Start

umbrella education

Are you looking for CISCO Umbrella for schools or universities? Umbrella education

CISCO Umbrella for schools or universities. Umbrella education

CISCO offers a licensed personalized education package based on the number of teachers and staff. Students will be protected at no additional cost. Umbrella education.

umbrella-education-package

Simple and effective cloud security

Umbrella provides the first line of defense against Internet threats for users inside and outside the network by blocking requests to malicious destinations (domains, IP addresses, URLs) before a connection is established. All packages are delivered in the cloud without hardware to install or software to maintain. The Umbrella network provides 100% business uptime with more than 27 data centers worldwide.

Cisco cloud security is an effective, open, automated, and easy to administer security platform. Backed by industry-leading threat intelligence, it’s the fastest and easiest way to protect all your users in minutes. Because it is delivered from the cloud, there is no hardware to install or software to update manually. And you can deploy in minutes on distributed campus sites, to scale. Now you can protect students and staff while protecting data, identities and applications in the cloud.

 

What problems are solved with Cisco Umbrella for education?

Block threats before:

Stop malware before it reaches your campus network or student and teacher devices.

Extend protection:

Eliminate blind spots Protect students and staff wherever they go, anywhere they have access to the Internet, on or off campus.

Secure users, data, applications:

Protect users, data and applications in the cloud against compromised accounts, malware and data breaches. Enable compliance with CIPA (child protection law on the Internet) and HIPAA (portability and liability law for medical insurance).

Enable safe use:

Create a safe but open learning environment without impact on student privacy or staff productivity.

The time has changed

Traditional security in schools was not created to protect mobile users enabled for the cloud. Today’s schools and colleges are highly connected environments, with students and staff using their laptops, tablets and smartphones to access institutional data anywhere, both on and off campus. As a result, users are more likely to become infected with malware because they connect directly to the Internet, creating gaps in visibility and coverage. Students and teachers have the flexibility to automatically install and enable applications, or access, create and share information with anyone, anywhere. That means that schools and universities around the world face an increased risk of sensitive data being exposed inadvertently or maliciously.

Applications, data and identities are moving to the cloud very quickly to take advantage of cost savings, scalability and accessibility. For schools, adopting SaaS applications gives students and faculty more control over the applications they use and the information they share on and off campus. With SaaS, applications and sensitive data are no longer restricted behind a firewall, and your staff does not need to use the VPN to do their job. As more schools and distributed learning environments depend on the cloud, direct access to the Internet is favored instead of directing traffic through the campus network.

 

Test CISCO UMBRELLA for free for 14 days

meraki NV12

Meraki MV12 Indoor Security Cameras Managed in the Cloud

A little over a year ago, Cisco Meraki launched a new product category and expanded its portfolio to include security cameras. The introduction of MV brought a revolutionary architecture to the world of physical security, placing video storage and processing in the same camera. Today we announce MV12, which represents a great leap in security cameras and advanced video analysis.

Meraki MV12 Indoor Security Cameras Managed in the Cloud

Video surveillance without the need for NVRs or VMS recording systems, all managed from the cloud and, above all, easy to configure. Simplicity in the full extent of the word.

We emphasize the centralized management in the cloud, which allows us to access the image in real time, configure and make all the adjustments from any device authorized for it.

MV12 introduces an innovative architecture that places storage locally in the camera and removes the network video recorder (NVR) from the equation. This not only drastically simplifies the installation but also eliminates a large network security vulnerability. It has remote problem solving tools reducing resolution time and freeing IT staff.

Because MV is managed through the browser based on the Meraki control panel and works with a license model, there is no need to buy, download and maintain any additional software.
Management through the Meraki control panel guarantees that firmware updates will be continuously deployed throughout the life of the product.

 

 The MV12 model improving excellence: Wifi, object detection and machine learning

Unlike many other video analysis solutions that require bulky servers, expensive software and often dedicated hardware to operate, MV12 remains true to Meraki’s core values by offering an all-in-one solution. Take advantage of the same hardware that feeds many of the smart phones, and place one in each camera, the work of analyzing the video occurs in the same camera, not in the cloud or on a server.

What does this mean in terms of functionality?

With an industry-leading processor, MV12 models are not only capable of providing high-definition (1080p) video, but they also allow built-in analytical capabilities that previously and as we have said, additional software and hardware was necessary. Once installed, they take advantage of the power of vision and machine learning. These cameras will learn to identify categories of objects, such as people (not to confuse them with “face recognition”, which links images to unique identities) and get more precision over time. To give examples, over time, MV12 will quantify how many people walked through the window of a store or people at a bus stop, defining patterns of behavior.

The internal design and architecture of the cameras allow to store up to 256 Gb of information, without the need for any external system, and thanks to intelligent development, Meraki cameras are able to process the scenario and only save the information when changes are made in the image, so all the unnecessary information does not waste resources:

meraki mv21-1

meraki mv21-1

 

The following video shows how the movement search works in Cisco Meraki MV and how it facilitates the retroactive identification of critical events without using the fast forward button:

 

MV12 is an indoor camera with easy video management, easy to export and share videos clip, bandwidth optimization, cloud management and through themachine learning adds ability to detect objects and even people.

The new generation of meraki MV12 cameras, which among other features includes:

    • Managed in the cloud with full integration in the Meraki dashboard
    • Plug and Play implementation with autoconfiguration
    • Remote adjustment of focus and aperture
    • Dynamic transition from day to night with IR illumination
    • Optimized motion indexing engine with historical search
    • Shared video panel with individual designs that support multiple cameras
    • Selective export capability with proxy in the cloud
    • Video processing for object detection with automatic learning
    • Motion-based retention and programming
    • Highly granular view, review and export of user permissions with SAML integration

All specifications: camera meraki MV

We make a comparison between the three MV12 models

MV12W, with a wide field of view (FOV), provides context images

MV12N, with a narrow FOV helps identify subjects

MV12WE, offers reduced storage and a wide field of view at an economical price level

Meraki MV12NMeraki MV12WMeraki  MV12WE
CAMERA
1/3″ 4MP (2688×1520) progressive CMOS image sensor
high endurance solid state storage256GB256GB128GB
mm focal length3.8mm2.8mm2.8mm
f/1.8 minimum aperture
FIELD OF VIEW
73° horizontal114° horizontal114° horizontal
44° vertical61° vertical61° vertical
86° diagonal132° diagonal132° diagonal
1/32,000s to 1/30s shutter speed
Minimum illumination 0.18 Lux (standard recording) and 0.01 Lux (night mode)
S/N Ratio 52.9dB
Built-in IR illuminators, effective up to 15m (49ft)
VIDEO
1080p HD video recording (1920×1080) with H.264 encoding
Cloud augmented edge storage (video at the edge, metadata in the cloud)
Direct live streaming with no client software (native browser playback)**
Stream video anywhere with autotmatic cloud proxy
DATA SECURITY
Full disk encryption (256-bit)
Automatically purchased and provisioned TLS certificates (publicly-signed)
NETWORKING
1x 10/100/1000 Base-T Ethernet (RJ45)

Dual band WLAN 802.11 a/b/g/n/ac
DSCP traffic marking
** Browser support for H.264 decoding required.

 

Do you want to try this security camera without cost?

With the Meraki Trial program, you can try any combination of Cisco Meraki products in your network at no charge. If Meraki is not suitable for you, simply return the equipment with the return label that is sent.

 

 

The WPA2 protocol has been tampered with. WIFI compromised security.

The WPA2 protocol has been tampered with. WIFI compromised security.

They have appeared a few hours ago, news about a series of errors in the core of the WPA2 protocol that could expose the connections that are made through your WiFi.

The WPA2 Wi-Fi protocol is one of the most common and used in the world. This would be a big problem at all levels, from individuals to companies

 

What does this mean?

This allows an attacker to “listen” to traffic passing between computers and access points through an attack designed to exploit them.

It’s called KRACK, short for Key Reinstallation Attacks, and it works by exploiting the WPA2’s “four-way handshake.” Take advantage of the four-way handshake that is used the first time you connect to a network with a WiFi network, and which establishes the keys with which your traffic is encrypted.

 

How can it affect me?

First, the attacker must be within range of the WiFi network since it is not a remote attack. An attacker who is physically close to your network or router could steal your WiFi password, check your activity on the Internet, intercept unencrypted connections.

If someone wants to exploit this vulnerability has to be physically close to your computer, so any Internet cracker can not enter it. And even if you do, you can only access information that is unprotected in your network. And there is a lot of other private information that does not delegate to WPA2 protocols. For example, every time you enter an HTTPS protected web, your browser “negotiates” an independent encryption layer. This means that even if your WiFi is compromised, the information you exchange with secure webs will remain protected.

In any case, it is still a serious problem. These vulnerabilities could disrupt existing communications within a network.

More details will be given in a few hours.