Jisc launches protective cyber security service

The managed firewall service automatically detects and mitigates a range of threats.

Jisc has launched a managed firewall service specifically designed to help protect the cyber space of UK colleges, universities, research centres and the public sector.

Developed by Jisc in collaboration with its members, the service is operated by cyber security specialist, KHIPU Networks using Palo Alto Networks’ platform.

Configured and continually revised using threat intelligence from various sources available to Jisc in its unique position as the digital and data body for tertiary education, the managed firewall service will protect organisations connected to the Jisc-run national research and education network, Janet.

Jisc’s head of security, David Batho, said:

“A key component of any cyber security strategy, a well-configured firewall helps to detect and mitigate potential threats.

“Our service has been created and developed to meet the specific needs of the tertiary education and research sectors and takes advantage of Jisc’s access to wide-ranging threat information.

“In line with feedback from members, we have taken a flexible approach and members and customers now have options, depending on the level of support they require: a fully managed firewall, or a co-managed service, including virtual options to support cloud infrastructure.

“Whichever option is chosen, the managed firewall service is proactively maintained, patched and configured, saving IT and security staff time and giving peace of mind.”

KHIPU Networks is already familiar to Jisc members as it also runs Jisc’s simulated phishing and training service. Its chief information officer, Guy Jermany, said:

“The different service options will empower institutions to take as little or as much control as they like over their firewall environments, in partnership with KHIPU’s experienced cyber security experts.

“Combining Jisc’s threat intelligence feeds with automation, ensures that members’ firewall security configurations are proactively updated with the latest protection, leading to a continual review and improvement to their cyber security posture.”