Download presentation
Presentation is loading. Please wait.
Published byNickolas Chapman Modified over 8 years ago
1
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012
2
2 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Employee Owned Corporate Owned IT Sanctioned User Mandated Secure Perimeter Extended Perimeter Always On From the Office Enterprise Direction & Challenges Devices Applications Network Access
3
3 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Extended Enterprise Mobile Branch Office Office Remote Corporate vs Personal UsageHQ
4
4 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Security Paradigm Shift
5
5 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Why Web Application Controls? 93%93% Growth of web-based attacks in 2010 40%40% Users infected by malware from social networking sites 1 in 14 Downloads containing malware 700B700B Minutes users worldwide spend on Facebook per month Companies have had data loss due to social networking 41%
6
6 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Customer Benefits Granular Visibility & Control Manage Webmail Usage Mitigate Social Networking Risks Social Networking Data Loss Prevention Corporate & Regulatory Compliance Allow Social Networking Without Associated Risks Create the “Read- only” Facebook Block Uploading & Downloading of Attachments Mitigate Data Loss Risk
7
7 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Granular Web Application Controls Multimedia Publishing Sharing Social Networks Regulate Operations Restrict Abuse Prevent Data Loss Webmail Send Email Download Attachment Upload Attachment Safe Search Major Search Engines Media Search Engines Keyword Searches
8
8 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Read Only Policy No comments, posting, upload/download, games, email, chat, etc Global Policy Group Policy Limited Use Policy Can comment, post, upload, email and chat, no games, downloads, etc Group Policy Expanded Use Policy Can comment, post, upload, download, email, chat, but no games, etc. Full Use Policy No Restrictions Individual Policy Web Application Control Example Everyone Marketing HR/Recruiting CEO, CIO Different Policies for Facebook throughout an Organization
9
9 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Why Mobile Application Controls? 1B1B Smart devices shipped in 2011 (IDC) 6565 The average number of applications installed on a smartphone 13.7%13.7% Percent of Mobile requests to Social Networking 1B1B Mobile Social Networking Users by 2014 Users who have two more devices today 74%
10
10 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Mobile Applications Behave Differently VS. Different URLs Different calls’ Many apps bypass using a browser Different behavior
11
11 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Top Five Mobile Apps Facebook YouTube Android Market Google Search Gmail Nielsen data: 5/2012 Blue Coat supports 4 out of 5 of these Apps with our new mobile app controls
12
12 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web and Mobile Application Controls Over 200 apps/operations supported Safe Search Major Engines supported Media Search engines as well Keyword Searches Social Networks Regulate Operations Restrict abuse Multi-media Publishing Sharing Web Mail And More! Upload Video Upload Photo Post Message Send Email Download Attachment Upload Attachment
13
13 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Policy Engine GUI controls available now! SGOS 6.2.3.1 VPM controls Cloud Service
14
14 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Policy Engine GUI controls available now! SGOS 6.2.3.1 VPM controls Cloud Service
15
15 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Edit Operation Object All operations listed Select all or individual ops Find Operations by Application Name Select Operations Shown Name to Easily Identify in Policy
16
16 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Edit Operation Object All operations listed Select all or individual ops Find Operations by Application Name Select Operations Shown Name to Easily Identify in Policy
17
17 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Edit Operation Object All operations listed Select all or individual ops Find Operations by Application Name Select Operations Shown Name to Easily Identify in Policy
18
18 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Total Control Control Application & Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl
19
19 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Total Control Control Application & Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl
20
20 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Total Control Control Application & Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl
21
21 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Web Application Controls Total Control Control Application and Operations Create new destination object Select Combined Destination Object Specify the app “and” op App Ctl
22
22 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Resources Web and Mobile Application List: http://www.bluecoat.com/web-application-controls Solution Briefs http://www.bluecoat.com/web-application-controls Web Application Controls Mobile Application Controls Knowledge Base Article (Primer/How-to): https://kb.bluecoat.com/index?page=content&id=KB4784
23
23 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Blue Coat Value: Global Threat Defense Blue Coat Value Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Layered Defense for Comprehensive Protection Proactively Protect All Users in Any Location Universal Policy Universal Policy Global Threat Defense Unified Reporting
24
24 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Security as a Service On-Premise Appliances Blue Coat Unified Security Solution Hybrid
25
25 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential WebPulse Collaborative Defense Globally Diverse Awareness 75 Million Users Blue Coat Blocks 3.3 Million Malware, Phishing & Call-home Threats per Day Proactive Security 500 Malnets Web Ecosystem Intelligence 1 Billion Requests
26
26 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Mapping Malnets
27
27 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Active Threat Phase Infrastructure Phase Negative Day Defense Negative Day Defense Continues to Block Malnet Infrastructure Negative Day Defense Identifies and Blocks New Components AV Engines Begin Detection UTM Policy applied -30 Days Dynamic Payload Changes Domain Attack Begins Exploit Server 0 Day+1 Days+30 Days Attack Ends New Subnet, IP Address and Host Name
28
28 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Negative Day Defense in Action 2011 Jun -120 Days Jun-SepOct 5 -1 Days Oct 6 0 Day Oct 14 +8 Days Oct 16 +10 Days New subnet comes online Subnet cycles through series of domains then goes through series of domains then goes dormant dormant New server joins subnet Urchin attack begins Attack domain changes Attack ends WebPulse identifies subnet as part of subnet as part of known malnet and known malnet and applies suspicious applies suspicious rating rating WebPulse matches server DNA and applies Suspicious rating WebPulse automatically blocks all requests
29
29 © Blue Coat Systems, Inc. 2011. Blue Coat Confidential Sep. 9: WebPulse identified new malware sub- network ~Sep. 21: Root Access on MySQL.com for Sale: $3,000 Sep. 22 : Identified New Server on this malnet Sep. 26: Attack launched: JS file Builds iFrame & Links to Exploit Kit Oct. 2: In Use for 7 Days across 86 Domains Malnet Tracking: MySQL.com Attack Sep. 27: 30 Rotating IPs Used in Attack
30
Blue Coat Confidential Please provide feedback on this webcast to: supportnewsletter@bluecoat.com Webcast replay and slide deck found here: https://bto.bluecoat.com/training/custom er-support-technical-webcasts https://bto.bluecoat.com/training/custom er-support-technical-webcasts (requires BTO login)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.