New Jersey High School Takes Network Security to the Cloud

High Point Regional High School in Sussex, NJ has moved its network security system to the cloud.

Administrators found that the school was becoming increasingly dependent on technology but that it couldn't sustain the cost and administration of year-to-year hardware, support, and subscription purchases, according to information from the school. They began the process of looking for an enhanced network security system that could protect the technology systems for the school's 1,100 students, faculty, and administration while also laying a foundation for next generation education delivery platforms, such as iPads and other tablets.

"As a school system we are pressed from many angles: increased Internet usage, evolving threats, and constantly shrinking budgets. We also wear many hats, so we can't be experts in everything,”" said Thane Young, technology coordinator for High Point Regional High School, in a prepared statement.

After an extensive search, the school selected Bat Blue Networks' cloud-based Security-as-a-Service system, Cloud/Sec. Cloud/Sec is designed to replace dozens of disparate technologies. It offers application security, URL filtering, antivirus, antimalware, and protection from other Internet-based threats and can support multiple sites, remote users, and mobile devices. Because the solution is cloud-based, it does not require hardware or implementation costs, and it doesn't require a subscription.

Key features of Cloud/Sec include:

  • Single, global security policy for all of an organization's sites, applications, users, devices, and cloud instances;
  • Inbound and outbound security protection for all of an organization's assets and data as a single service;
  • Visibility, control, and threat management for all applications, ports, and protocols;
  • Ability to block malware, spyware, and other Internet-based threats;
  • Ability to alert, block, or allow access by specific URL site categories or file types;
  • Ability to decrypt encrypted content, scan it for malware, and then re-encrypt it for delivery, without exposing unencrypted content on-the-wire;
  • Round-the-clock support services; and
  • Granular blocking capabilities to identify specific search engine services, as well as anonymization and obfuscation to maintain privacy and security.

Further information about Cloud/Sec is available on the Bat Blue Networks site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.