SlideShare une entreprise Scribd logo
1  sur  33
Medley Marketing Pvt Ltd
Akshay Kumar Sharma
Director-TSG Group
SolutionsSolutions
forfor
Education VerticalEducation Vertical
Agenda
• Secure Wireless for Campus & Hostels
• Language/Computer Labs –sharing 1
PC/Server with multiple students
• CCTV Solutions for Indoor/Outdoor
Surveillance
• Smart Class Rooms
• Digital Notice Boards
• Internet Security-UTM/XTM
• Campus LAN & WAN
• Storage Solutions
• Virtualization
• Video Conferencing/lecture Streaming
lay Solutions
Smarter Wi-Fi in Higher Ed
SmartCast QOS
enables
unprecedented
support for
multimedia
distribution
Smart Meshing
extends Wi-Fi
services to
portables and
remote building
without Ethernet
A s
and band steering
are ideal for high-
capacity,
dense user
enviroments
daptive antenna
Outdoor Wi-Fi
allows service
extension to
public areas
such as school
quads and
sports fields Open/DPSK
simplifies
security with
unique
encryption keys
for each user
Centralized
Remote
Management
eliminates
controllers at every
site and the need
5GHz Wi-
Backhau
eliminate
recurring fix
line, fiber
extend broad
connectivi
Flexible Deployment
Options
provide the right tool for
the job
Zero IT
automatic end user
device security
configuration for school
issued and BYOD
Core Innovations
ChannelFlyChannelFl
y
BeamFlex+BeamFlex
+
Hotspot 2.0Hotspot
2.0
o Per-packet and per-client
adaptive antenna array
o Directional antenna gain
o Up to 4,000 unique
patterns, 9 dBi gain, 15
dBi interference
mitigation
o Adaptive Wi-Fi channel
selection
o Predictive channel
capacity measurements
o Improves performance by
up to 50%
SmartMeshSmartMes
h
o Reliable mesh
connections with adaptive
RF links
o Easy network extension
with fewer APs and cable
drops
o Advanced L2 best-path
forwarding algorithms
o Early feature support
and solution maturity
o Indoor/outdoor radio
expertise to build on
o Enterprise, carrier, and
social Wi-Fi
applications
SmartSecSmartSe
c
o Patented per-user PSK
to simplify individual
security
o Secure guest solutions
o Intuitive
onboarding/BYOD with
no additional costs
SmartCastSmartCas
t
o Advanced QoS traffi
inspection and handl
o Application-aware
heuristics prioritizes
sensitive traffic
o Optimizes voice and
video reliability and
consistency
c
ing
5
Automatic Adaptation to Mobile Devices
BeamFlex+ Transmits and Receives Signals in Different
Polarizations
o Brings together polarization diversity with maximal ratio combining
(MRC) to improve the transmission and reception of Wi-Fi signals
o Better reception of low-power mobile devices
o Adapts signals to device orientation
o Improves overall performance and reliability
o Increases the ability to spatially multiplex in challenging
environments
VERTICAL
POLARIZATIO
N
HORIZONTAL
POLARIZATIO
N
Complete LAN/WAN Campus layout
Internet
Security in
Education
/
WATCHGUARD®
XTM
WatchGuard
XTM 5 Series
WatchGuard
XTM 8 Series
WatchGuard
XTM 1050
WatchGuard
XTM 2 Series
/
Scalable Technology Backbone
Intelligent Layered Security
Unified Threat Management
INTELLIGENT LAYERED SECURITY ENGINE
EXTERNAL SECURITY (VULNERABILITY ASSESSMENT)
DATA INTEGRITY
VPN
STATEFUL FIREWALL
DEEP APPLICATION INSPECTION
ZERO DAY PROTECTION
Content Security
GATEWAY ANTIVIRUS
INTRUSION PREVENTION
SPYWARE PROTECTION
SPAM PROTECTION
URL FILTERING
Comprehensive protection against multi-faceted security threats
/
SAMPLE APPLICATIONS
Category Example Applications
Instant
Messaging
QQ; MSN; Yahoo;
GoogleTalk
Mail/Collaborat
ion
Hotmail; Gmail; Yahoo; MS
Exchange
Web 2.0 Facebook; LinkedIn; Twitter
P2P Gnutella, Foxy, Winny;
Bittorrent;
Remote
Access
Terminals
TeamViewer; GoToMyPC
Database MS SQL; Oracle
File Transfer Peercast; Megaupload
Voice Over IP Skype
Streaming
Media
QuickTime; YouTube; Hulu
Games Xbox Live; Second Life
Network Mgt MS Update; Adobe; Norton;
McAfee
Web bypass Ultrasurf; Avoidr;
Approved
applications
Approved
applications
Unapproved or
harmful applications
Unapproved or
harmful applications
Technology in Education
Tablets, Ebooks, Video, Web Based Testing, WiFi Enabled Devices
Users + Applications = Context
Administration Teachers Students
Users + Applications = Context
Teachers StudentsAdministration
An Application Proxy
Checks: Source IP, Destination IP, Port, Protocol
If a matching rule (or service) is found:
It opens the packet, reads the data, and if no
malicious content is found it forwards the data.
Controlling Applications
Proxies – Enforcing Protocols / Controlling Data
Closing the Blind Spot
Apply Content Control, AV, IPS to Hidden Traffic
Normal SSL SSL Proxy
With This method, The
firewall can’t see what is
“inside” the
communication
Between the PC and the
website.
With This method, The
firewall can perform all
checks that a normal HTTP
Proxy can.
Game
Applications
Plug-in
Post
Video
Picture
EditProfile
Controlling Applications
Evolving Beyond Ports and Protocols – Spotlighting “Normal” Traffic
Controlling Web Content
Not Just Big Brother - Better Security
 Database Maintained by WebSense
 Meeting CIPA requirements
 125Categories *
Proxy Sites, WebMail, P2P,IM,Hacking,
Phishing, RDP sites,
 SpeedBump or Override
 Logging and Reporting
 Safe Search
Signature database updated hourly
Large DB - 2.5 Million Signatures
Buffered Scanning = Better Catch Rate
Dynamic heuristic analysis uses code emulation to
identify polymorphic viruses and malware
Inspection, of compressed files to 5 levels
Controlling Web Content
Virus and Malware distributed via Hijacked Web Sites
Reputation Enabled Defense = RED
Controlling Web Content
Hijacked Web Sites - Virus and Malware
 Detects IPS / IP and Port Scanning
 Remembers attackers
 Shuns known scanners and attackers (low
processing cost)
DETECTDETECT
SHUNSHUN
Intelligent Layered Security
Engine
Behavioral Analysis and
Shunning
Identifying Bad Behavior No Matter Where The Bad Guys Are
 WatchGuard products
don’t just defend, they
illuminate!
 Real-time monitoring
tools show user,
network, and security
events, as they happen
—and allow you to take
immediate corrective
action
Intelligence At Your Finger Tips
Real – Time Monitoring
Video Conferencing
Lecture Streaming/Event Broadcasting
Computer Lab/ Language Lab solution:
Network Monitors in classrooms & computer labs enable lower TCO & higher involvement of students
in Education Vertical.
•Advantages
- Shared Computing
- One to One Teaching
- Realtime Evaluation
- Lesser Electricity
- Low Maint.
- Ergonomic
- Environment Friendly
- More Involved
learning
LG Electronics, Business Solution
LG’s surveillance solution is good for ensuring a secure environment outside the
classroom:
▪ Security solution can be deployed for various needs
in the periphery of the campus & other areas not
usually
visible to the management.
Security Coverage ouside the Classroom :
▪ LGE’s surveillance system
MonitorDVR
NAS
PTZ Camera
Dome Camera
IP Camera
LG Security Solutions:
Advantages of using CCTV in Schools / Colleges:
1. General Safety and Security: Students are aware
that they are being watched/ monitored, hence it
acts as a deterrent in doing some unwanted
activities like smoking etc and also acts as a Crime
Deterrent.
1. Prevent Bullying in Schools: As CCTV’s are installed
it will restrict school students to stop bullying others.
3. Helps in studying the Behavioural characteristics:
Proper CCTV footage helps identify the traits of the
character of developing students and provide
counselling / guidance for the same.
4. Provide officials with evidence which is not
otherwise available: Any suspicious activity or gross
misconduct committed on the campus would be
recorded and can be used as evidence against the
concerned students.
LG’s Digital Noticeboards deliver detailed information for schools and colleges:
LG Digital Noticeboard Solutions
Locations
• Lobbies &
Corridors
• Admission
Counters
• Class Rooms
• Libraries
Locations
• Lobbies &
Corridors
• Admission
Counters
• Class Rooms
• Libraries
•Announcements &
Instructions
•Photos of school events
•School news
•Training programs and
Schedules
•Meeting & Class Time
Table
•Emergency Information
•Canteen Menus
Locations
•Reception
areas
•Staff rooms
•Canteens
and cafeteria
Locations
•Reception
areas
•Staff rooms
•Canteens
and cafeteria
Benefits
•Announcement of
Examination dates
Fee payments
•Event announcements &
Schedules
•Classroom changes
•Applications filing
instructions & deadlines
•Student and staff group
training
•Advertising of
bookstores etc.
LG Digital Noticeboard Solutions
Locations
•Near lifts
•Near Stair-case
•E-Notice Boards
Benefits
•Sitemap, location finder
•Important Events / Exam
Results / Advertisements
•Security & Safety
information
Locations
•Libraries
•Lobbies &
Walkways
•Highly frequented
areas
Benefits
•Dynamic product
catalog
•Way finding
•Promotional offers
Horizontal
Displays
Vertical Displays
LED Projector – LONG Life of 20 Years
• Light Weight: 450 gm
• 30,000 Hours Lamp Life
• GREEN technology
(Mercury Free)
3-D Interactive Smart Class Room Solution
/
Visualizers IRS System
Graphic
Tablets
Projection
System
Software’s
Products in RangeProducts in Range
Interactive White
Boards
/
Training Room DiagramTraining Room Diagram
BUS Display Solutions
For further information; Pl contact:
Akshay Kumar Sharma – Director –TSG Group
9810387393/9312932966
akshay@medleyindia.com
Pl see our latest technology offerings @ http://medleyindia.com/

Contenu connexe

Tendances

Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011shawn_merdinger
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksRohan Fernandes
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentCatherine MacAllister
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student passSURFnet
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRajesh kumar
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...ijcsit
 

Tendances (20)

Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
Homeland Security Solutions
Homeland Security SolutionsHomeland Security Solutions
Homeland Security Solutions
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Network security
Network securityNetwork security
Network security
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
01
01 01
01
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEM
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
WI-FI Security in Jersey 2011
WI-FI Security in Jersey 2011WI-FI Security in Jersey 2011
WI-FI Security in Jersey 2011
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
 

En vedette (15)

培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
 
Gawn 21 dec 11
Gawn 21 dec 11Gawn 21 dec 11
Gawn 21 dec 11
 
The Mindful Saint
The Mindful SaintThe Mindful Saint
The Mindful Saint
 
7982 overview
7982 overview7982 overview
7982 overview
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
MMPL Watchguard overview
MMPL Watchguard overviewMMPL Watchguard overview
MMPL Watchguard overview
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
 
#54
#54#54
#54
 
Swiftpage empowering E marketing
Swiftpage empowering E marketingSwiftpage empowering E marketing
Swiftpage empowering E marketing
 
Propalms network case studies
Propalms network case studiesPropalms network case studies
Propalms network case studies
 
Ruckus Corporate Overview
Ruckus Corporate OverviewRuckus Corporate Overview
Ruckus Corporate Overview
 
Secure Wireless for Higher education
Secure Wireless for Higher educationSecure Wireless for Higher education
Secure Wireless for Higher education
 
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-TestingJava Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
 

Similaire à Mmpl education overview_ver1

2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...Internetwork Engineering (IE)
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Internetwork Engineering (IE)
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingTonex
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosXylos
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdfinfo382133
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 

Similaire à Mmpl education overview_ver1 (20)

2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaos
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Education slides_MMPL
Education slides_MMPLEducation slides_MMPL
Education slides_MMPL
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 

Plus de Medley India Infosolution Pvt Ltd (9)

Cashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environmentCashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environment
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Mmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overviewMmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overview
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
LG LED Projector
LG LED ProjectorLG LED Projector
LG LED Projector
 
LG display soltuion for retail segment
LG display soltuion for retail segmentLG display soltuion for retail segment
LG display soltuion for retail segment
 
Swiftpage for ACT presentation
Swiftpage for ACT presentationSwiftpage for ACT presentation
Swiftpage for ACT presentation
 
MMPL Education overview
MMPL Education overviewMMPL Education overview
MMPL Education overview
 

Dernier

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Mmpl education overview_ver1

  • 1. Medley Marketing Pvt Ltd Akshay Kumar Sharma Director-TSG Group
  • 3. Agenda • Secure Wireless for Campus & Hostels • Language/Computer Labs –sharing 1 PC/Server with multiple students • CCTV Solutions for Indoor/Outdoor Surveillance • Smart Class Rooms • Digital Notice Boards • Internet Security-UTM/XTM • Campus LAN & WAN • Storage Solutions • Virtualization • Video Conferencing/lecture Streaming lay Solutions
  • 4. Smarter Wi-Fi in Higher Ed SmartCast QOS enables unprecedented support for multimedia distribution Smart Meshing extends Wi-Fi services to portables and remote building without Ethernet A s and band steering are ideal for high- capacity, dense user enviroments daptive antenna Outdoor Wi-Fi allows service extension to public areas such as school quads and sports fields Open/DPSK simplifies security with unique encryption keys for each user Centralized Remote Management eliminates controllers at every site and the need 5GHz Wi- Backhau eliminate recurring fix line, fiber extend broad connectivi Flexible Deployment Options provide the right tool for the job Zero IT automatic end user device security configuration for school issued and BYOD
  • 5. Core Innovations ChannelFlyChannelFl y BeamFlex+BeamFlex + Hotspot 2.0Hotspot 2.0 o Per-packet and per-client adaptive antenna array o Directional antenna gain o Up to 4,000 unique patterns, 9 dBi gain, 15 dBi interference mitigation o Adaptive Wi-Fi channel selection o Predictive channel capacity measurements o Improves performance by up to 50% SmartMeshSmartMes h o Reliable mesh connections with adaptive RF links o Easy network extension with fewer APs and cable drops o Advanced L2 best-path forwarding algorithms o Early feature support and solution maturity o Indoor/outdoor radio expertise to build on o Enterprise, carrier, and social Wi-Fi applications SmartSecSmartSe c o Patented per-user PSK to simplify individual security o Secure guest solutions o Intuitive onboarding/BYOD with no additional costs SmartCastSmartCas t o Advanced QoS traffi inspection and handl o Application-aware heuristics prioritizes sensitive traffic o Optimizes voice and video reliability and consistency c ing 5
  • 6. Automatic Adaptation to Mobile Devices BeamFlex+ Transmits and Receives Signals in Different Polarizations o Brings together polarization diversity with maximal ratio combining (MRC) to improve the transmission and reception of Wi-Fi signals o Better reception of low-power mobile devices o Adapts signals to device orientation o Improves overall performance and reliability o Increases the ability to spatially multiplex in challenging environments VERTICAL POLARIZATIO N HORIZONTAL POLARIZATIO N
  • 9. / WATCHGUARD® XTM WatchGuard XTM 5 Series WatchGuard XTM 8 Series WatchGuard XTM 1050 WatchGuard XTM 2 Series
  • 10. / Scalable Technology Backbone Intelligent Layered Security Unified Threat Management INTELLIGENT LAYERED SECURITY ENGINE EXTERNAL SECURITY (VULNERABILITY ASSESSMENT) DATA INTEGRITY VPN STATEFUL FIREWALL DEEP APPLICATION INSPECTION ZERO DAY PROTECTION Content Security GATEWAY ANTIVIRUS INTRUSION PREVENTION SPYWARE PROTECTION SPAM PROTECTION URL FILTERING Comprehensive protection against multi-faceted security threats
  • 11. / SAMPLE APPLICATIONS Category Example Applications Instant Messaging QQ; MSN; Yahoo; GoogleTalk Mail/Collaborat ion Hotmail; Gmail; Yahoo; MS Exchange Web 2.0 Facebook; LinkedIn; Twitter P2P Gnutella, Foxy, Winny; Bittorrent; Remote Access Terminals TeamViewer; GoToMyPC Database MS SQL; Oracle File Transfer Peercast; Megaupload Voice Over IP Skype Streaming Media QuickTime; YouTube; Hulu Games Xbox Live; Second Life Network Mgt MS Update; Adobe; Norton; McAfee Web bypass Ultrasurf; Avoidr; Approved applications Approved applications Unapproved or harmful applications Unapproved or harmful applications
  • 12. Technology in Education Tablets, Ebooks, Video, Web Based Testing, WiFi Enabled Devices
  • 13. Users + Applications = Context Administration Teachers Students
  • 14. Users + Applications = Context Teachers StudentsAdministration
  • 15. An Application Proxy Checks: Source IP, Destination IP, Port, Protocol If a matching rule (or service) is found: It opens the packet, reads the data, and if no malicious content is found it forwards the data. Controlling Applications Proxies – Enforcing Protocols / Controlling Data
  • 16. Closing the Blind Spot Apply Content Control, AV, IPS to Hidden Traffic Normal SSL SSL Proxy With This method, The firewall can’t see what is “inside” the communication Between the PC and the website. With This method, The firewall can perform all checks that a normal HTTP Proxy can.
  • 18. Controlling Web Content Not Just Big Brother - Better Security  Database Maintained by WebSense  Meeting CIPA requirements  125Categories * Proxy Sites, WebMail, P2P,IM,Hacking, Phishing, RDP sites,  SpeedBump or Override  Logging and Reporting  Safe Search
  • 19. Signature database updated hourly Large DB - 2.5 Million Signatures Buffered Scanning = Better Catch Rate Dynamic heuristic analysis uses code emulation to identify polymorphic viruses and malware Inspection, of compressed files to 5 levels Controlling Web Content Virus and Malware distributed via Hijacked Web Sites
  • 20. Reputation Enabled Defense = RED Controlling Web Content Hijacked Web Sites - Virus and Malware
  • 21.  Detects IPS / IP and Port Scanning  Remembers attackers  Shuns known scanners and attackers (low processing cost) DETECTDETECT SHUNSHUN Intelligent Layered Security Engine Behavioral Analysis and Shunning Identifying Bad Behavior No Matter Where The Bad Guys Are
  • 22.  WatchGuard products don’t just defend, they illuminate!  Real-time monitoring tools show user, network, and security events, as they happen —and allow you to take immediate corrective action Intelligence At Your Finger Tips Real – Time Monitoring
  • 25. Computer Lab/ Language Lab solution: Network Monitors in classrooms & computer labs enable lower TCO & higher involvement of students in Education Vertical. •Advantages - Shared Computing - One to One Teaching - Realtime Evaluation - Lesser Electricity - Low Maint. - Ergonomic - Environment Friendly - More Involved learning LG Electronics, Business Solution
  • 26. LG’s surveillance solution is good for ensuring a secure environment outside the classroom: ▪ Security solution can be deployed for various needs in the periphery of the campus & other areas not usually visible to the management. Security Coverage ouside the Classroom : ▪ LGE’s surveillance system MonitorDVR NAS PTZ Camera Dome Camera IP Camera LG Security Solutions: Advantages of using CCTV in Schools / Colleges: 1. General Safety and Security: Students are aware that they are being watched/ monitored, hence it acts as a deterrent in doing some unwanted activities like smoking etc and also acts as a Crime Deterrent. 1. Prevent Bullying in Schools: As CCTV’s are installed it will restrict school students to stop bullying others. 3. Helps in studying the Behavioural characteristics: Proper CCTV footage helps identify the traits of the character of developing students and provide counselling / guidance for the same. 4. Provide officials with evidence which is not otherwise available: Any suspicious activity or gross misconduct committed on the campus would be recorded and can be used as evidence against the concerned students.
  • 27. LG’s Digital Noticeboards deliver detailed information for schools and colleges: LG Digital Noticeboard Solutions Locations • Lobbies & Corridors • Admission Counters • Class Rooms • Libraries Locations • Lobbies & Corridors • Admission Counters • Class Rooms • Libraries •Announcements & Instructions •Photos of school events •School news •Training programs and Schedules •Meeting & Class Time Table •Emergency Information •Canteen Menus Locations •Reception areas •Staff rooms •Canteens and cafeteria Locations •Reception areas •Staff rooms •Canteens and cafeteria Benefits •Announcement of Examination dates Fee payments •Event announcements & Schedules •Classroom changes •Applications filing instructions & deadlines •Student and staff group training •Advertising of bookstores etc.
  • 28. LG Digital Noticeboard Solutions Locations •Near lifts •Near Stair-case •E-Notice Boards Benefits •Sitemap, location finder •Important Events / Exam Results / Advertisements •Security & Safety information Locations •Libraries •Lobbies & Walkways •Highly frequented areas Benefits •Dynamic product catalog •Way finding •Promotional offers Horizontal Displays Vertical Displays
  • 29. LED Projector – LONG Life of 20 Years • Light Weight: 450 gm • 30,000 Hours Lamp Life • GREEN technology (Mercury Free)
  • 30. 3-D Interactive Smart Class Room Solution / Visualizers IRS System Graphic Tablets Projection System Software’s Products in RangeProducts in Range Interactive White Boards
  • 33. For further information; Pl contact: Akshay Kumar Sharma – Director –TSG Group 9810387393/9312932966 akshay@medleyindia.com Pl see our latest technology offerings @ http://medleyindia.com/