Nucleos Network Security

Managed end-to-end network security

Nucleos and our partners support end-to-end managed and monitored security across the entire correctional education network

Talk to Sales Download Guide

Nucleos Network Security Benefits

The Nucleos learning platform helps support the best possible education outcomes through:

Expand access securely

Restrict live Internet access while leveraging the best proven online content. A cloud solution leveraging filtered and secured online access allows integration with the widest range of high-quality and accredited content. For this reason, correctional agencies are increasingly looking to employ secure online academic portals for incarcerated.

Augment capacity

Nucleos can manage filtering of web pages and web apps. We monitor web pages and updates filters for any changes, and can block out certain components of pages such as comments, discussion boards, or messaging.

Audit usage

All network traffic is decrypted and usage history logged for all device usage on the network. Central logs are available for audit of activity across specific users and devices.

Log communications

All messaging which is allowed with instructors in applications is logged and searchable. Set keywords to flag or search aggregated message history across applications.

Want to explore how to support greater education technology within your program?

Schedule a Call

Security Features

Nucleos has a wide range of network security features to support filtered Internet. Enable access to the best web content

Message-logging middleware

A centralized middleware solution to monitor, record, and store all incarcerated learner communications with instructors allowed on all integrated applications or learning management systems on the platform.

Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)

  • Automated monitoring and threat detection for any anomalous network events and behavior
  • Human monitoring of any potential threats triggered
  • Unified data-store of network logs and traffic
  • 24/7 threat detection, response and remediation

Security System Best Practices

Enable greater access without compromising on security.

For best practices, a security system should include:

  • Complete visibility into all activity on the network, including within the network
  • Provide automatic threat detection and prevention, of both known threats and anomalous patterns. Threats must be detected from both people trying to break into the network (from inside or outside), as well as people trying to break out of the network from the inside.
  • Unified data-store of network logs and traffic
  • 24/7 threat detection, response and remediation