Security

CyberHound provides a range of online security services that work
together to provide customers with premium network protection and controls.

Enhanced Design for Schools

At the core of a CyberHound Appliance is a powerful Next Generation (level 7) Firewall that operates at the top level of the OSI network model and gives a complete view of a school’s internet activity.

The (level 7) Firewall allows for applications like Skype, Facebook, Messenger and Twitter to be accurately controlled – solutions working at lower levels using port blocking can sometimes lead to genuine applications being blocked or malicious or banned applications being allowed.

CyberHound has developed its technology to directly benefit school environments. This is demonstrated with features like Application Controls, Zero-Touch BYOD On-boarding and Anonymiser Detection.

OSI 7 Layer Model

square

Reducing Administration

With students and teachers having access to multiple wireless devices like laptops, iPads and mobile phones, the demands on school infrastructures and IT staff can be overwhelming (and can often dictate school policies regarding BYOD usage).

This is not the case with the CyberHound Appliance. Users can now authenticate their own devices against their credentials with no involvement of IT staff.

Security Control Features:

  • Next Generation (level 7) Firewall.
  • Full SSL filtering / HTTPS Inspection.
  • Dynamic anonymiser detection and blocking.
  • Bit Torrent control.
  • Malware detection on web, email, downloads and social media.
  • Secure Wi-Fi connections using BYOD zero-touch on-boarding for wireless devices.
  • Advanced authentication ensuring flexible and reliable control of who access your network.

security_tag

Authentication

Authentication can occur using one of four methodologies, or a combination of them all:

  • 802.1 authentication. Useful for BYOD devices and wi-fi access. This occurs for any IP traffic such as for apps and is not limited to web traffic.
  • Active Directory Authentication. For windows based computers at Windows 7 (or greater).
  • SSH authentication for OSX on domain Macs.
  • Captured portal authentication – A local catch all mechanism if none of the above apply.

HTTPS Inspection

HTTPS Inspection (also known as SSL filtering and HTTPS interception) allows an internet management firewall or system to inspect secure internet traffic.

HTTPS was originally developed to ensure that sensitive web data could be exchanged between two computers without a third party being able to intercept the traffic and use it illegally or inappropriately. Many Internet Service Providers (ISPs) are reporting that a majority of their web traffic is now HTTPS traffic.

Without HTTPS inspection, a web filter cannot see the destination URL which makes categorisation unreliable and the filter cannot review content from the website. This can result in students either accidentally or purposefully accessing harmful or inappropriate content. Additionally, it also means that malware (malicious software) like viruses and trojans cannot be detected and blocked from entering the network and enables schools to enhance learning opportunities for students by safely allowing full internet browsing access whilst also ensuring their duty of care obligations are met.

 

http_security

firewall_for_education

Next Generation Firewall

The CyberHound Next Generation Firewall is very simple and intuitive to use. It can be used to permit or deny access to web pages, applications, IP addresses, ports and protocols, based on the time of day, the IP address of the user, the user’s group (if groups are enabled) and other criteria. Fundamentally, it allows for very granular access policies as required. 

CyberHound’s Next Generation Firewall allows network administrators to control access to actual applications rather than control the data communication ports that it may use and may be shared by other applications.

As the CyberHound Appliance can detect Skype at the application level meaning it is very useful for boarding schools where pupils can communicate with their parents at appropriate times, yet be denied access during teaching and study hours.

Anonomysers

As standard, many security appliances will block access to inappropriate web sites – however students can use anonomysers to circumvent these restrictions.

An anonymiser acts as an invisible method for students to access inappropriate content and on some solutions get round the restrictions. While it is possible to also block these anonymisers it’s a bit of a cat and mouse game with new anonymisers being created regularly.

The CyberHound Appliance is immune to these limitations as it is able to dynamically detect the behaviour of anonymisers and readily block them.

anonymous