Enhancing Security and Compliance in Education Communication: A Case Study on Remind
- Networks & Connectivity - 5G
- Platform as a Service (PaaS) - Application Development Platforms
- Equipment & Machinery
- National Security & Defense
- Real-Time Location System (RTLS)
- Tamper Detection
- System Integration
Remind, a communication platform designed to facilitate interaction between educators, students, and parents, supports over 20 million monthly users. With such a vast user base, the platform is entrusted with a significant amount of personal data. The challenge was to ensure the security of this data and maintain compliance with various privacy regulations. The platform needed to protect against potential threats such as brute force attacks and credential stuffing, while also ensuring low false positives. Furthermore, the platform required a solution that could seamlessly integrate with its multi-platform applications and provide automated protection.
Remind is a communication platform that is widely used in the education sector. It is designed to help educators reach students and parents effectively and efficiently. The platform supports real-time messaging to an entire class, a small group, or even a single person. It also allows for scheduling of announcements and attaching files. Remind is accessible on any phone and supports translation into more than 90 languages. The platform is used by more than 20 million users monthly across the United States, including over 50% of public schools. It aims to increase parental engagement, which has been linked to improved student performance.
Remind turned to Wallarm for its API Security solution. Wallarm provided 'out of the box' automated protection across Remind’s multi-platform applications. The solution was designed to secure applications and APIs with minimal interaction from the Remind IT team. Wallarm provided automated tailored security rules and operated in a fully blocking mode to prevent any potential threats. The solution was deployed in a hybrid manner, using AWS EKS for container orchestration. Infrastructure management was handled using tools like Terraform and Helm, while monitoring was done through Splunk. The solution ensured protection against brute force attacks and credential stuffing, while also maintaining SOC2 compliance.