Firewall Problems and Solutions

Tony Karrer

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Firewall Problems and Solutions

Clark Quinn

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

Surprise! Knowledge Guru Summer Release Adds SCORM, Security Features

Knowledge Guru

That means players can access it on a company intranet or behind a firewall, if you’d like. Your Games Just Got More Secure. You can now choose between a Low, Medium and High security setting: Low Security: Players may register on the website without restriction.

Software as a Service SaaS Implications for the IT Security Workforce

Training Industry

In this case, it is likely that sensitive data will be stored and controlled by the SaaS provider and used by an organization’s customers or partners so that the data never comes in contact with the organization’s network, firewalls, or any other security device or process controlled by the organization. So how does an organization extend its security policies and controls to public clouds and SaaS applications?

Your Team for the Win?


We all like to believe that our firewalls are secure, our devices are encrypted, our staff is smart on social media, and are aware of the dangers of phishing emails , but even in a perfect world, something will slip through the cracks. Compliance Healthcare Security

Teams 64

Phish on!


Healthcare has worked to create processes for disallowing access by third party contractors, encrypted their devices and strengthened their firewalls, but the hackers are finding the weak link – email. Healthcare Security

When Does a Cloud-based LMS Make Sense?

Living in Learning

There was something about having my own staff running my own servers behind my own firewall that provided a sense of security and control. To an extent it did, and the IT staff would be the first to man the ramparts to fight off having anything living outside the firewall – much less allowing anyone outside to get into our systems. I feel their concern, and I respect the need to protect the network and data resources behind the firewall.

L&D: Learning and Dystopia

Association eLearning

I tried to talk IT into letting you project in but the firewall is the firewall, no exceptions for non-personnel.”. “It’s But if the vaguely-worded debriefing they’d secure-sent me was any indication I wasn’t sure if I wanted see.

Mitigating the Risks of BYOD in corporate learning


However, this trend comes with its own set of challenges and Security is the top concern that most organizations have with the policy of BYOD. Passwords, Firewalls and Encryption: The platform of corporate learning is the enterprise Learning Management System for most organizations.

Virtual Classroom Adoption – The Four Stages of Change

InSync Training

Organizations spend more time worrying about firewalls, security, hardware, and software (important topics all) than they think about adoption and usability. Adopting, and excelling at, the virtual classroom is much more about attitudinal change than it is about implementing technology. Ultimately, people need to BELIEVE that the virtual classroom will work.

70:20:10 and user generated learning: no way!

Challenge to Learn

You can’t use user generated learning for compliance training or security training. With compliance training and security training you have to be able to prove that your employees know the rules. That is not secure! On top of that we added our own security.

Learning and the Changing Workplace – Part 2

Tom Spiglanin

They’re looking to decommission their behind-the-firewall server farms, applications, services, and platforms by migrating to more cost-effective cloud-based infrastructures that are also “elastic,” able to be expanded and contracted as needed.

Change 130

7 Challenges to Social Learning

Origin Learning

Security issues. Issues like firewalls and security may be major concerns when you launch an enterprise-wide social learning project. Social Learning is a self-propagating concept, that is- once a social learning culture is achieved in an organization.

3 Steps to Maximize Volunteer Engagement


Can you ensure that your data is secure and that everyone in your organizations understands compliance? Using a secure firewall? A nonprofit would be just an idea without the volunteers that power the steam in your organization.

The Corporate Blogging Book

Clive on Learning

Well, I don't know about that, but I'm sure it will answer an awful lot of questions for anyone considering setting up a public corporate blog or getting blogging going within the firewall. It deals really well with the common objections (security, legal risks, time, technology, payback, etc.) Where would I be without my train journeys to London? Another trip, another book.

Lectora Online V2.0 is Coming


1) Escape the Firewall – You need to be able to work across states, countries and even continents. Working in the cloud lets you access project information securely outside your company’s firewall.

Implementing a Virtual World

Kapp Notes

Private, secure, hosted environments This allowed for a quick implementation and overcame several potential IT department obstacles or road blocks. One concern with virtual worlds or any Internet application is security. Working through corporate firewalls.

Online Training: Best Practices for Attending a Live, Online Course

I Came, I Saw, I Learned

Is there anything worse than logging into your online training two minutes before it starts only to find out that your corporate firewall won't let you in at all? It can become a security risk if you leave your email or personal information visible. by AJ Walther. Online classes are here to stay. They're easy, they're environmentally friendly, they're economical, and they're extremely effective.

Online 283

Employees Avoiding Corporate Barriers

Nick Leffler

If an organization must secure themselves by putting up barriers, before erecting those barriers, other equally effective ways for employees to get their work done should be in place. Even a barrier as small as needing to sign into a firewall is big enough to make an employee avoid security measures. Long before any barriers or security measure can be put into effect, money needs to be invested at providing another solution that’s just as good or better.

My first visit to China:The keyword is control

Challenge to Learn

I knew that I would not have access to Facebook, Twitter and Google because they are blocked by the Great Chinese Firewall, but it goes much further than that. This week I was in Beijing for the launch of the Chinese edition of Easygenerator.

5 Top IT-enabled business trends that are affecting Corporate Learning


There are some skeptics who question the security of data residing in the Cloud LMS, but modern systems have multi-layered firewalls and advanced network design which ensure that only authorized entries into the Cloud LMS are allowed.

Trends 187

Adobe RoboHelp 8: The Pros Have It, The Others Don't

I Came, I Saw, I Learned

And you would generate FlashHelp if you were worried about DHTML limitations for browsers and platforms and high-security firewall issues.

Adobe 260

LMS Innovation: Where’s the Value?

Talented Learning

Each customer has its own secure location, completely separate from others, in terms of database, awareness and security, but they all share the same central code.

Using Games and Gamification for Employee Screening

Kapp Notes

One example is to gamifiy the process of selection of people to work in the cyber security industry. The applicants compete for a limited number of spots and need to demonstrate knowledge of network software, creative approaches to firewall breaches and time to breach.

Latest #LMS Takeaways Plus Did you know?

eLearning 24-7

That security has become a hot inquiry in the corporate side of the house, and HE for that matter. Security on the business side is now a top “we need to know” item for an LMS. Let’s break down the reality in terms of security and save your IT/IS person and you time to post all those questions: Most LMS vendors host their LMS on hosting sites Amazon S3, Rackspace, Akamai, AWS – all of which are extremely secure, especially Amazon S3.

Still More Alternatives to Second Life: More 3D Worlds to Explore

Kapp Notes

The system is secure, data is encrypted and the spaces are private. deploys worlds in the cloud as software as a service and firewalled worlds using our "harmony" deployment system based on Windows Hyper-V with a focus on customer support and custom development.

When Does Your Training Need To Go On A Private Cloud?


Plus, you get to decide the exact security options , firewall configuration, etc., Few things illustrate the fast pace of change in the IT industry better than the enterprise data center.

Captivate 4 update page

Adobe Captivate

Some customers faced problems installing the update from the Adobe Updater due to security reasons, firewalls set in their organizations. Adobe Captivate 4 patch update is already live and many must have already installed it. Now Adobe Captivate 4 patch update is also available on web and can be downloaded from the following link -. link]. You just need to download the patch ZIP file, unzip it and run the 'setup.exe'.

Learning Organizations, eLearning 2.0 and Edupunk

Tony Karrer

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. It makes sense in many of these cases to keep it inside the firewall. Hopefully, we'll begin to see ways to allow a better handling of inside and outside the firewall solutions.

Twitter Founder Launches New App - Its a Jelly, eh?

Corporate eLearning Strategies and Development

In order for this to work in the enterprise it would need to be hosted behind a firewall for security to approve it. I have a hard time NOT thinking of this movie whenever I see doughnuts. And I have been known to bribe my kids with them.

eLearning Predictions Further Thoughts

Tony Karrer

Some comments: home is better -- @ work there are blocks on our network as to what we can and can't access Firewalls an issue at work Work has faster connections not supposed to access internet at work less network security at most homes, or firewall issues Firewalls at work prevent connections Certainly the issues with access certain sites, e.g., our LearnTrends site that’s hosted by Ning, is an issue.

4 Key Emerging Trends in LMS

Upside Learning

Gone are the days when having your own staff running your own servers behind your own firewall provided a sense of security and control. More than 2 years back, I had carried out a SWOT analysis of the LMS to get some understanding on the LMS scenario.

Why None of us are Above Cyber Attacks: How Hackers Broke into John Podesta and Colin Powell’s Gmail Accounts

Unicorn Training

It’s fair to say that when it comes to high profile cyber security failures, the past twelve months have seen more than their fair share. But why do security breaches keep befalling global giants who pump millions into their cyber security initiatives?Organisations

Business Social Media Benefits

Clark Quinn

First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution. For the Australasian Talent Conference that will run in Sydney May 24-26 (where I’m speaking), they’ve been drumming up interest with a press release. As a consequence, I’ve been doing some interviews, some live, some via email.

Cloud: the good, the bad and the better


Second, you have to hope that they got security right, because if a hole is discovered in their software (something that has happened to Cloud services, from Gmail to Yahoo) other users in the same server might be able to get to your data. Same goes for security.

How to Use Microblogging in Workplace Learning

Upside Learning

As a personal learning tool, Twitter is great but it’s a public platform and what you share on it is available to everyone, some organizations may need tools which can be installed behind their firewalls (Laconica, Yonkly) or that is available as a secure private service (Yammer).