Download PDF
Empowering Disabled Adults with Safe Internet Access: A Case Study of The Freedom Centre
Technology Category
- Cybersecurity & Privacy - Network Security
- Networks & Connectivity - Network Management & Analysis Software
Applicable Industries
- National Security & Defense
- Telecommunications
Applicable Functions
- Product Research & Development
Use Cases
- Inventory Management
- Tamper Detection
Services
- Cybersecurity Services
- System Integration
The Challenge
The Freedom Centre, a charity and day center for physically disabled people in Sheerness, Kent, United Kingdom, wanted to offer Internet-related experiences to its members. The trustees believed that the Internet could be a valuable tool for people with disabilities, helping them extend their scope and increase interaction with the world. With a grant from the National Lottery, the center bought two high-capacity PCs, a printer, and software to work on the Internet, and added classes using the Internet, e-mail, and website design for both recreational and research purposes. However, with the expanded independence that the Internet offered, concerns arose about protecting a vulnerable group from offensive, dangerous, and inappropriate inbound and outbound contacts. The Center Trustees also worried about the potential negative repercussions with donors if member-clients were found to be accessing inappropriate web content.
About The Customer
The Freedom Centre is an independent charity and day center for physically disabled people located in Sheerness, Kent, United Kingdom. The center serves more than 50 member-clients with a wide range of physical disabilities, including stroke and car accident victims, and people born with disabilities such as cerebral palsy and multiple sclerosis. Some also have speech, sight, and hearing restrictions. The Centre offers classes at members’ requests, such as foreign languages, mathematics, English, and computer courses, all in a highly supportive, caring environment. The Centre strives to give people the maximum possible freedom within the constraints of their disabilities.
The Solution
To address these concerns, a computer expert volunteering at the Centre recommended that the Center Trustees contract with a network security firm to implement an affordable solution that would prevent members from accessing undesirable web sites, keep email viruses out, and provide a firewall against unwelcome intrusions. The Centre worked with Etanda, a local consultancy specializing in security, to implement this solution. Etanda specialists recommended a Check Point Safe@Office appliance connected to a broadband Pipex ADSL link at the center, under remote management through Check Point’s Security Management Portal (SMP) on Etanda’s central server. This combination provided both scalability and ease of management at a very affordable price. Through the Safe@Office and SMP combination, Etanda could offer a very effective service at a very affordable price.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.