SlideShare a Scribd company logo
1.855.SECURLY
www.securly.com
Baugo Community Schools choose
Securly’s web filtering solution to keep
its students safe 24/7 with identity-
based, and at-home monitoring.
Customer Name:
Baugo Community Schools
Location: Elkhart, Indiana
Business ImpactBusiness Challenge
Baugo Community Schools has about 2000 students and 250 support
staff including 130 teachers. Students are provided Chromebooks,
while teachers use PCs and MacBooks. David Wolford, the Instructional
Tech at Baugo Community Schools is determined to implement a 100%
1:1 Chromebook policy. This parity is essential to enable students and
teachers to live in the same world when it comes to the technology
they use. Though the school did use Untangle, their inability to provide
identity-based reporting in place of IP-based reporting prompted them
to look for other solutions.
Identity-based reporting and active reporting were considered
important to help the school monitor bullying issues and intervene
immediately.
Problems arose due to the gap between at-home monitoring and
parents’ understanding of at-home web filtering, which the previous
provider was unable to resolve.
Customer support from other competitors under consideration
included “ridiculous response time”, and complicated whitelisting
procedures.
Cost was also a major factor in view of the transition to
Chromebooks and the 1:1 goal.
Monitoring beyond social media, by
detecting bullying threats over email
Identity-based reporting instead of IP based
reporting helps educators and parents zero
in on the problem areas
Blend of active monitoring, periodic alerts,
and social media activity monitoring can
enable quicker analysis of problem
Parent portal that provides parents visibility
of student’s activity and encourages
engagement
Any device. Anywhere. Secure.
sales@securly.com | 1 (855) SECURLY | www.securly.com
Social media and email monitoring to tackle cyber
bullying
sales@securly.com | 1 (855) SECURLY | www.securly.com
Securly is a leading provider of cloud-based web filtering
for schools and parental controls for homes. For more
information, visit www.securly.com.
Chromebook filtering
As the school moves to 100% Chromebook
use, Securly’s zero-touch filtering using
Chrome extensions without the hassle
of proxying or SSL certificates becomes
important. At the same time, it can support any
blend of devices including MacBooks and PCs,
which are currently being used extensively by
teachers and the support staff.
“The speed at which you
guys are innovating product is
awesome. Securly is already
an amazing tool to keep kids
safe on the internet and it just
keeps getting better. From an
IT standpoint, it is seamless to
deploy”
— David Wolford
Instructional Tech,
Baugo Community Schools
David Wolford looked at various options, but Securly’s cost-effective
solution that provides active identity-based monitoring along with alerts
and Facebook monitoring, and the ability to detect threats of bullying
over email tipped the scales in its favor.
The incidence and danger of cyber bullying cannot be played down
for the cyber generation, and Securly’s ability to detect threats over
email can help schools and parents tackle the problem head on.
The PageScan and Auditor features give Securly an edge over other
providers by enabling in-depth and exhaustive filtering and monitoring.
Not only does Securly keep students safe on campus, it also provides
the same level of filtering when at home. Students’ activity reports are
then sent to the parents’ inbox. This will help bring the school and
parents on the same page and find workable solutions for students’
problems.
© 2017. Logos and trademarks are the property of their respective companies. All rights reserved.

More Related Content

What's hot

Auditor by Securly
Auditor by SecurlyAuditor by Securly
Auditor by Securly
Securly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
Securly
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
Securly
 
Learn how can protect data from cyber attack with single sign on services
Learn how can protect data from cyber attack with single sign on servicesLearn how can protect data from cyber attack with single sign on services
Learn how can protect data from cyber attack with single sign on services
campuseai
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
John Oxley
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
Sue Noor
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
Michael Barbour
 
E learning development process
E learning development processE learning development process
E learning development process
Marie Weaver
 
Resources
ResourcesResources
Resources
Ange2424
 
Teachmeet presentation 2mins. 2010
Teachmeet presentation 2mins. 2010Teachmeet presentation 2mins. 2010
Teachmeet presentation 2mins. 2010
pdingley
 
District Administration Magazine - Dec 2014 Feature - Simmons
District Administration Magazine - Dec 2014 Feature - SimmonsDistrict Administration Magazine - Dec 2014 Feature - Simmons
District Administration Magazine - Dec 2014 Feature - Simmons
Marc Simmons, EdD
 
Technology and education
Technology and educationTechnology and education
Technology and education
izela246122
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
Bloxx
 
How to improve efficiency in schools
How to improve efficiency in schoolsHow to improve efficiency in schools
How to improve efficiency in schools
Michelle Vroom
 
Web 2.0 Technology Shaping Education
Web 2.0 Technology Shaping EducationWeb 2.0 Technology Shaping Education
Web 2.0 Technology Shaping Education
guesta43c2a2
 
13 Trends and Challenges with School Wireless Networks
13 Trends and Challenges with School Wireless Networks13 Trends and Challenges with School Wireless Networks
13 Trends and Challenges with School Wireless Networks
Corey Anderson
 
Identity and Access Management in Education - Common Issues and How to Mitiga...
Identity and Access Management in Education - Common Issues and How to Mitiga...Identity and Access Management in Education - Common Issues and How to Mitiga...
Identity and Access Management in Education - Common Issues and How to Mitiga...
Tom Fasano
 

What's hot (18)

Auditor by Securly
Auditor by SecurlyAuditor by Securly
Auditor by Securly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
Learn how can protect data from cyber attack with single sign on services
Learn how can protect data from cyber attack with single sign on servicesLearn how can protect data from cyber attack with single sign on services
Learn how can protect data from cyber attack with single sign on services
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
E learning development process
E learning development processE learning development process
E learning development process
 
Resources
ResourcesResources
Resources
 
Teachmeet presentation 2mins. 2010
Teachmeet presentation 2mins. 2010Teachmeet presentation 2mins. 2010
Teachmeet presentation 2mins. 2010
 
District Administration Magazine - Dec 2014 Feature - Simmons
District Administration Magazine - Dec 2014 Feature - SimmonsDistrict Administration Magazine - Dec 2014 Feature - Simmons
District Administration Magazine - Dec 2014 Feature - Simmons
 
Technology and education
Technology and educationTechnology and education
Technology and education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
How to improve efficiency in schools
How to improve efficiency in schoolsHow to improve efficiency in schools
How to improve efficiency in schools
 
Web 2.0 Technology Shaping Education
Web 2.0 Technology Shaping EducationWeb 2.0 Technology Shaping Education
Web 2.0 Technology Shaping Education
 
13 Trends and Challenges with School Wireless Networks
13 Trends and Challenges with School Wireless Networks13 Trends and Challenges with School Wireless Networks
13 Trends and Challenges with School Wireless Networks
 
Identity and Access Management in Education - Common Issues and How to Mitiga...
Identity and Access Management in Education - Common Issues and How to Mitiga...Identity and Access Management in Education - Common Issues and How to Mitiga...
Identity and Access Management in Education - Common Issues and How to Mitiga...
 

Viewers also liked

Kissick Thesis 2015
Kissick Thesis 2015Kissick Thesis 2015
Kissick Thesis 2015
Caroline Kissick
 
Safesheltercollab nexus st
Safesheltercollab nexus stSafesheltercollab nexus st
Safesheltercollab nexus st
Caravan Studios, a division of TechSoup
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
JAN HICKEY
 
Creating a Safe and Engaged Online Community - CMX Summit West 2016
Creating a Safe and Engaged Online Community - CMX Summit West 2016Creating a Safe and Engaged Online Community - CMX Summit West 2016
Creating a Safe and Engaged Online Community - CMX Summit West 2016
CMX
 
Not a community of practice? Creating safe spaces with multitudes of functions
Not a community of practice? Creating safe spaces with multitudes of functionsNot a community of practice? Creating safe spaces with multitudes of functions
Not a community of practice? Creating safe spaces with multitudes of functions
SEDA
 
Safe city-people-vehicles
Safe city-people-vehiclesSafe city-people-vehicles
Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...
Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...
Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...
Foundation for Healthy Generations
 
Strategic Plan_Final
Strategic Plan_FinalStrategic Plan_Final
Strategic Plan_Final
Lee White
 
Securly vs OpenDNS
Securly vs OpenDNSSecurly vs OpenDNS
Securly vs OpenDNS
Securly
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - Uswest
Securly
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
Amit Ranjan
 

Viewers also liked (11)

Kissick Thesis 2015
Kissick Thesis 2015Kissick Thesis 2015
Kissick Thesis 2015
 
Safesheltercollab nexus st
Safesheltercollab nexus stSafesheltercollab nexus st
Safesheltercollab nexus st
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
 
Creating a Safe and Engaged Online Community - CMX Summit West 2016
Creating a Safe and Engaged Online Community - CMX Summit West 2016Creating a Safe and Engaged Online Community - CMX Summit West 2016
Creating a Safe and Engaged Online Community - CMX Summit West 2016
 
Not a community of practice? Creating safe spaces with multitudes of functions
Not a community of practice? Creating safe spaces with multitudes of functionsNot a community of practice? Creating safe spaces with multitudes of functions
Not a community of practice? Creating safe spaces with multitudes of functions
 
Safe city-people-vehicles
Safe city-people-vehiclesSafe city-people-vehicles
Safe city-people-vehicles
 
Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...
Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...
Confronting Stereotypes & Mental Models: Increasing Community Capacity Throug...
 
Strategic Plan_Final
Strategic Plan_FinalStrategic Plan_Final
Strategic Plan_Final
 
Securly vs OpenDNS
Securly vs OpenDNSSecurly vs OpenDNS
Securly vs OpenDNS
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - Uswest
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to Baugo Community Schools

Chromebooks in education
Chromebooks in educationChromebooks in education
Chromebooks in education
James Grew
 
Chromebook Parent Night Presentation
Chromebook Parent Night PresentationChromebook Parent Night Presentation
Chromebook Parent Night Presentation
Mr. Arreola
 
Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)
Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)
Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)
Jerry Sakala
 
Section 4.4 employment business focused applications in the cloud
Section 4.4 employment business focused applications in the cloudSection 4.4 employment business focused applications in the cloud
Section 4.4 employment business focused applications in the cloud
Association of Colleges
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
Bloxx
 
Vivitek - BYOD and the new demands for group collaboration in Education and C...
Vivitek - BYOD and the new demands for group collaboration in Education and C...Vivitek - BYOD and the new demands for group collaboration in Education and C...
Vivitek - BYOD and the new demands for group collaboration in Education and C...
WildwoodPR
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
Diana Benner
 
Wicked Awesome Ways Colleges Are Using Technology
Wicked Awesome Ways Colleges Are Using TechnologyWicked Awesome Ways Colleges Are Using Technology
Wicked Awesome Ways Colleges Are Using Technology
CampusLogic
 
BYOD/BYOT
BYOD/BYOTBYOD/BYOT
BYOD/BYOT
AshleySenn
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
Jack Smith
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
Point2Protect
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
Diana Benner
 
Secured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental ControlSecured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental Control
IRJET Journal
 
Kinderguarded Intro
Kinderguarded IntroKinderguarded Intro
Kinderguarded Intro
Robin Wilensky
 
Charting a course for empowered learning through the use of technology (4)
Charting a course for empowered learning through the use of technology (4)Charting a course for empowered learning through the use of technology (4)
Charting a course for empowered learning through the use of technology (4)
steve muzzy
 
What is the future of online learning
What is the future of online learningWhat is the future of online learning
What is the future of online learning
SakshiJain416116
 
Personalisation, on-demand and predictive analytics: e-learning’s next leap f...
Personalisation, on-demand and predictive analytics: e-learning’s next leap f...Personalisation, on-demand and predictive analytics: e-learning’s next leap f...
Personalisation, on-demand and predictive analytics: e-learning’s next leap f...
Mindfire LLC
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
patricia franklin
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public Schools
Securly
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
Bloxx
 

Similar to Baugo Community Schools (20)

Chromebooks in education
Chromebooks in educationChromebooks in education
Chromebooks in education
 
Chromebook Parent Night Presentation
Chromebook Parent Night PresentationChromebook Parent Night Presentation
Chromebook Parent Night Presentation
 
Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)
Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)
Lubuto Trust College has gone Google for Privacy,Security & Storage (CASE STUDY)
 
Section 4.4 employment business focused applications in the cloud
Section 4.4 employment business focused applications in the cloudSection 4.4 employment business focused applications in the cloud
Section 4.4 employment business focused applications in the cloud
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
Vivitek - BYOD and the new demands for group collaboration in Education and C...
Vivitek - BYOD and the new demands for group collaboration in Education and C...Vivitek - BYOD and the new demands for group collaboration in Education and C...
Vivitek - BYOD and the new demands for group collaboration in Education and C...
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
 
Wicked Awesome Ways Colleges Are Using Technology
Wicked Awesome Ways Colleges Are Using TechnologyWicked Awesome Ways Colleges Are Using Technology
Wicked Awesome Ways Colleges Are Using Technology
 
BYOD/BYOT
BYOD/BYOTBYOD/BYOT
BYOD/BYOT
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Secured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental ControlSecured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental Control
 
Kinderguarded Intro
Kinderguarded IntroKinderguarded Intro
Kinderguarded Intro
 
Charting a course for empowered learning through the use of technology (4)
Charting a course for empowered learning through the use of technology (4)Charting a course for empowered learning through the use of technology (4)
Charting a course for empowered learning through the use of technology (4)
 
What is the future of online learning
What is the future of online learningWhat is the future of online learning
What is the future of online learning
 
Personalisation, on-demand and predictive analytics: e-learning’s next leap f...
Personalisation, on-demand and predictive analytics: e-learning’s next leap f...Personalisation, on-demand and predictive analytics: e-learning’s next leap f...
Personalisation, on-demand and predictive analytics: e-learning’s next leap f...
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public Schools
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 

More from Securly

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook program
Securly
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted Mode
Securly
 
Nlp whitepaper the securly way
Nlp whitepaper   the securly wayNlp whitepaper   the securly way
Nlp whitepaper the securly way
Securly
 
DNS to Anything - How Securly Works
DNS to Anything - How Securly WorksDNS to Anything - How Securly Works
DNS to Anything - How Securly Works
Securly
 
David's Law
David's Law David's Law
David's Law
Securly
 
Delegated Admin by Securly
Delegated Admin by SecurlyDelegated Admin by Securly
Delegated Admin by Securly
Securly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United States
Securly
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - Useast
Securly
 
Best practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for WindowsBest practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for Windows
Securly
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
Securly
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School District
Securly
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community School
Securly
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School District
Securly
 
Best practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for ChromebooksBest practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for Chromebooks
Securly
 
Securly vs Hardware
Securly vs HardwareSecurly vs Hardware
Securly vs Hardware
Securly
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
Securly
 

More from Securly (16)

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook program
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted Mode
 
Nlp whitepaper the securly way
Nlp whitepaper   the securly wayNlp whitepaper   the securly way
Nlp whitepaper the securly way
 
DNS to Anything - How Securly Works
DNS to Anything - How Securly WorksDNS to Anything - How Securly Works
DNS to Anything - How Securly Works
 
David's Law
David's Law David's Law
David's Law
 
Delegated Admin by Securly
Delegated Admin by SecurlyDelegated Admin by Securly
Delegated Admin by Securly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United States
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - Useast
 
Best practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for WindowsBest practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for Windows
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School District
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community School
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School District
 
Best practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for ChromebooksBest practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for Chromebooks
 
Securly vs Hardware
Securly vs HardwareSecurly vs Hardware
Securly vs Hardware
 
What is Securly?
What is Securly?What is Securly?
What is Securly?
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Baugo Community Schools

  • 1. 1.855.SECURLY www.securly.com Baugo Community Schools choose Securly’s web filtering solution to keep its students safe 24/7 with identity- based, and at-home monitoring. Customer Name: Baugo Community Schools Location: Elkhart, Indiana Business ImpactBusiness Challenge Baugo Community Schools has about 2000 students and 250 support staff including 130 teachers. Students are provided Chromebooks, while teachers use PCs and MacBooks. David Wolford, the Instructional Tech at Baugo Community Schools is determined to implement a 100% 1:1 Chromebook policy. This parity is essential to enable students and teachers to live in the same world when it comes to the technology they use. Though the school did use Untangle, their inability to provide identity-based reporting in place of IP-based reporting prompted them to look for other solutions. Identity-based reporting and active reporting were considered important to help the school monitor bullying issues and intervene immediately. Problems arose due to the gap between at-home monitoring and parents’ understanding of at-home web filtering, which the previous provider was unable to resolve. Customer support from other competitors under consideration included “ridiculous response time”, and complicated whitelisting procedures. Cost was also a major factor in view of the transition to Chromebooks and the 1:1 goal. Monitoring beyond social media, by detecting bullying threats over email Identity-based reporting instead of IP based reporting helps educators and parents zero in on the problem areas Blend of active monitoring, periodic alerts, and social media activity monitoring can enable quicker analysis of problem Parent portal that provides parents visibility of student’s activity and encourages engagement Any device. Anywhere. Secure. sales@securly.com | 1 (855) SECURLY | www.securly.com
  • 2. Social media and email monitoring to tackle cyber bullying sales@securly.com | 1 (855) SECURLY | www.securly.com Securly is a leading provider of cloud-based web filtering for schools and parental controls for homes. For more information, visit www.securly.com. Chromebook filtering As the school moves to 100% Chromebook use, Securly’s zero-touch filtering using Chrome extensions without the hassle of proxying or SSL certificates becomes important. At the same time, it can support any blend of devices including MacBooks and PCs, which are currently being used extensively by teachers and the support staff. “The speed at which you guys are innovating product is awesome. Securly is already an amazing tool to keep kids safe on the internet and it just keeps getting better. From an IT standpoint, it is seamless to deploy” — David Wolford Instructional Tech, Baugo Community Schools David Wolford looked at various options, but Securly’s cost-effective solution that provides active identity-based monitoring along with alerts and Facebook monitoring, and the ability to detect threats of bullying over email tipped the scales in its favor. The incidence and danger of cyber bullying cannot be played down for the cyber generation, and Securly’s ability to detect threats over email can help schools and parents tackle the problem head on. The PageScan and Auditor features give Securly an edge over other providers by enabling in-depth and exhaustive filtering and monitoring. Not only does Securly keep students safe on campus, it also provides the same level of filtering when at home. Students’ activity reports are then sent to the parents’ inbox. This will help bring the school and parents on the same page and find workable solutions for students’ problems. © 2017. Logos and trademarks are the property of their respective companies. All rights reserved.