SlideShare une entreprise Scribd logo
1  sur  1
Visit fortinet.com/education to learn more about protecting
your educational institution from today’s threats.
Since 2005, HIGHER EDUCATION INSTITUTIONS
have been the VICTIM OF BREACHES involving
nearly 13 MILLION KNOWN RECORDS The average global cost
per lost education record
Today’s students
spend 140+ HOURS
A WEEK with their
tech devices
of students connect AT LEAST
TWO DEVICES to the campus
network at the same time
of higher education students
would like to use mobile
technologies MORE
OFTEN THAN THEY
DO NOW
of college students
agree tablets WILL
TRANSFORM THE
WAY THEY LEARN IN
THE FUTURE
of higher education institutions now
look to CLOUD OPTIONS FIRST
when considering new investments
40%
72%
83%
63%
44ZETTABYTES
Total amount of data in
the world expected by
2020
01001010010101011010101101101100011001101010101101001001001001001
010001010110000001110100111001100000000TAX INFORMATION10010010100
TRANSCRIPTS AND GRADES10100101010000101010101000001101000010101001
10100011110001010101000001101010011010010101001010101110101100101000110
100DISCIPLINARY RECORDS1011111100101010100010100ADDRESSES0101001010
011111001010010101011010101101101100011001101010101101001001001001001
0100PASSPORT NUMBERS10000101001001010100VISA PERMIT NUMBERS101
01001010010101011010101101101100011001101010101101001001001001001
00111001SENSITIVE UNIVERSITY RESEARCH DATA010000100010010101010001001
01001010010101011010101101101100011001101010101101001001001001001
011SOCIAL SECURITY NUMBERS00100110101CREDIT CARD INFORMATION10101
01001010010101011010101101101100011001101010101101001001001001001000
01001010010101010010010DRIVER’S LICENSE NUMBERS0110100100100100100101
$246
RANSOMWARE MALWARE SERVICE DENIAL PHISHING
Information security is the
TOP HIGHER EDUCATION
IT ISSUE IN
HIGHER EDUCATION INSTITUTIONS
WILL LOOK FOR SOLUTIONS THAT:
• Reduce security complexity
• Save IT resources and budget
• Pass rigorous third-party tests
2017
17%
$252BThe global education
technology market is
PREDICTED TO GROW
PER YEAR
BY 2020
TO
Security
challenges
Student demand
for technology
innovation
TOP DRIVERS
THE "IT" FACTOR
PROTECTING
HIGHER
EDUCATION
DATA
GOING DIGITAL
DATA OVERLOAD
WHAT’S AT RISK?
LOSE DATA, LOSE MONEY
COMBAT THE ATTACKS
FORTINET UNDERSTANDS AND APPRECIATES the unique challenges
educators face in delivering engaging, relevant, and meaningful
learning opportunities to students while maintaining a high level of
network security to protect data and meet compliance standards.

Contenu connexe

Tendances

Exploring the Use of Digital Technologies and Devices in Student Learning
Exploring the Use of Digital Technologies and Devices in Student Learning Exploring the Use of Digital Technologies and Devices in Student Learning
Exploring the Use of Digital Technologies and Devices in Student Learning SHU Learning & Teaching
 
Applying technology in schools
Applying technology in schoolsApplying technology in schools
Applying technology in schoolsnawaselinda
 
Chaptr Global Pitchdeck
Chaptr Global PitchdeckChaptr Global Pitchdeck
Chaptr Global PitchdeckCyril Michino
 
Education safety
Education safety Education safety
Education safety Jordan Holt
 
K-12 School Safety Planning in Alabama
K-12 School Safety Planning in AlabamaK-12 School Safety Planning in Alabama
K-12 School Safety Planning in AlabamaKathleen Lawrence
 
CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)Ed Nagelhout
 
Mobile learning.. Trends and Opportunities
Mobile learning.. Trends and OpportunitiesMobile learning.. Trends and Opportunities
Mobile learning.. Trends and OpportunitiesHamdi Nsir
 
Open educational resources in criminal justice
Open educational resources in criminal justice Open educational resources in criminal justice
Open educational resources in criminal justice BillOverby1
 
Richard Hinshaw - Education Technology Powerpoint
Richard Hinshaw - Education Technology PowerpointRichard Hinshaw - Education Technology Powerpoint
Richard Hinshaw - Education Technology Powerpointguest5db8c8a
 
Public students benifit
Public students benifitPublic students benifit
Public students benifitsabosa
 
Additional resources (1)
Additional resources (1)Additional resources (1)
Additional resources (1)Cathybosco
 
BYOD/BYOT Implementation Plan for 7th Grade Mathematics
BYOD/BYOT Implementation Plan for 7th Grade MathematicsBYOD/BYOT Implementation Plan for 7th Grade Mathematics
BYOD/BYOT Implementation Plan for 7th Grade Mathematicsemurray5
 
Study International - Q1 Digital device trends among international students
Study International - Q1 Digital device trends among international studentsStudy International - Q1 Digital device trends among international students
Study International - Q1 Digital device trends among international studentsChristine McFadden
 
Using News Websites In Elt
Using News Websites In EltUsing News Websites In Elt
Using News Websites In EltDIEGOFMACIAS
 

Tendances (20)

Exploring the Use of Digital Technologies and Devices in Student Learning
Exploring the Use of Digital Technologies and Devices in Student Learning Exploring the Use of Digital Technologies and Devices in Student Learning
Exploring the Use of Digital Technologies and Devices in Student Learning
 
Applying technology in schools
Applying technology in schoolsApplying technology in schools
Applying technology in schools
 
Chaptr Global Pitchdeck
Chaptr Global PitchdeckChaptr Global Pitchdeck
Chaptr Global Pitchdeck
 
Education safety
Education safety Education safety
Education safety
 
K-12 School Safety Planning in Alabama
K-12 School Safety Planning in AlabamaK-12 School Safety Planning in Alabama
K-12 School Safety Planning in Alabama
 
CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)
 
Prof. Rose Mwonya, Keynotes at 2016 ELICE
Prof. Rose Mwonya, Keynotes at 2016 ELICEProf. Rose Mwonya, Keynotes at 2016 ELICE
Prof. Rose Mwonya, Keynotes at 2016 ELICE
 
Article for tech systems
Article for tech systemsArticle for tech systems
Article for tech systems
 
Article for tech systems
Article for tech systemsArticle for tech systems
Article for tech systems
 
Mobile learning.. Trends and Opportunities
Mobile learning.. Trends and OpportunitiesMobile learning.. Trends and Opportunities
Mobile learning.. Trends and Opportunities
 
Open educational resources in criminal justice
Open educational resources in criminal justice Open educational resources in criminal justice
Open educational resources in criminal justice
 
Richard Hinshaw - Education Technology Powerpoint
Richard Hinshaw - Education Technology PowerpointRichard Hinshaw - Education Technology Powerpoint
Richard Hinshaw - Education Technology Powerpoint
 
Unification of Services - How to Do More with Less
Unification of Services - How to Do More with LessUnification of Services - How to Do More with Less
Unification of Services - How to Do More with Less
 
Public students benifit
Public students benifitPublic students benifit
Public students benifit
 
Case Study ScholarChip
Case Study ScholarChipCase Study ScholarChip
Case Study ScholarChip
 
Additional resources (1)
Additional resources (1)Additional resources (1)
Additional resources (1)
 
BYOD/BYOT Implementation Plan for 7th Grade Mathematics
BYOD/BYOT Implementation Plan for 7th Grade MathematicsBYOD/BYOT Implementation Plan for 7th Grade Mathematics
BYOD/BYOT Implementation Plan for 7th Grade Mathematics
 
Study International - Q1 Digital device trends among international students
Study International - Q1 Digital device trends among international studentsStudy International - Q1 Digital device trends among international students
Study International - Q1 Digital device trends among international students
 
Using News Websites In Elt
Using News Websites In EltUsing News Websites In Elt
Using News Websites In Elt
 
M-learning overview
M-learning overviewM-learning overview
M-learning overview
 

Similaire à Protecting Higher Education Data

Educ tech in us - vci irosin
Educ tech in us - vci irosinEduc tech in us - vci irosin
Educ tech in us - vci irosinxxypher88
 
A different perspective on university IT
A different perspective on university ITA different perspective on university IT
A different perspective on university ITsarahmusselbrook
 
Internet access and_safety_for_schools
Internet access and_safety_for_schoolsInternet access and_safety_for_schools
Internet access and_safety_for_schoolsnielson900
 
Internet access and_safety_for_schools
Internet access and_safety_for_schoolsInternet access and_safety_for_schools
Internet access and_safety_for_schoolsnielson900
 
Lesson 16 (educ tech )
Lesson 16 (educ tech )Lesson 16 (educ tech )
Lesson 16 (educ tech )Claries Gomez
 
Appleton Opening
Appleton OpeningAppleton Opening
Appleton Openingelizkeren
 
Latest Trends in EdTech BYOD Report Here
Latest Trends in EdTech BYOD Report HereLatest Trends in EdTech BYOD Report Here
Latest Trends in EdTech BYOD Report HereSean Peasgood
 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
 
Embracing The Power Of The Mobile Revolution
Embracing The Power Of The Mobile RevolutionEmbracing The Power Of The Mobile Revolution
Embracing The Power Of The Mobile Revolutionguestb460b51
 
Detecon casa annual function 2014 presentation 04 bjîrn menden
Detecon casa annual function 2014 presentation 04 bjîrn mendenDetecon casa annual function 2014 presentation 04 bjîrn menden
Detecon casa annual function 2014 presentation 04 bjîrn mendenBjörn Menden
 
Covid19 pandemic and education system.
Covid19 pandemic and education system.Covid19 pandemic and education system.
Covid19 pandemic and education system.farhana khaliq
 
Ryan del rosario
Ryan del rosarioRyan del rosario
Ryan del rosarioyanyanz
 
Itft College Chandigarh
Itft College ChandigarhItft College Chandigarh
Itft College Chandigarhitft college
 
Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010shirleyclubb
 
Online Learning in Education
Online Learning in EducationOnline Learning in Education
Online Learning in Educationzpleger
 
Importance of Technology
Importance of TechnologyImportance of Technology
Importance of TechnologyDecarpio
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-educationHamit Çizmeci
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-educationSwati Sharma
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-educationCalvin mcgee
 

Similaire à Protecting Higher Education Data (20)

Educ tech in us - vci irosin
Educ tech in us - vci irosinEduc tech in us - vci irosin
Educ tech in us - vci irosin
 
A different perspective on university IT
A different perspective on university ITA different perspective on university IT
A different perspective on university IT
 
Internet access and_safety_for_schools
Internet access and_safety_for_schoolsInternet access and_safety_for_schools
Internet access and_safety_for_schools
 
Internet access and_safety_for_schools
Internet access and_safety_for_schoolsInternet access and_safety_for_schools
Internet access and_safety_for_schools
 
Lesson 16 (educ tech )
Lesson 16 (educ tech )Lesson 16 (educ tech )
Lesson 16 (educ tech )
 
Appleton Opening
Appleton OpeningAppleton Opening
Appleton Opening
 
Latest Trends in EdTech BYOD Report Here
Latest Trends in EdTech BYOD Report HereLatest Trends in EdTech BYOD Report Here
Latest Trends in EdTech BYOD Report Here
 
Tech Notes
Tech NotesTech Notes
Tech Notes
 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
 
Embracing The Power Of The Mobile Revolution
Embracing The Power Of The Mobile RevolutionEmbracing The Power Of The Mobile Revolution
Embracing The Power Of The Mobile Revolution
 
Detecon casa annual function 2014 presentation 04 bjîrn menden
Detecon casa annual function 2014 presentation 04 bjîrn mendenDetecon casa annual function 2014 presentation 04 bjîrn menden
Detecon casa annual function 2014 presentation 04 bjîrn menden
 
Covid19 pandemic and education system.
Covid19 pandemic and education system.Covid19 pandemic and education system.
Covid19 pandemic and education system.
 
Ryan del rosario
Ryan del rosarioRyan del rosario
Ryan del rosario
 
Itft College Chandigarh
Itft College ChandigarhItft College Chandigarh
Itft College Chandigarh
 
Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010
 
Online Learning in Education
Online Learning in EducationOnline Learning in Education
Online Learning in Education
 
Importance of Technology
Importance of TechnologyImportance of Technology
Importance of Technology
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-education
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-education
 
E learning-for-education
E learning-for-educationE learning-for-education
E learning-for-education
 

Plus de Fortinet

Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet
 
FortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortinet
 
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitWhy Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitFortinet
 
The What and Why of PBM and OML
The What and Why of PBM and OML The What and Why of PBM and OML
The What and Why of PBM and OML Fortinet
 
The Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionThe Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionFortinet
 
Fortinet Connected UTM
Fortinet Connected UTMFortinet Connected UTM
Fortinet Connected UTMFortinet
 
Forrester Research on OT Cybersecurity
Forrester Research on OT CybersecurityForrester Research on OT Cybersecurity
Forrester Research on OT CybersecurityFortinet
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusFortinet
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017Fortinet
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportFortinet
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016Fortinet
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data Fortinet
 

Plus de Fortinet (13)

Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
 
FortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortiClient Fabric Agent Trial
FortiClient Fabric Agent Trial
 
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitWhy Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
 
The What and Why of PBM and OML
The What and Why of PBM and OML The What and Why of PBM and OML
The What and Why of PBM and OML
 
The Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionThe Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling Execution
 
Fortinet Connected UTM
Fortinet Connected UTMFortinet Connected UTM
Fortinet Connected UTM
 
Forrester Research on OT Cybersecurity
Forrester Research on OT CybersecurityForrester Research on OT Cybersecurity
Forrester Research on OT Cybersecurity
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
 

Dernier

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 

Dernier (9)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 

Protecting Higher Education Data

  • 1. Visit fortinet.com/education to learn more about protecting your educational institution from today’s threats. Since 2005, HIGHER EDUCATION INSTITUTIONS have been the VICTIM OF BREACHES involving nearly 13 MILLION KNOWN RECORDS The average global cost per lost education record Today’s students spend 140+ HOURS A WEEK with their tech devices of students connect AT LEAST TWO DEVICES to the campus network at the same time of higher education students would like to use mobile technologies MORE OFTEN THAN THEY DO NOW of college students agree tablets WILL TRANSFORM THE WAY THEY LEARN IN THE FUTURE of higher education institutions now look to CLOUD OPTIONS FIRST when considering new investments 40% 72% 83% 63% 44ZETTABYTES Total amount of data in the world expected by 2020 01001010010101011010101101101100011001101010101101001001001001001 010001010110000001110100111001100000000TAX INFORMATION10010010100 TRANSCRIPTS AND GRADES10100101010000101010101000001101000010101001 10100011110001010101000001101010011010010101001010101110101100101000110 100DISCIPLINARY RECORDS1011111100101010100010100ADDRESSES0101001010 011111001010010101011010101101101100011001101010101101001001001001001 0100PASSPORT NUMBERS10000101001001010100VISA PERMIT NUMBERS101 01001010010101011010101101101100011001101010101101001001001001001 00111001SENSITIVE UNIVERSITY RESEARCH DATA010000100010010101010001001 01001010010101011010101101101100011001101010101101001001001001001 011SOCIAL SECURITY NUMBERS00100110101CREDIT CARD INFORMATION10101 01001010010101011010101101101100011001101010101101001001001001001000 01001010010101010010010DRIVER’S LICENSE NUMBERS0110100100100100100101 $246 RANSOMWARE MALWARE SERVICE DENIAL PHISHING Information security is the TOP HIGHER EDUCATION IT ISSUE IN HIGHER EDUCATION INSTITUTIONS WILL LOOK FOR SOLUTIONS THAT: • Reduce security complexity • Save IT resources and budget • Pass rigorous third-party tests 2017 17% $252BThe global education technology market is PREDICTED TO GROW PER YEAR BY 2020 TO Security challenges Student demand for technology innovation TOP DRIVERS THE "IT" FACTOR PROTECTING HIGHER EDUCATION DATA GOING DIGITAL DATA OVERLOAD WHAT’S AT RISK? LOSE DATA, LOSE MONEY COMBAT THE ATTACKS FORTINET UNDERSTANDS AND APPRECIATES the unique challenges educators face in delivering engaging, relevant, and meaningful learning opportunities to students while maintaining a high level of network security to protect data and meet compliance standards.