Education settings have very different demands on security than most businesses. Demand for bandwidth increases at a pace many times faster than enrollment. In addition, the threats to the network often come from within. Networks are constantly threatened by viruses and other malicious attacks from both the inside and out.
The challenges to network security for schools and libraries are often much greater than for normal businesses. The threats most often come from within. Educational institutions from elementary schools to colleges and universities continually battle viruses and other malicious software as well as Peer-to-Peer software used to illegally download music and videos that consume bandwidth.
Most K-12 schools have limited personnel and budgets to address network security issues. Technology coordinators generally have too many systems and too few hours to keep up with the latest security threats.
Colleges and Universities with on-campus student populations have a need to manage and control bandwidth utilization from applications such as streaming media and peer-to-peer. In addition, infected student PCs can create problems for the campus network.
Cerdant specializes in network design and security services for educational institutions at any level. We provide a variety of products and services designed to keep networks safe as well as help meet government regulations such as the Children's Internet Protection Act (CIPA).
We’re not just another equipment vendor. We are a team of network and security specialists who will make sure that your implementation goes smoothly and that your networks will be secure.
Currently Cerdant provides services to over 75 elementary and high schools. In addition, we provide managed security to several major colleges and universities with as few as 300 students as well as state colleges with enrollment of over 50,000 students. Most of Cerdant's products and services are eligible for E-Rate funding.
Cerdant specializes in a variety of solutions for education settings including:
• Anti-Virus/Anti-Spyware/Intrusion Prevention
• Content Management
• Bandwidth Management
• Secure Remote Access
• Real-time network monitoring and management