  file	
  download	
  to	
  a	
  local	
  
disk	
  
256-­‐Bit	
  EncrypAon,	
  Man	
  Traps,	
  2+1	
  
Redundancy	
  	
  
Cloud	
  Management	
  allows	
  control	
  over	
  the	
  
backups	
  24X7	
  anywhere	
  at	
  any9me	
  
Bandwidth	
  controls	
  to	
  ensure	
  incremental	
  
backups	
  occur	
  outside	
  core	
  bandwidth	
  
intensive	
  hours	
  
“We	
  had	
  a	
  mixture	
  of	
  tape,	
  NAS	
  drives	
  and	
  backup	
  
soGware,	
  but	
  Al>net	
  came	
  in	
  a	
  made	
  our	
  backup	
  
process	
  simple	
  and	
  increased	
  our	
  Disaster	
  Recovery	
  
drama>cally.”	
  
	
  
Al9net	
  work	
  with	
  the	
  mul9ple	
  educa9onal	
  establishments	
  to	
  remove	
  historical	
  data	
  backup	
  solu9ons	
  with	
  fully	
  
integrated	
  complete	
  data	
  backup	
  solu9on	
  for	
  both	
  virtual	
  and	
  physical	
  environments.	
  We	
  look	
  to	
  make	
  the	
  
backup	
  process	
  simple	
  with	
  one	
  solu9on	
  for	
  the	
  Backup	
  Sofware,	
  Hardware	
  and	
  Cloud	
  replica9on,	
  making	
  the	
  
management	
  and	
  implementa9on	
  simple	
  and	
  hassle	
  free.	
  	
  	
  
See What our Customers are Saying...
It’s	
  so	
  simple!	
  The	
  Web	
  Filter	
  Al>net	
  
Implemented	
  does	
  all	
  of	
  the	
  work	
  and	
  
makes	
  it	
  easy	
  for	
  us	
  to	
  allow	
  our	
  users	
  to	
  
safely	
  surf	
  the	
  Web.	
  
	
  
Sco$	
  Jones	
  
IT	
  Manager	
  
Botham	
  School	
  	
  The	
  Backup	
  solu>on	
  has	
  provided	
  us	
  
with	
  seamless	
  restores	
  and	
  we	
  now	
  
restore	
  much	
  more	
  frequently	
  than	
  
we	
  did	
  when	
  we	
  were	
  on	
  tape.	
  It	
  is	
  
no	
  longer	
  a	
  decision	
  between	
  file	
  
importance	
  and	
  need	
  versus	
  >me	
  
to	
  complete	
  a	
  restore.	
  
	
  
Stephen	
  Foakes	
  
IT	
  Manager	
  
The	
  Glasgow	
  Academy	
  
The	
  solu>on	
  which	
  Al>net	
  have	
  
implemented	
  has	
  enabled	
  us	
  to	
  focus	
  on	
  
other	
  areas	
  of	
  out	
  network	
  with	
  the	
  
confidence	
  that	
  our	
  email	
  is	
  fully	
  protected	
  
and	
  spam	
  free	
  	
  Thomas	
  Makridis	
  
IT	
  Manager	
  
High	
  School	
  Of	
  Glasgow	
  
Free Demonstration. Evaluation.
Meeting.
Speak to one of our education experts to get a complete
understanding of how we can help your school increase
security and reduce costs.
01138870190
sales@altinet.co.uk

More Related Content

What's hot

How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...UCloud Asia Pte Ltd
 
M365 launch event introduction - 090518
M365 launch event   introduction - 090518M365 launch event   introduction - 090518
M365 launch event introduction - 090518Jonathan Stuckey
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceDavid J Rosenthal
 
Mimecast and O365 - Service Selection Brochure
Mimecast and O365 - Service Selection BrochureMimecast and O365 - Service Selection Brochure
Mimecast and O365 - Service Selection BrochureStephen Dorling
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityPeopleWorks IN
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
Microsoft 365 business presentation
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentationGordon Pong
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
 
Windows 10 Modern Management
Windows 10 Modern ManagementWindows 10 Modern Management
Windows 10 Modern ManagementDavid J Rosenthal
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesTLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesEnterprise Management Associates
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudSymantec
 
Complete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm SeminarComplete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm SeminarPT Datacomm Diangraha
 

What's hot (20)

Capsule_datasheet
Capsule_datasheetCapsule_datasheet
Capsule_datasheet
 
Stay Ahead of Risk
Stay Ahead of RiskStay Ahead of Risk
Stay Ahead of Risk
 
How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...
 
M365 launch event introduction - 090518
M365 launch event   introduction - 090518M365 launch event   introduction - 090518
M365 launch event introduction - 090518
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business Resilience
 
Mimecast and O365 - Service Selection Brochure
Mimecast and O365 - Service Selection BrochureMimecast and O365 - Service Selection Brochure
Mimecast and O365 - Service Selection Brochure
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Microsoft 365 business presentation
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentation
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Windows 10 Modern Management
Windows 10 Modern ManagementWindows 10 Modern Management
Windows 10 Modern Management
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
cloud security
cloud securitycloud security
cloud security
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesTLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the Cloud
 
Complete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm SeminarComplete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm Seminar
 

Viewers also liked

літературно мистецький лютий2016
літературно мистецький лютий2016літературно мистецький лютий2016
літературно мистецький лютий2016Юлия Тер-Давлатян
 
Hum07 heritage s lideshow c and d - johnny
Hum07   heritage s lideshow c and d - johnnyHum07   heritage s lideshow c and d - johnny
Hum07 heritage s lideshow c and d - johnnyHuawaii
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1Camstewart17
 
Ch4 personality-and-values
Ch4 personality-and-valuesCh4 personality-and-values
Ch4 personality-and-valuesManahil Faiz
 
літературно мистецький липень2015
літературно мистецький липень2015літературно мистецький липень2015
літературно мистецький липень2015Юлия Тер-Давлатян
 
літературно мистецький червень2015
літературно мистецький червень2015літературно мистецький червень2015
літературно мистецький червень2015Юлия Тер-Давлатян
 
E learning proposal for a marketing company
E learning proposal for a marketing companyE learning proposal for a marketing company
E learning proposal for a marketing companyRuwan Weerasinghe
 
Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Phương Nhung
 
School management Software
School management SoftwareSchool management Software
School management SoftwareGlobalcampus
 
The-Path-to-2016-Success
The-Path-to-2016-SuccessThe-Path-to-2016-Success
The-Path-to-2016-SuccessMatt Robbins
 
Comparision of biogeography of microbial mapping
Comparision of biogeography of microbial mappingComparision of biogeography of microbial mapping
Comparision of biogeography of microbial mappingpriyanka kandasamy
 
Лiтературно-мистецький календар
Лiтературно-мистецький календарЛiтературно-мистецький календар
Лiтературно-мистецький календарЮлия Тер-Давлатян
 
THE SOLUTION FOR BIG DATA
THE SOLUTION FOR BIG DATATHE SOLUTION FOR BIG DATA
THE SOLUTION FOR BIG DATATarak Tar
 
金融监管框架的改革国际经验和中国的选择
金融监管框架的改革国际经验和中国的选择金融监管框架的改革国际经验和中国的选择
金融监管框架的改革国际经验和中国的选择Beixiao(Robert) Liu
 

Viewers also liked (20)

літературно мистецький лютий2016
літературно мистецький лютий2016літературно мистецький лютий2016
літературно мистецький лютий2016
 
Digipak Analysis
Digipak AnalysisDigipak Analysis
Digipak Analysis
 
Hum07 heritage s lideshow c and d - johnny
Hum07   heritage s lideshow c and d - johnnyHum07   heritage s lideshow c and d - johnny
Hum07 heritage s lideshow c and d - johnny
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1
 
Ch4 personality-and-values
Ch4 personality-and-valuesCh4 personality-and-values
Ch4 personality-and-values
 
CURRICULUM VITAE sele (2)
CURRICULUM VITAE sele (2)CURRICULUM VITAE sele (2)
CURRICULUM VITAE sele (2)
 
E learning
E learningE learning
E learning
 
EC_NL_2015_08
EC_NL_2015_08EC_NL_2015_08
EC_NL_2015_08
 
5-Day VA Category 1.1
5-Day VA Category 1.15-Day VA Category 1.1
5-Day VA Category 1.1
 
літературно мистецький липень2015
літературно мистецький липень2015літературно мистецький липень2015
літературно мистецький липень2015
 
літературно мистецький червень2015
літературно мистецький червень2015літературно мистецький червень2015
літературно мистецький червень2015
 
E learning proposal for a marketing company
E learning proposal for a marketing companyE learning proposal for a marketing company
E learning proposal for a marketing company
 
Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008
 
School management Software
School management SoftwareSchool management Software
School management Software
 
The-Path-to-2016-Success
The-Path-to-2016-SuccessThe-Path-to-2016-Success
The-Path-to-2016-Success
 
Comparision of biogeography of microbial mapping
Comparision of biogeography of microbial mappingComparision of biogeography of microbial mapping
Comparision of biogeography of microbial mapping
 
литтерра альманах 2015
литтерра альманах 2015литтерра альманах 2015
литтерра альманах 2015
 
Лiтературно-мистецький календар
Лiтературно-мистецький календарЛiтературно-мистецький календар
Лiтературно-мистецький календар
 
THE SOLUTION FOR BIG DATA
THE SOLUTION FOR BIG DATATHE SOLUTION FOR BIG DATA
THE SOLUTION FOR BIG DATA
 
金融监管框架的改革国际经验和中国的选择
金融监管框架的改革国际经验和中国的选择金融监管框架的改革国际经验和中国的选择
金融监管框架的改革国际经验和中国的选择
 

Similar to Altinet_Education_Brochure

How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Pte Ltd
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional BrochureKaganMinare
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Learning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@eduLearning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@edupearce.alex
 
CTECH StackedDefense™
CTECH StackedDefense™CTECH StackedDefense™
CTECH StackedDefense™Alex Body
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 

Similar to Altinet_Education_Brochure (20)

How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Learning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@eduLearning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@edu
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
CTECH StackedDefense™
CTECH StackedDefense™CTECH StackedDefense™
CTECH StackedDefense™
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 

Altinet_Education_Brochure

  • 1. Protect Students. Secure Data. Improve Productivity. Advanced IT Solutions to Secure and Enrich Your Learning Environment
  • 2. Student Safety First. eLearning and the adoption of mobility initiatives, social media, online collaboration, and other types of technological engagement are the most significant and exciting changes to emerge for education establishments in the 21st century. The paradigm shift brought on by these new teaching and learning methods also opens a new frontier of simple to sophisticated threats that require a new way of thinking about IT solutions. It also makes the heroic feats IT performs at your school more crucial than ever. At Altinet, we understand the unprecedented challenges that you and your staff are facing. We offer the industry’s most advanced, cost-effective solutions to maintain a safe, secure, and thriving eLearning environment and school community. Whether your needs are on-premises, cloud-hosted, or a blend of both, at Altinet, we’ve got you covered.
  • 3. KEY  CUSTOMER  CHALLENGES     ALTINET  SOLUTION   Web  2.0  Control   The  need  to  monitor  Web  2.0  has  increased  over  the  last  3  years  and  all  our  solu9ons  have   granular  controls  over  web  applica9ons  and  social  media  pla=orms  such  as  Facebook  &   YouTube.  With  educa9on  specific  features  such  as  blocking  Facebook  posts  and  ac9va9ng   YouTube  for  Educa9on.     ApplicaAon  Controls   In  addi9on  to  the  Web  2.0  controls  we  also  control  applica9ons  at  the  port  level  using  deep   packet  inspec9on  technology,  therefore  ensuring  all  school  have  layer  7  blocking   capabili9es.       SLL  InspecAon     SLL  Inspec9on  is  included  on  all  Al9net  products  allowing  IT  Administrators  to  monitor  and   control  content  that  is  normally  hidden.       Comprehensive  ReporAng   Per  User/Per  Group  repor9ng  allowing  in  depth  annalysis  into  web  ac9vity  at  specific  9mes/ dates.     Real-­‐Time  Content  Filtering     We  offer  the  opportunity  to  have  real-­‐9me  filtering,  meaning  solu9ons  are  not  100%  reliant   on  URL  databases,  therefore  providing  zero-­‐second  threat  protec9on.   Web Content Filtering. “It’s  so  simple!  The  Web  Filter  does  all  of  the  work  and   makes  it  easy  for  us  to  allow  our  users  to  safely  surf  the   Web.”     Al9net  work  with  a  variety  of  Web  Content  Filtering  vendors  to  ensure  that  each  school  is  geVng  the  level  of   granularity  that  is  required.  Web  2.0,  Social  Media  controls  and  Applica9on  Monitoring  are  included  as   standard  to  ensure  your  visibility  over  the  network  is  complete.  BYOD  requirements  are  con9nuously   expanding  and  the  integra9on  with  wireless  solu9ons  is  one  of  Al9net’s  strengths  in  deployment.      
  • 4. KEY  CUSTOMER  CHALLENGES     ALTINET  SOLUTION   Spam  ProtecAon     We  work  with  the  market  leaders  in  protec9ng  customers  from  Spam.  Iden9fying   email  from  known  spammers  or  blacklisted  domains.  Our  solu9ons  leverage  mul9ple   industry-­‐leading  techniques  to  reduce  the  spam  entering  your  network.   Virus  ProtecAon     All  our  solu9ons  include  Virus  protec9on.  We  work  on  reducing  the  poten9al  for   destruc9on  and  the  release  of  informa9on  through  cyber  a_acks  via  email.  Therefore   all  emails  inbound  &  outbound  are  scanned  and  monitored.     Office  365  IntegraAon     We  understand  the  migra9on  to  Office  365  in  educa9on  and  have  adapted  out   product  offering  to  meet  these  requirements.     Data  Leak  PrevenAon     Our  solu9ons  offer  a  new  a  number  of  encryp9on  features  to  ensure  that  your  data  is   protected  from  the  outside  world.  This  include  256-­‐Bit  Encryp9on  to  encrypt  email   traffic  between  the  sites.     Inbound/Outbound  Filtering   Inbound  &  Outbound  filtering  to  protect  all  traffic  and  prevent  sensi9ve  data  leaving   your  network  as  well  as  spam  traffic  entering,  therefore  ensuring  a  full  threat   protec9on  policy  is  implemented.   Email Spam & Virus Security. “The  solu>on  which  Al>net  have  implemented   has  enabled  us  to  focus  on  other  areas  of  out   network  with  the  confidence  that  our  email  is   fully  protected  and  spam  free  .”     All  Al9net’s  Email  Spam  &  Virus  Security  solu9ons  look  to  increase  the  protec9on  from  inbound  &  outbound   email  traffic,  whilst  at  the  same  9me  leveraging  the  next-­‐genera9on  email  solu9ons  such  as  Office  365.    We   implement  complete  email  management  solu9ons  to    increase  security  on-­‐premise  and  in  the  cloud    and   reduce  management  9me.  
  • 5. Data Backup & Storage. BACKUP  SOFTWARE   BACKUP  HARDWARE   CLOUD  BACKUP   Incremental  backups  removing  this  need  for   full  daily/monthly  backups   Dedicated  Hardware  Appliances  designed   for  the  required  network.  Devices  range   from    500GB-­‐20TB.   All  the  storage  you  need  to  replicate   backups  to  the  cloud  and  extend  reten9ons   Inline  or  Global  Data  deduplicaAon  reducing   the  storage  capacity  and  overall  saving  costs   Redundant  RAID  included  on  all  appliances   for  DR   Geographically  distributed  enterprise  grade   data  centers  to  prevent  data  loss   Virtual  &  Physical  machine  integra9on  on   one  solu9on     Swappable  disks  included  on  all  appliances   with  the  hot  swappable  disks  on  specific   devices       Off-­‐Site  VaulAng  Included   Granular  file  based  backup  recovery  as  a  full   restore  or  individual  file  download  to  a  local   disk   256-­‐Bit  EncrypAon,  Man  Traps,  2+1   Redundancy     Cloud  Management  allows  control  over  the   backups  24X7  anywhere  at  any9me   Bandwidth  controls  to  ensure  incremental   backups  occur  outside  core  bandwidth   intensive  hours   “We  had  a  mixture  of  tape,  NAS  drives  and  backup   soGware,  but  Al>net  came  in  a  made  our  backup   process  simple  and  increased  our  Disaster  Recovery   drama>cally.”     Al9net  work  with  the  mul9ple  educa9onal  establishments  to  remove  historical  data  backup  solu9ons  with  fully   integrated  complete  data  backup  solu9on  for  both  virtual  and  physical  environments.  We  look  to  make  the   backup  process  simple  with  one  solu9on  for  the  Backup  Sofware,  Hardware  and  Cloud  replica9on,  making  the   management  and  implementa9on  simple  and  hassle  free.      
  • 6. See What our Customers are Saying... It’s  so  simple!  The  Web  Filter  Al>net   Implemented  does  all  of  the  work  and   makes  it  easy  for  us  to  allow  our  users  to   safely  surf  the  Web.     Sco$  Jones   IT  Manager   Botham  School    The  Backup  solu>on  has  provided  us   with  seamless  restores  and  we  now   restore  much  more  frequently  than   we  did  when  we  were  on  tape.  It  is   no  longer  a  decision  between  file   importance  and  need  versus  >me   to  complete  a  restore.     Stephen  Foakes   IT  Manager   The  Glasgow  Academy   The  solu>on  which  Al>net  have   implemented  has  enabled  us  to  focus  on   other  areas  of  out  network  with  the   confidence  that  our  email  is  fully  protected   and  spam  free    Thomas  Makridis   IT  Manager   High  School  Of  Glasgow  
  • 7. Free Demonstration. Evaluation. Meeting. Speak to one of our education experts to get a complete understanding of how we can help your school increase security and reduce costs. 01138870190 sales@altinet.co.uk