New Jersey High School Takes Network Security to the Cloud

High Point Regional High School in Sussex, NJ has moved its network security system to the cloud.

Administrators found that the school was becoming increasingly dependent on technology but that it couldn't sustain the cost and administration of year-to-year hardware, support, and subscription purchases, according to information from the school. They began the process of looking for an enhanced network security system that could protect the technology systems for the school's 1,100 students, faculty, and administration while also laying a foundation for next generation education delivery platforms, such as iPads and other tablets.

"As a school system we are pressed from many angles: increased Internet usage, evolving threats, and constantly shrinking budgets. We also wear many hats, so we can't be experts in everything,”" said Thane Young, technology coordinator for High Point Regional High School, in a prepared statement.

After an extensive search, the school selected Bat Blue Networks' cloud-based Security-as-a-Service system, Cloud/Sec. Cloud/Sec is designed to replace dozens of disparate technologies. It offers application security, URL filtering, antivirus, antimalware, and protection from other Internet-based threats and can support multiple sites, remote users, and mobile devices. Because the solution is cloud-based, it does not require hardware or implementation costs, and it doesn't require a subscription.

Key features of Cloud/Sec include:

  • Single, global security policy for all of an organization's sites, applications, users, devices, and cloud instances;
  • Inbound and outbound security protection for all of an organization's assets and data as a single service;
  • Visibility, control, and threat management for all applications, ports, and protocols;
  • Ability to block malware, spyware, and other Internet-based threats;
  • Ability to alert, block, or allow access by specific URL site categories or file types;
  • Ability to decrypt encrypted content, scan it for malware, and then re-encrypt it for delivery, without exposing unencrypted content on-the-wire;
  • Round-the-clock support services; and
  • Granular blocking capabilities to identify specific search engine services, as well as anonymization and obfuscation to maintain privacy and security.

Further information about Cloud/Sec is available on the Bat Blue Networks site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Introduces Stand-Alone AI App

    Meta Platforms has launched a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • laptop screen with a video play icon, surrounded by parts of notebooks, pens, and a water bottle on a student desk

    Studyfetch AI Tool Generates Video Explanations Based on Course Materials

    AI-powered studying and learning platform Studyfetch has introduced Imagine Explainers, a new video creator that utilizes artificial intelligence to generate 10- to 60-minute explainer videos for any topic.

  • interconnected geometric human figures forming a network

    CoSN: School Staffing Is the Top Hurdle to K-12 Innovation

    Hiring and keeping educators and IT staff remains the top challenge for K-12 education in 2025, according to the latest Driving K-12 Innovation Report from the Consortium for School Networking (CoSN).

  • glowing digital brain made of blue circuitry hovers above multiple stylized clouds of interconnected network nodes against a dark, futuristic background

    Report: 85% of Organizations Are Leveraging AI

    Eighty-five percent of organizations today are utilizing some form of AI, according to the latest State of AI in the Cloud 2025 report from Wiz. While AI's role in innovation and disruption continues to expand, security vulnerabilities and governance challenges remain pressing concerns.