Blue Coat Cloud Continuum

Slides:



Advertisements
Similar presentations
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
The Most Analytical and Comprehensive Defense Network in a Box.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
ContentKeeper Electronic Mail Template Concepts Presented by Date.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Director of Research, SANS Institute
Dell Connected Security Solutions Simplify & unify.
McAfee Web Protection Protect Your Enterprise Against Web Threats.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Complete Cloud Security
CensorNet Partner Program
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Data-Centric Security and User Access Controls for Hadoop on Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: BLUETALON BlueTalon provides data-centric.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential – Internal Use Only COMPLETE LIFECYCLE APPROACH TO ADVANCED THREAT.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Data-centric security of Blutalon
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Barracuda NG Firewall ™
Cloud App Security vs. O365 Advanced Security Management
Barracuda Web Security Flex
Barracuda Web Filtering Service
Do you know who your employees are sharing their credentials with
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Virtualization & Security real solutions
Prevent Costly Data Leaks from Microsoft Office 365
2018 Real Cisco Dumps IT-Dumps
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Identity & Access Management
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Case Study 1: Security Considerations
Improve Patient Experience with Saama and Microsoft Azure
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Security Delivery Platform for the Micro-segmented Data Center
Introduction to Symantec Security Service
Presentation transcript:

Blue Coat Cloud Continuum John Rose, Regional Account Manager

Seismic Shifts Causing Organizations to Rethink Security EVOLVING NETWORK USAGE PATTERNS NEXT-GENERATION ENDPOINT REVOLUTION SHIFT TO CLOUD APPLICATION USAGE MODELS

Blue Coat Cloud Generation Security Ensuring Safe Passage to the Cloud SWG CAS Cloud API Security Regional Office Roaming Users Next Generation Endpoints

Blue Coat Cloud Generation Security Ensuring Safe Passage to the Cloud Security Platform for the Cloud Generation Hybrid Ensures Smooth Transition (Physical, Virtual, Cloud) Protects All Devices Regardless of Form Factor Delivers Architecture for Open Integration Enables Advanced Threat Protection Provides Integrated Cloud Security Application Visibility Application Control Cloud Data Protection Protects Cloud Workloads Ensures Protection Even With Encrypted Traffic Incident Visibility Across Cloud and On-Premise Interactions Performance Optimization for Sanctioned Applications SSL Encryption SWG CAS Regional Office Roaming Users Next Generation Endpoints

Secure Transition to Cloud as it Arises Evolving to Deliver Cloud Generation Security Key Requirements to Protect the Organization Secure Transition to Cloud as it Arises Use the Cloud to Secure Interactions Provide Visibility Into Application Usage Ensure Control Over Cloud Application Usage Protect Data As It Interacts With The Cloud Dynamically Protect Workloads In The Cloud Protect Next-Generation Endpoints Deliver Device Agnostic Protection Ensure Architectural Advancement Provide Open Environment Advanced Inspection On-Prem / Cloud DLP & Capture Capabilities On-Prem / Cloud SSL Encryption Headquarters / Data Center Regional Office Roaming Users Next Generation Endpoints

The Cloud Continuum Customer Entry into Cloud Security Anti-Malware Engine Black/White Listing File Reputation File Prevalence and Frequency Anti-Malware (Anti-Virus) Full Packet Capture Threat Forensics Incident Workflow Network Recording Reconstruction Forensics & Recording Data Sovereignty Cipher and Tokenization Inline Enforcement Based on Policy Encryption & Tokenization API Cloud Integration Data Origination and Destination Awareness Federated User- Based Policy Enforcement Data Discovery and Machine Learning Classification Real-Time Bi-Directional DLP Big Data Visualization Compliance Standards, Reporting & Enforcement Reporting & Audit PROTECTION & SECURITY COMPLIANCE & GOVERNANCE IP & URL Filtering Internet Classification Malnet & Reputation Machine Learning Multi-Language Real-Time Risk Scoring Adv. Malware (Sandbox) Customizable Detonation Environments Real-Time Detonation and File Analysis Evasion & Obfuscation Detection Analytics & Intelligence Cloud SOC Anomaly Detection User Risk Analysis Cloud Application Risk Scoring Integrated Cloud Data Analysis API Cloud Integration Machine Learning Data Algorithms Real-Time Data Aggregation Data Visualization and Compliance Reporting Access & Authorization Inline Policy Enforcement Federated Identity Integration Granular Access Policy for Thousands of Cloud Applications Visibility & Discovery Application Identification Library Risks Scoring per Application Compliance Reporting for Sanctioned & Unsanctioned Apps Federated Identity of User Behavior

The Cloud Continuum PROTECTION & COMPLIANCE & SECURITY GOVERNANCE Anti-Malware (Anti-Virus) Forensics & Recording Encryption & Tokenization Real-Time Bi-Directional DLP Reporting & Audit PROTECTION & SECURITY COMPLIANCE & GOVERNANCE IP & URL Filtering Adv. Malware (Sandbox) Analytics & Intelligence Integrated Cloud Data Analysis Access & Authorization Visibility & Discovery

A World of Chaos Existing Cloud Security Model Limits Adoption Complications of Cloud Protection Who Owns the Comprehensive Service Level Agreements? Single Pane of Glass? Redundancy & High- Availability? Vendor Compatibility? Cloud DLP Provider Cloud Data Encryption Provider 7 11 10 Complexity Manifested 2 8 3 9 Cloud Web Gateway Provider User to Web Gateway Web Gateway to DLP DLP to Web Gateway Web Gateway to Application Application to Access Control Access Control to Application Application to Data Encryption Data Encryption to Application Application to Web Gateway Web Gateway to DLP Web Gateway to User 12 4 6 1 Cloud Access Control Provider 5