Nucleos Network Security
Managed end-to-end network security

Nucleos and our partners support end-to-end managed and monitored security across the entire correctional education network
Talk to SalesNucleos Network Security Benefits
The Nucleos learning platform helps support the best possible education outcomes through:

Expand access securely
Restrict live Internet access while leveraging the best proven online content. A cloud solution leveraging filtered and secured online access allows integration with the widest range of high-quality and accredited content. For this reason, correctional agencies are increasingly looking to employ secure online academic portals for incarcerated.

Augment capacity
Nucleos can manage filtering of web pages and web apps. We monitor web pages and updates filters for any changes, and can block out certain components of pages such as comments, discussion boards, or messaging.

Audit usage
All network traffic is decrypted and usage history logged for all device usage on the network. Central logs are available for audit of activity across specific users and devices.

Log communications
All messaging which is allowed with instructors in applications is logged and searchable. Set keywords to flag or search aggregated message history across applications.
Want to explore how to support greater education technology within your program?
Schedule a CallSecurity Features
Nucleos has a wide range of network security features to support filtered Internet. Enable access to the best web content

Message-logging middleware
A centralized middleware solution to monitor, record, and store all incarcerated learner communications with instructors allowed on all integrated applications or learning management systems on the platform.

Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)
- Automated monitoring and threat detection for any anomalous network events and behavior
- Human monitoring of any potential threats triggered
- Unified data-store of network logs and traffic
- 24/7 threat detection, response and remediation
Security System Best Practices
Enable greater access without compromising on security.
For best practices, a security system should include:
- Complete visibility into all activity on the network, including within the network
- Provide automatic threat detection and prevention, of both known threats and anomalous patterns. Threats must be detected from both people trying to break into the network (from inside or outside), as well as people trying to break out of the network from the inside.
- Unified data-store of network logs and traffic
- 24/7 threat detection, response and remediation