Visibility. Then Control. Keep good employees from doing bad things on the Internet.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Web Content Filter: technology for social safe browsing Ilya Tikhomirov Institute for Systems Analysis of the Russian Academy of Sciences
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
The Business and Technology of Caching-based Services for State Education Networks Mike Lane Cacheflow, Inc. Phone (773)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Secure your users Accelerate your data.
1 Enabling Secure Internet Access with ISA Server.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Secure the Web with Blue Coat Stop the Bad. Allow the Good.
Barracuda Load Balancer Server Availability and Scalability.
Intranet, Extranet, Firewall. Intranet and Extranet.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Blue Coat Appliances – New HW, new SW, new everything Presented By Harri Kurronen.
Proxy Servers & Firewalls. What is proxy ? What is proxy ? Main purpose of using proxies Main purpose of using proxies How a proxy works ? How a proxy.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
The Intranet.
Introducing ProxyClient Stop the Bad. Accelerate the Good. Everywhere. Antti Lahokoski – Sales -
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Barracuda NG Firewall ™
Introduction to Barracuda IM Firewall
Visibility. Then Control
The Intranet.
Instructor Materials Chapter 5 Providing Network Services
Barracuda Web Security Flex
Threat Management Gateway
Cisco ASA Express Security practice-questions.html.
GetWired Internet Manager
8. The Internet: Electronic Commerce & Electronic Business.
Introducing ProxyClient
Check Point Connectra NGX R60
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Firewalls Chapter 8.
Presentation transcript:

Visibility. Then Control. Keep good employees from doing bad things on the Internet

Slide 2 Everything Web Web Browser Has Become the Universal Interface Answer is to control, not just block But Brings Business Risks! Network Abuse Back Door Viruses Inappropriate Use P2P file sharing Audio/Video Streaming Spyware Web Instant Messaging P2P file sharing Web surfing Instant Messenger P2P file sharing

Slide 3 Firewalls  Keep the Bad Guys Out Public Web Servers Intranet Web Servers Public Internet Firewalls block at the perimeter... Firewall But they are not designed to control at user level Users Hackers Internal Network

Slide 4 Restrict or control access to unproductive web sites Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Keep intellectual property from getting out over IM “Splash page” for acceptable Internet use policy Stop web content such as.vbs,.exe Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Keep intellectual property from getting out over IM Log and archive IM traffic by individual text messages Prevent downloading of copyrighted MP3 files Control pop-ups, ads, and spyware Public Web Servers Intranet Web Servers Internal Network Proxy  Keep the Good Guys Good Users Firewall Users Proxy Public Internet Restrict or control access to unproductive web sites “Splash page” for acceptable Internet use policy Stop web content such as.vbs,.exe Log and archive IM traffic by individual text messages Prevent downloading of copyrighted MP3 files Control pop-ups, ads, and spyware Total Visibility and Control of All Web Communications

Slide 5 Proxy Appliance Wire-Speed Performance Scalable Secure Easy to Manage Latest Web Functionality Wire-Speed Performance Scalable Secure Easy to Manage Latest Web Functionality Proxy Appliance for Performance & Security Software Proxy Server Low Performance Poor Scalability Security Holes Hard to Manage Lacking Functionality

Slide 6 Introducing Blue Coat ProxySG Purpose-built proxy appliance providing granular control with wire-speed performance Advise.Coach.Enforce.

Slide 7 ProxySG Visibility. Control. Performance. Enterprise Policy Management Technology Partners SGOS™  Object-based OS with Caching Authentication, Authorization, Logging Proxy Custom OS Policy Processing Engine Policy On-Proxy URL Filtering Web Anti-Virus Anti- Spyware Services IM, Streaming & P2P Control Reverse Proxy ProxyAV ISS

Slide 8 Proxy Services Proxy Support –HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime –Method-level control options Content Filtering, Content Security, Spyware Prevention IM Control, P2P Blocking, Phishing & Pop-up Blocking Web Virus Scanning with ProxyAV Streaming Control Compression (HTTP & TCP/SOCKS) Bandwidth Management SSL Termination & Acceleration Reverse Proxy Mode (Application Acceleration)

Slide 9 Reporter Enterprise Policy Management Distribute Policy Monitor & Report Set & Enforce Policy Visual Policy Manager Director Corporate Web Policy

Slide 10 Complete Range of Proxy Appliances ProxySG 400 Series ProxySG 800 Series ProxySG 8000 Series Performance Remote Offices Up to 250 users users ,000+ users WAN Throughput Connected Users Up to 15Mbps15Mbps-80Mbps80Mbps Mbps Corporate Headquarters ProxySG 200 Series

Slide 11 Leader in a Growing Market Segment Blue Coat #1 Leader with 30% Market Share Source: IDC - Worldwide Secure Content and Application Delivery Forecast and Analysis Worldwide Secure Content Management Appliance Revenue, ($M) ($M) ,000 1,200 1,400 1,600 1,800 Blue Coat as the fastest growing vendor in the Secure Content and Application Delivery market among Cisco, Network Appliance and Microsoft. Blue Coat achieved 77% year- over-year growth and 30% share of the market.

Slide 12 Energy, Oil & Gas Health & Pharmaceuticals Government World’s Major Institutions Trust Blue Coat Financial Mfg/IndustrialConsumer & Retail

Slide 13 META Group: Proxy Appliances Needed “Establishing a security solution to address the appropriateness of content and its usage has quickly become a legitimate business issue, due in part to productivity, liability, and privacy concerns. A separate solution focused on user and content control, ideally based on an appliance platform and a proxy architecture, will be warranted for most organizations.” Mark Bouchard Senior Program Director META Group The META Group white paper “The Growing Security Threat: Your Employees” can be obtained by visiting

Slide 14 Introducing Bob Kent Bob Kent works for Edge Corporation. Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances … Visit CARTOON from the left coast FUN look at web browsing (for mature audiences only) “Free network, free music, Oh yah!” -Bob Kent Visit Flash Movies & Demos Spyware Prevention, WebAV, Reverse Proxy, Original Bob Kent

Slide 15 In Control with Blue Coat Keep “good” employees from doing “bad” things on the Internet –Everything web leads to increased risks Blue Coat is #1 proxy appliance leader (IDC) –Custom, object based OS with caching enables wire-speed performance –Advise, coach and enforce with flexible policy controls down to the user level –Shipped more than 20,000 proxy appliances worldwide Do you know what your employees are doing on the Internet? –Find out with a “Web Traffic Assessment” –Plus learn about Spyware prevention