Visibility. Then Control. Keep good employees from doing bad things on the Internet
Dec 14, 2015
Visibility. Then Control. Keep good employees from doing bad things on the Internet
Slide 2
Everything Web
Web Browser Has Become the Universal Interface
Answer is to control, not just block
But Brings Business
Risks!
But Brings Business
Risks!
Network Abuse
Back Door Viruses
Inappropriate Use
P2P file sharingAudio/Video StreamingSpyware
Web emailInstant MessagingP2P file sharing
Web surfingInstant MessengerP2P file sharing
Slide 3
Firewalls Keep the Bad Guys Out
PublicWeb
Servers
IntranetWeb
Servers
Public Internet
Firewalls block at the perimeter . . .
Firewall
But they are not designed to control at user level
UsersHackers
Internal Network
Slide 4
Restrict or control access to unproductive
web sites
Stop viruses from webmail (Yahoo,
Hotmail, etc) and IM
Keep intellectual property from getting
out over IM
“Splash page” for acceptable Internet
use policy
Stop web content such as .vbs, .exe
Stop viruses from webmail (Yahoo,
Hotmail, etc) and IM
Keep intellectual property from getting
out over IM
Log and archive IM traffic by individual
text messages
Prevent downloadingof copyrighted
MP3 files
Control pop-ups, ads, and spyware
PublicWeb
Servers
IntranetWeb
Servers
Internal Network
Proxy Keep the Good Guys Good
Users
Firewall
Users
Proxy
Public Internet
Restrict or control access to unproductive
web sites
“Splash page” for acceptable Internet
use policy
Stop web content such as .vbs, .exe
Log and archive IM traffic by individual
text messages
Prevent downloading of copyrighted
MP3 files
Control pop-ups, ads, and spyware
Total Visibility and Control of All Web Communications
Slide 5
Proxy Appliance
Wire-Speed Performance
Scalable
Secure
Easy to Manage
Latest Web Functionality
Wire-Speed Performance
Scalable
Secure
Easy to Manage
Latest Web Functionality
Proxy Appliance for Performance & Security
Software Proxy Server
• Low Performance
• Poor Scalability
• Security Holes
• Hard to Manage
• Lacking Functionality
Slide 6
Introducing Blue Coat ProxySG
Purpose-built proxy appliance providing granular control with
wire-speed performance
Advise. Coach. Enforce.
Slide 7
ProxySG Visibility. Control. Performance.
Enterprise Policy Management
TechnologyPartners
SGOS™ Object-based OS with Caching
Authentication, Authorization, LoggingProxy
Custom OS
Policy Processing EnginePolicy
On-ProxyURL Filtering
Web Anti-Virus
Anti- SpywareServices
IM, Streaming & P2P Control
Reverse Proxy
ProxyAV
ISS
Slide 8
Proxy Services
• Proxy Support – HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel,
IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
– Method-level control options
• Content Filtering, Content Security, Spyware Prevention
• IM Control, P2P Blocking, Phishing & Pop-up Blocking
• Web Virus Scanning with ProxyAV
• Streaming Control
• Compression (HTTP & TCP/SOCKS)
• Bandwidth Management
• SSL Termination & Acceleration
• Reverse Proxy Mode (Application Acceleration)
Slide 9
Reporter
Enterprise Policy Management
DistributePolicy
Monitor& Report
Set &EnforcePolicy
Visual Policy Manager
Director
CorporateWeb
Policy
CorporateWeb
Policy
Slide 10
Complete Range of Proxy Appliances
ProxySG 400 Series
ProxySG 800 Series
ProxySG 8000 Series
Performance
Remote Offices
Up to 250 users 100-2000 users 1000 - 50,000+ users
WAN Throughput
ConnectedUsers
Up to 15Mbps 15Mbps-80Mbps 80Mbps -300+ Mbps
Corporate Headquarters
ProxySG 200 Series
Slide 11
Leader in a Growing Market Segment
Blue Coat #1 Leader with 30% Market ShareSource: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis
Worldwide Secure Content Management Appliance Revenue, 2001-2007 ($M)
($M
)
2001 2002 2003 2004 2005 2006 2007
200
0
400
600
8001,000
1,200
1,400
1,600
1,800Blue Coat as the fastest growing vendor in the Secure Content and Application Delivery market among Cisco, Network Appliance and Microsoft. Blue Coat achieved 77% year-over-year growth and 30% share of the market.
Slide 12
Energy, Oil & Gas
Health & Pharmaceuticals
Government
World’s Major Institutions Trust Blue Coat
Financial
Mfg/Industrial Consumer & Retail
Slide 13
META Group: Proxy Appliances Needed
“Establishing a security solution to address the appropriateness of content and its usage has quickly become a legitimate business issue, due in part to productivity, liability, and privacy concerns.
A separate solution focused on user and content control, ideally based on an appliance platform and a proxy architecture, will be warranted for most organizations.”
Mark BouchardSenior Program DirectorMETA Group
The META Group white paper “The Growing Security Threat: Your Employees” can be
obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.
Slide 14
Introducing Bob Kent
• Bob Kent works for Edge Corporation.
• Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet.
• Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances …
Visit www.bobkent.net CARTOON from the left coastFUN look at web browsing(for mature audiences only)
“Free network, free music,Oh yah!”-Bob Kent
Visit www.bobkent.info Flash Movies & DemosSpyware Prevention, WebAV,Reverse Proxy, Original Bob Kent
Slide 15
In Control with Blue Coat
• Keep “good” employees from doing “bad” things on the Internet– Everything web leads to increased risks
• Blue Coat is #1 proxy appliance leader (IDC)– Custom, object based OS with caching enables wire-speed
performance
– Advise, coach and enforce with flexible policy controls down to the user level
– Shipped more than 20,000 proxy appliances worldwide
• Do you know what your employees are doing on the Internet?– Find out with a “Web Traffic Assessment”
– Plus learn about Spyware prevention