This page contains a Flash digital edition of a book.
52 | PROMOTION: IBOSS |


W: edtechnology.co.uk | T: @Educ_Technology


Allan Bower, Regional Director, EMEIA, iboss Network Security, tells us why mobile is at the core of education’s leap towards the digital classroom


Q A


How has the education landscape changed following pressure from


government to produce tech-savvy pupils and changes to the curriculum?


IT is now fi rmly on school pupils’ learning agenda. Starting


this academic year the computing curriculum came into eff ect, which means for the fi rst time children are learning abstraction, logic and algorithms. This is matched by GSCE pupils who are now learning to code. Alongside this, extensive government funding has been put into computer science training and pupils are being taught about job opportunities in cyber security. As a result, pupils are now more tech-savvy than the guardians of their school networks.


Q A


Aside from connectivity problems in schools what other


barriers are pupils facing at school in today’s digital society?


For pupils, being online is like breathing oxygen. There is no doubt


that without it their education will be suff ocated. Generation Y pupils expect access to online learning resources and not to be told no when it comes to using their favourite apps on their school iPads. Today’s pupils are not from a 'click culture'. They are touchscreen, digital and hyper-connected. Mobile is at the core of education’s leap towards the digital classroom and with it comes a host of wonderful learning benefi ts but these are being hindered by schools’ lacking the experience to connect pupils securely and enable a positive learning experience.


Q


How can schools bet er manage consumer technology and


ensure networks are secure without hampering the pupils’ experience?


“Being online is like breathing oxygen” A


With the proliferation of tablets and personal devices there are two


major challenges schools are facing, 1) blocking access to restricted applications and 2) controlling access to social media networks. In order to tackle these issues schools should seek to encourage productivity by 'pushing' approved applications to devices, rather than blocking access entirely. Location-based BYOD technologies are


also useful in tackling these challenges as schools can create web access policies by a user’s role and physical location on the network. This means pupil access to Facebook can be restricted whilst in the classroom, but enabled in the school canteen. Schools are able today to off er more fl exible policies whilst retaining focus in the classroom.


Q


How have school network


managers traditionally secured their networks and what impact do personal devices and developments in education technology have on their role and responsibilities?


fi ltering and anti-virus products to ensure the security of their networks. However, the advent of BYOD and the prevalence of targeted malware at acks have disrupted and restricted the capabilities of this technology to defend against threats, both inside and outside the network. IT managers need to adapt to a


A “IT managers need


to adapt to a security posture that caters


for today’s advanced threat landscape”


security posture that caters for today’s advanced threat landscape. To do so, they must adopt technologies that will provide them with increased visibility when it comes to monitoring factors like malware entering the network, how many devices are infected and how the infection could spread. A centralised view is required for schools to detect and respond to outbreaks and minimise classroom disruption. After all, for pupils at ending school it’s about learning not worrying about security or access to apps that help them to develop academically. ET


W: www.iboss.com


Historically school IT teams have managed traditional fi rewall,


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86