Overcoming K-12 IT Challenges: Appropriate Use & Theft Management



Similar documents
How To Write A Mobile Device Policy

Computrace Agent Quick Reference and Best Practices Guide

Symantec IT Management Suite 7.5 powered by Altiris

Mobile device and application management. Speaker Name Date

ForeScout MDM Enterprise

NETOP VISION CLASSROOM MANAGEMENT SOFTWARE. Using Vision in mobile labs and BYOD environments

The ForeScout Difference

whitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment

IBM Endpoint Manager for Mobile Devices

Abilene Independent School District. Bring Your Own Device Handbook

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

TECHNOLOGY PLAN SUMMARY

Device Lifecycle Management

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Simplifying Desktop Mgmt With Novell ZENworks

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Tom Schauer TrustCC cell

Kaseya IT Automation Framework

Network Access Protection (NAP)

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Securing BYOD With Network Access Control, a Case Study

The Maximum Security Marriage:

Emerging PC Life Cycle Configuration Management Vendors

Symantec Mobile Management 7.2

IBM Endpoint Manager for Core Protection

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

ios 9.3 Enterprise Solution Brief MobileIron and ios 9.3

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Altiris IT Management Suite 7.1 from Symantec

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

ios Education Deployment Overview

How To Manage A Mobile Device Management (Mdm) Solution

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Embracing Complete BYOD Security with MDM and NAC

Microsoft Windows Intune: Cloud-based solution

Altiris IT Management Suite 7.1 from Symantec

What We Do: Simplify Enterprise Mobility

Quick Start Guide. Version R9. English

Upper Arlington Schools

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Bring Your Own Device (BYOD) Policy Revised: April 2012

Healthcare Buyers Guide: Mobile Device Management

Guideline on Safe BYOD Management

DOBUS And SBL Cloud Services Brochure

Lumension Endpoint Management and Security Suite

Enterprise Desktop Software Management Services Replacement for Novell ZENworks

WILLSBORO CSD Instructional Technology Plan - Annually

6 Things To Think About Before Implementing BYOD

Managing and Securing the Mobile Device Invasion IBM Corporation

Symantec Mobile Management Suite

St Mark s Church School (Version 2) Bring Your Own Device Policy

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Enterprise- Grade MDM

Dell World Software User Forum 2013

NetSupport Manager v11

The Ultimate Guide to Buying HR Software for your Growing Business. Get your decision right with this step-by-step guide!

Dynamic Service Desk. Unified IT Management. Solution Overview

Mobile Device Management for CFAES

How to Remotely Track Any Lost Smartphone, Tablet, or PC

Symantec Mobile Management for Configuration Manager 7.2

Desktop as a Service (DaaS): A Solution for Modern Agencies

IT Security. Muscat 15+ ABOUT US IN A GLANCE

VMware End User Computing Horizon Suite

Access Tropical Cloud Desktop from Any Device

Take Back Control in IT. Desktop & Server Management (DSM)

MORIAH CSD Instructional Technology Plan - Annually

IBM Tivoli Asset Management for IT

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

BALTIMORE CITY PUBLIC SCHOOLS (CITY SCHOOLS) 147

Cisco UCS Central Software

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

How To Create A Virtual Desktop In Gibidr

Apple Configurator MDM Site - Review

Codeproof Mobile Security & SaaS MDM Platform

Symantec Client Management Suite 8.0

Transcription:

Overcoming K-12 IT Challenges: Appropriate Use & Theft Management Featured Speakers: Craig Nulan, IT Operations Manager and Network Security Engineer Kansas City Public Schools Tim Williams, Director of Product Management Absolute Software Content provided by Webinar hosted by

Today s Speakers Content provided by Craig Nulan IT Operations Manager and Network Security Engineer Kansas City Public Schools Tim Williams Director of Product Management Absolute Software Moderator Sean Herdman Associate Publisher Education Week Webinar hosted by

Objectives Content provided by Satisfying Federal Grant Criteria: Prove compliance with federal programs Managing a Computer and Mobile Device Fleet: Single panel access Documenting Individual Responsibility & Accountability: Tag, trace, document Building World-Class Use & Compliance: Proactive planning Webinar hosted by

Ensuring Appropriate Use of 1:1 Computing Equipment: Leveraging Absolute Computrace & Absolute Manage Craig Nulan IT Operations Manager and Network Security Engineer Kansas City Public Schools

What is Materiality? ma-te-ri-al-i-ty /məˌti(ə)rēˈalitē/ Materiality is a concept or convention within auditing and accounting relating to the importance/significance of an amount, transaction, or discrepancy. 5

Public Education Unique Compliance Issues Kansas City Public Schools 16,700 students across: 25 elementary schools 8 high schools 1 manual career technical center Employs 2,300 teachers and administrators 10+ million in annual federal/state and grant program funding 5% of most grants are set aside specifically for independent measurement to demonstrate appropriate use 6

erate Worth Millions See this little pink tag it s critical!!! 7

Screw Up and Lose It Four years to get our funding back Cleaned up, reported on, implemented a policy and had strict enforcement Did you know, even stored and decommissioned equipment has to be tagged and documented? 8

Technology Equipment and Services $3m to $7m in annual funding to purchase technology equipment and services Current classroom AV upgrade: $4m project Two years in the making Intended to profoundly impact the way in which instruction is delivered in our classrooms.

One-to-One As our dependence on technology equipment for education increases, our dependence on external funding sources to obtain this equipment increases

A Little Perspective Down to just 30 stored devices from 1100 laptops from 31 locations When 1:1 rollout is complete we ll have 20,000 devices across 34 locations

Title I Audit Passing Grade! PROJECT: 7 week clean-up Consisted of rounding up all laptops assigned to 1:1 learning (1100 machines, 31 locations) and bringing them downtown for manual processing so that each one was: Traced to its original funding source Documented and tagged according to that funding source Signed agreement stipulating personal and professional accountability placed on file OS updated from Windows XP to Windows 7 (if needed)

Documented Individual Responsibility and Accountability Kansas City Public Schools Equipment Loan Form * Reference Number (Employee ID) * Date Issued * Name * Location Name * Home Address * Location Code * City, State, Zip * Department Assignment (if applicable) * Home Phone/Cell Phone# * Job Title *Mandatory Fields Description *X *District Tag # or ID # *Make/Model Serial Number Estimated Value Original Purchase Data Date PO # *Program Tag Laptop Computer Docking Station Lockdown Cable & Key 30.00 Mouse (Wired)Wireless (10.00) 15.00 Laptop Bag 40.00 Power Cords (1) (2) 40.00/80.00 Network Cable 10.00 Printer Cable 10.00 ipad Charger Keyboard Tablet Cover 40.00 By signing below, I acknowledge and agree that the item(s) identified on this form will remain District property while in my possession and control. I also acknowledge and agree that I will be personally and solely responsible for reimbursing the District the full replacement cost for any damaged or lost item(s) if I do not follow the Reporting Procedures for Lost and Stolen Equipment. If I lose or damage any item(s) and the District is unable to recover the full replacement cost from insurance, I agree that I will reimburse the District the full replacement cost within thirty (30) days of the loss and/or damage. If I do not reimburse the District in full, within thirty (30) days, the full replacement cost will be deducted from my earnings. This equipment has been assigned to your work location or department based on the funding source when the equipment was originally purchased. Should you change work locations or department assignments, your equipment must be turned-in to your immediate supervisor. All necessary equipment will be provided by your new location or department. Upon termination of employment, equipment must be turned-in to the Information Technology Dept., 5 th Floor, BOE building. *Signature of individual receiving equipment *Date *Signature of individual delivering equipment *Date I have read, I understand, and will follow the lost laptop reporting procedure.

Keeping The Compliance Ball Rolling Consensus regarding materiality and the importance of implementing controls so that we can ALWAYS show and prove our appropriate use compliance status We don t EVER want to repeat this exercise again Using Absolute Computrace and Absolute Manage we won t have to: Computrace is installed on all laptops Absolute Manage will be deployed to all laptops automatically on call-in

Inventory Management Job Title Date Laptop Issued Laptop Asset Tag # Laptop Model Laptop Serial # Est. Value Purchase Date Purchase Order # Program Code Program Name Grant Tag Required TEACHER 8/9/2012 00485263 DELL 5510 5V779N1 $ 1,120.00 10/20/10 292524 710 TITLE I YES TEACHER 8/10/2012 00485915 DELL 5510 FY779N1 $ 1,120.00 10/20/10 292524 710 TITLE I YES TEACHER 8/8/2012 00501310 HP4530 CNU1321GO C $ 943.00 10/04/11 301905 352 K-6 MATH/SCIEN CE YES TEACHER 8/9/2012 00485178 DELL 5510 6ZJZ8N1 $ 1,120.00 10/20/10 292524 710 TITLE I YES TEACHER 8/17/2012 00485760 DELL 5510 F1779N1 $ 1,120.00 10/20/10 292524 710 TITLE 1 YES

Inventory within Absolute Manage Database

World-Class Appropriate Use & Compliance Phase 1 of our student 1:1 rollout will consist of 2400 devices purchased using Title I and Federal Innovative Approaches to Literacy grant funds Taking our lessons learned, we go from managing appropriate use compliance and documentation of static technology infrastructure to managing and controlling appropriate use compliance and documentation for a huge fleet 1000 static network infrastructure elements - erate 4000 static classroom elements AV upgrade - Title I 20,000 mobile elements 1:1 Title I, erate, Other

Thank You Craig Nulan IT Operations Manager and Network Security Engineer, Kansas City Public Schools

Absolute Software Tim Williams Director, Product Management Absolute Software

Leading in a rapidly changing market Two decades managing and securing diverse endpoints Gartner 2012 Magic Quadrant for Client Management Tools

Absolute Software: Track. Manage. Secure. Endpoint Security Centrally track and secure IT assets within a cloud-based console. Remotely manage and administer self-encrypting drives built into new computers. Endpoint Management Manage PC, Mac, Android, Windows, and ios devices to take strategic and responsive action.

Absolute Persistence The Absolute persistence module is embedded into the firmware of computers and tablets at the factory. It persistently reinstalls Absolute client agents if they are removed from a device.

Absolute Manage Many users rely on multiple devices mobile and computers Mac is making great gains not replacing Windows, but added to the mix Absolute Manage integrates with your existing infrastructure Absolute Manage integrates with your organizational Absolute Manage makes policies repeatable, enforceable and scalable Absolute Persistence enables continuous, reliable reporting

Absolute Manage Unified Management for Computers and Mobile Devices Cross-Platform Role-Based Administration Proactive, Policy-Based Management Mobile Asset Management Automated device provisioning Detailed inventory Automated actions and alerting Easily customized reports Mobile Security Management Enforce device configurations Detect jailbroken devices Remediate violations Mobile Content Management Mobile Application Management App Distribution App Configuration App blacklisting App Inventory and Licensing Imaging & Deployment Asset Inventory Application Management Change & Configuration Management Patch Management Power Management Nearly 20 Years of Endpoint Management & Security Expertise

Thank You For more information: Toll-Free: Website: 1 800 220 0733 (US & Canada) www.absolute.com Product Demos: Absolute Manage for Mobile Device Management Absolute Manage for Endpoint Management Computrace for Endpoint Security