Innovation corner: Hitting back against data attacks

FireEye: This service’s Continuation Threat Protection model is considered a “reimagined” approach to cyber security in the business world, and one that could translate to higher education. The system is designed specifically to combat advanced cyber attacks that have broken through campus firewalls and secure web gateways that once served as reliable way to combat hackers and botnets looking to scoop up sensitive information. FireEye’s technological architecture, unlike many security platforms, is aware of the “multi-stage and multi-vector nature of attacks” that have proven so successful in compromising school data in recent years. FireEye’s offerings include cloud-based products for network, email, content, mobile, forensics, and endpoint solutions.

IBM Cloud Security: Colleges and universities might be drawn to IBM’s data security solution for its control, automation, and ability to meet regulatory compliance that is so prevalent in educational circles. IBM’s solution allows an institution to protect the entire network infrastructure from constantly evolving network and application layer threats while automating corrective data security actions — a reliable way of simplifying the sometimes-arduous and complex task of protecting vast amounts of student and employee data. IBM’s Security Host Protection can not only bolster data security, but also reduce the ever-rising costs of safeguarding on-campus information.

Qualys: Working with higher education institutions like New York University Medical Center, Texas Tech University, and the University of Westminster, Qualys has developed a reputation as a reliable and advanced protector of campus data. At Westminster, for example, the company’s QualysGuard Vulnerability Management (VM) ran daily, weekly, and ad-hoc vulnerability scans for approximately 700 servers and 4,000 workstations. The system protected more than 5,000 IT assets on the campus of more than 20,000 students. The cloud-based security solution was not a disruptive force at Westminster, unlike some data security solutions that can bog down university systems.




Sign up for our newsletter

Newsletter: Innovations in K12 Education
By submitting your information, you agree to our Terms & Conditions and Privacy Policy.

"(Required)" indicates required fields