160 likes | 441 Views
Visibility. Then Control. Keep good employees from doing bad things on the Internet. But Brings Business Risks!. Inappropriate Use. Network Abuse. Back Door Viruses. Everything Web. Web Browser Has Become the Universal Interface. Web email Instant Messaging P2P file sharing.
E N D
Visibility. Then Control. Keep good employees from doing bad things on the Internet
But Brings Business Risks! • Inappropriate Use • Network Abuse • Back Door Viruses Everything Web • Web Browser Has Become the Universal Interface Web email Instant Messaging P2P file sharing Web surfing Instant Messenger P2P file sharing P2P file sharing Audio/Video Streaming Spyware • Answer is to control, not just block
Hackers But they are not designed to control at user level Firewalls Keep the Bad Guys Out IntranetWebServers PublicWebServers Firewall Internal Network Public Internet Users Firewalls block at the perimeter . . .
Users Control pop-ups, ads, and spyware Restrict or control access to unproductive web sites Prevent downloading of copyrighted MP3 files “Splash page” for acceptable Internet use policy Log and archive IM traffic by individual text messages Prevent downloadingof copyrightedMP3 files Stop viruses from webmail (Yahoo, Hotmail, etc) and IM “Splash page” for acceptable Internetuse policy Keep intellectual property from getting out over IM Restrict or control access to unproductive web sites Control pop-ups, ads, and spyware Stop web content such as .vbs, .exe Log and archive IM traffic by individual text messages Keep intellectual property from getting out over IM Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Stop web content such as .vbs, .exe Proxy Keep the Good Guys Good • Total Visibility and Control of All Web Communications IntranetWebServers PublicWebServers Proxy Firewall Internal Network Public Internet Users
Software Proxy Server Proxy Appliance • Low Performance • Poor Scalability • Security Holes • Hard to Manage • Lacking Functionality • Wire-Speed Performance • Scalable • Secure • Easy to Manage • Latest Web Functionality Proxy Appliance for Performance & Security
Introducing Blue Coat ProxySG Advise. Coach. Enforce. Purpose-built proxy appliance providing granular control with wire-speed performance
Enterprise Policy Management ISS Policy Policy Processing Engine Proxy Authentication, Authorization, Logging Custom OS SGOS™ Object-based OS with Caching ProxySGVisibility. Control. Performance. TechnologyPartners ProxyAV Services Anti- Spyware IM, Streaming & P2P Control Web Anti-Virus On-Proxy URL Filtering Reverse Proxy
Proxy Services • Proxy Support • HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime • Method-level control options • Content Filtering, Content Security, Spyware Prevention • IM Control, P2P Blocking, Phishing & Pop-up Blocking • Web Virus Scanning with ProxyAV • Streaming Control • Compression (HTTP & TCP/SOCKS) • Bandwidth Management • SSL Termination & Acceleration • Reverse Proxy Mode (Application Acceleration)
Visual Policy Manager CorporateWebPolicy Reporter Director Enterprise Policy Management Set &EnforcePolicy Distribute Policy Monitor & Report
Complete Range of Proxy Appliances ProxySG 8000 Series Corporate Headquarters ProxySG 800 Series ProxySG 400 Series Remote Offices ProxySG 200 Series ConnectedUsers Up to 250 users 100-2000 users 1000 - 50,000+ users WAN Throughput Up to 15Mbps 15Mbps-80Mbps 80Mbps -300+ Mbps Performance
Blue Coat as the fastest growing vendor in the Secure Content and Application Delivery market among Cisco, Network Appliance and Microsoft. Blue Coat achieved 77% year-over-year growth and 30% share of the market. 1,800 1,600 1,400 1,200 1,000 800 600 400 200 0 2001 2002 2003 2004 2005 2006 2007 Leader in a Growing Market Segment Worldwide Secure Content Management Appliance Revenue, 2001-2007 ($M) ($M) Blue Coat #1 Leader with 30% Market Share Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis
Health & Pharmaceuticals World’s Major Institutions Trust Blue Coat Financial Mfg/Industrial Consumer & Retail Energy, Oil & Gas Government
META Group: Proxy Appliances Needed “Establishing a security solution to address the appropriateness of content and its usage has quickly become a legitimate business issue, due in part to productivity, liability, and privacy concerns. A separate solution focused on user and content control, ideally based on an appliance platform and a proxy architecture, will be warranted for most organizations.” Mark Bouchard Senior Program Director META Group The META Group white paper “The Growing Security Threat: Your Employees” can be obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.
Introducing Bob Kent • Bob Kent works for Edge Corporation. • Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. • Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances … “Free network, free music, Oh yah!” -Bob Kent Visit www.bobkent.net CARTOON from the left coast FUN look at web browsing (for mature audiences only) Visit www.bobkent.info Flash Movies & Demos Spyware Prevention, WebAV, Reverse Proxy, Original Bob Kent
In Control with Blue Coat • Keep “good” employees from doing “bad” things on the Internet • Everything web leads to increased risks • Blue Coat is #1 proxy appliance leader (IDC) • Custom, object based OS with caching enables wire-speed performance • Advise, coach and enforce with flexible policy controls down to the user level • Shipped more than 20,000 proxy appliances worldwide • Do you know what your employees are doing on the Internet? • Find out with a “Web Traffic Assessment” • Plus learn about Spyware prevention