Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.

Slides:



Advertisements
Similar presentations
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Advertisements

Leap into Innovation 7 Cloud Facts You Can't Afford to Ignore James Lambe Canadian Director, Google Enterprise.
Michael Mauch Worldwide Solution Architect - Security
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Do you know what your employees are doing when they are supposed to be working?
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
CHUCK YOUNG MANAGING DIRECTOR OFFICE OF PUBLIC AFFAIRS GOVERNMENT ACCOUNTABILITY OFFICE to AGA BOSTON CHAPTER PROFESSIONAL DEVELOPMENT CONFERENCE MARCH.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Director of Research, SANS Institute
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Vantage Report 3.0 Product Sales Guide
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
The Changing World of Endpoint Protection
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Network security Product Group 2 McAfee Network Security Platform.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. PROXYSG POLICY BEST PRACTICES  Thank you for joining today’s Blue Coat Customer Support.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential – Internal Use Only COMPLETE LIFECYCLE APPROACH TO ADVANCED THREAT.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Kaspersky Small Office Security INTRODUCING New for 2014!
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
September 28, 2016 Taking Control of Network Security In a Web-Centric World ISSA Bryan Wood October 12 th 2011.
Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The time to address enterprise mobility is now
Exchange Online Advanced Threat Protection
Barracuda Web Security Flex
Do you know who your employees are sharing their credentials with
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Understanding best practices in classifying sensitive data
Exchange Online Advanced Threat Protection
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Introducing ProxyClient
Home Internet Vulnerabilities
New Web Security Bundles For 1500 Users and Below
The MobileIron® Threat Detection difference:
Microsoft Data Insights Summit
Introduction to Symantec Security Service
Presentation transcript:

Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012

2 © Blue Coat Systems, Inc Blue Coat Confidential Employee Owned Corporate Owned IT Sanctioned User Mandated Secure Perimeter Extended Perimeter Always On From the Office Enterprise Direction & Challenges Devices Applications Network Access

3 © Blue Coat Systems, Inc Blue Coat Confidential Extended Enterprise Mobile Branch Office Office Remote Corporate vs Personal UsageHQ

4 © Blue Coat Systems, Inc Blue Coat Confidential Security Paradigm Shift

5 © Blue Coat Systems, Inc Blue Coat Confidential Why Web Application Controls? 93%93% Growth of web-based attacks in %40% Users infected by malware from social networking sites 1 in 14 Downloads containing malware 700B700B Minutes users worldwide spend on Facebook per month Companies have had data loss due to social networking 41%

6 © Blue Coat Systems, Inc Blue Coat Confidential Customer Benefits Granular Visibility & Control Manage Webmail Usage Mitigate Social Networking Risks Social Networking Data Loss Prevention Corporate & Regulatory Compliance Allow Social Networking Without Associated Risks Create the “Read- only” Facebook Block Uploading & Downloading of Attachments Mitigate Data Loss Risk

7 © Blue Coat Systems, Inc Blue Coat Confidential Granular Web Application Controls Multimedia Publishing Sharing Social Networks Regulate Operations Restrict Abuse Prevent Data Loss Webmail Send Download Attachment Upload Attachment Safe Search Major Search Engines Media Search Engines Keyword Searches

8 © Blue Coat Systems, Inc Blue Coat Confidential Read Only Policy No comments, posting, upload/download, games, , chat, etc Global Policy Group Policy Limited Use Policy Can comment, post, upload, and chat, no games, downloads, etc Group Policy Expanded Use Policy Can comment, post, upload, download, , chat, but no games, etc. Full Use Policy No Restrictions Individual Policy Web Application Control Example Everyone Marketing HR/Recruiting CEO, CIO Different Policies for Facebook throughout an Organization

9 © Blue Coat Systems, Inc Blue Coat Confidential Why Mobile Application Controls? 1B1B Smart devices shipped in 2011 (IDC) 6565 The average number of applications installed on a smartphone 13.7%13.7% Percent of Mobile requests to Social Networking 1B1B Mobile Social Networking Users by 2014 Users who have two more devices today 74%

10 © Blue Coat Systems, Inc Blue Coat Confidential Mobile Applications Behave Differently VS. Different URLs Different calls’ Many apps bypass using a browser Different behavior

11 © Blue Coat Systems, Inc Blue Coat Confidential Top Five Mobile Apps  Facebook  YouTube  Android Market  Google Search  Gmail Nielsen data: 5/2012 Blue Coat supports 4 out of 5 of these Apps with our new mobile app controls

12 © Blue Coat Systems, Inc Blue Coat Confidential Web and Mobile Application Controls  Over 200 apps/operations supported Safe Search  Major Engines supported  Media Search engines as well  Keyword Searches Social Networks  Regulate Operations  Restrict abuse Multi-media  Publishing  Sharing Web Mail And More! Upload Video Upload Photo Post Message Send Download Attachment Upload Attachment

13 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Policy Engine  GUI controls available now!  SGOS VPM controls  Cloud Service

14 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Policy Engine  GUI controls available now!  SGOS VPM controls  Cloud Service

15 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Edit Operation Object All operations listed Select all or individual ops  Find Operations by Application Name  Select Operations Shown  Name to Easily Identify in Policy

16 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Edit Operation Object All operations listed Select all or individual ops  Find Operations by Application Name  Select Operations Shown  Name to Easily Identify in Policy

17 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Edit Operation Object All operations listed Select all or individual ops  Find Operations by Application Name  Select Operations Shown  Name to Easily Identify in Policy

18 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Total Control  Control Application & Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl

19 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Total Control  Control Application & Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl

20 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Total Control  Control Application & Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl

21 © Blue Coat Systems, Inc Blue Coat Confidential Web Application Controls  Total Control  Control Application and Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl

22 © Blue Coat Systems, Inc Blue Coat Confidential Resources  Web and Mobile Application List:  Solution Briefs  Web Application Controls  Mobile Application Controls  Knowledge Base Article (Primer/How-to):

23 © Blue Coat Systems, Inc Blue Coat Confidential Blue Coat Value: Global Threat Defense Blue Coat Value Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Layered Defense for Comprehensive Protection Proactively Protect All Users in Any Location Universal Policy Universal Policy Global Threat Defense Unified Reporting

24 © Blue Coat Systems, Inc Blue Coat Confidential Security as a Service On-Premise Appliances Blue Coat Unified Security Solution Hybrid

25 © Blue Coat Systems, Inc Blue Coat Confidential WebPulse Collaborative Defense Globally Diverse Awareness 75 Million Users Blue Coat Blocks 3.3 Million Malware, Phishing & Call-home Threats per Day Proactive Security 500 Malnets Web Ecosystem Intelligence 1 Billion Requests

26 © Blue Coat Systems, Inc Blue Coat Confidential Mapping Malnets

27 © Blue Coat Systems, Inc Blue Coat Confidential Active Threat Phase Infrastructure Phase Negative Day Defense Negative Day Defense Continues to Block Malnet Infrastructure Negative Day Defense Identifies and Blocks New Components AV Engines Begin Detection UTM Policy applied -30 Days Dynamic Payload Changes Domain Attack Begins Exploit Server 0 Day+1 Days+30 Days Attack Ends New Subnet, IP Address and Host Name

28 © Blue Coat Systems, Inc Blue Coat Confidential Negative Day Defense in Action 2011 Jun -120 Days Jun-SepOct 5 -1 Days Oct 6 0 Day Oct Days Oct Days New subnet comes online Subnet cycles through series of domains then goes through series of domains then goes dormant dormant New server joins subnet Urchin attack begins Attack domain changes Attack ends WebPulse identifies subnet as part of subnet as part of known malnet and known malnet and applies suspicious applies suspicious rating rating WebPulse matches server DNA and applies Suspicious rating WebPulse automatically blocks all requests

29 © Blue Coat Systems, Inc Blue Coat Confidential Sep. 9: WebPulse identified new malware sub- network ~Sep. 21: Root Access on MySQL.com for Sale: $3,000 Sep. 22 : Identified New Server on this malnet Sep. 26: Attack launched: JS file Builds iFrame & Links to Exploit Kit Oct. 2: In Use for 7 Days across 86 Domains Malnet Tracking: MySQL.com Attack Sep. 27: 30 Rotating IPs Used in Attack

Blue Coat Confidential Please provide feedback on this webcast to: Webcast replay and slide deck found here: er-support-technical-webcasts er-support-technical-webcasts (requires BTO login)