Procera enables educational institutions to implement effective threat management strategies with market-proven intelligent policy enforcement solutions.
Threat Management: Malware and Phishing Protection
As an increasing number of devices running a diverse set of operating systems and applications come onto the campus network, mitigating security threats posed by the proliferation of Malware and Phishing has become top of mind. A device stricken with Malware can impact other subscribers adversely and potentially impact optimal operation of network infrastructure. Likewise, Phishing can compromise student’s identity and leave them to the arduous task of undoing the invasion of their privacy. Yet not all devices are similarly prone to these threats, nor are device-based approaches to the issue consistent and dependable. A holistic network-based approach provides the level of control and predictability that can additionally enhance the security posture of the entire campus.
How can campus network managers mitigate threats in their networks? They need solutions that enable them to:
- Provide comprehensive recognition of the broad array of Malware threats from suspect Domains to known Spyware and Adware purveyors, as well as the most accurate inventory of Phishing sites
- Prevent adverse impact to other subscribers or infrastructure within the framework of the network
- Ensure up-to-date Malware categorization as threats appear and evolve
The Procera Solution
Procera enables service providers to implement Malware mitigation in real-time with Content Intelligence (CI) solutions that provide three key use cases:
- Awareness of content being accessed by subscribers. Our CI solution provides the content being accessed and compares that to updated lists of sites known for hosting various Malware types.
- Enforcement of access limitations to content that has been historically identified as a known purveyor of Malware. Our CI solution applies user-aware policies to ensure that Malware, whatever the specific category, is prevented from using the network for distribution and further attack. If desired, these policies may be targeted to specific subscribers or device types as needed.
- Control through consistent application of CI, service providers can exert control over subscribers that could otherwise unintentionally access Malware and adversely impact network operation.