Download presentation
Presentation is loading. Please wait.
Published byAriel Woods Modified over 8 years ago
1
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux
2
2 © Blue Coat Systems, Inc. 2012 IT Losing Device Control Percent of Employee-Owned Devices
3
3 © Blue Coat Systems, Inc. 2012 Device Use Proliferation 60% of Devices Used for Work & Personal Purposes Device Ownership by Users
4
4 © Blue Coat Systems, Inc. 2012 Multiple, Employee Owned Single, Corporate Owned IT Sanctioned User Mandated Secure Perimeter Extended Perimeter Always On From the Office Enterprise Direction Devices Applications Network Access
5
5 © Blue Coat Systems, Inc. 2012 Evolving Threat Landscape © Blue Coat Systems, Inc. 2011. 5 76% Businesses Have BYOD Initiatives 72 Minutes Per Day Browsing the Mobile Web 240% Increase in Malicious Sites 2/3 of All Attacks in 2012 Launched via Malnets 1 in 16 Malicious Attacks Internet within an Internet 15% of Enterprise Apps by 2015 Web Applications Attacked Every Two MinutesMALNETS MOBILE DEVICES SAAS SOCIAL NETWORKING
6
6 © Blue Coat Systems, Inc. 2012 Security Paradigm Shift
7
7 © Blue Coat Systems, Inc. 2012 Security Service On-Premise Appliances Blue Coat Unified Security Solutions Unified
8
8 © Blue Coat Systems, Inc. 2012 Blue Coat Value: Global Threat DefenseBlue Coat Unified Security Solutions Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Layered Defense for Comprehensive Protection Proactively Protect All Users in Any Location Universal Policy Universal Policy Global Threat Defense Unified Reporting
9
9 © Blue Coat Systems, Inc. 2012 WebPulse Collaborative Defense Globally Diverse Awareness 75 Million Users Blue Coat Blocks 3.3 Million Malware, Phishing & Call-home Threats per Day Proactive Security 500 Malnets Web Ecosystem Intelligence 1 Billion Requests
10
10 © Blue Coat Systems, Inc. 2012 Mapping Malnets
11
11 © Blue Coat Systems, Inc. 2012 Active Threat Phase Infrastructure Phase Negative Day Defense Negative Day Defense Continues to Block Malnet Infrastructure Negative Day Defense Identifies and Blocks New Components AV Engines Begin Detection UTM Policy applied -30 Days Dynamic Payload Changes Domain Attack Begins Exploit Server 0 Day+1 Days+30 Days Attack Ends New Subnet, IP Address and Host Name
12
12 © Blue Coat Systems, Inc. 2012 Rich Integration into Authentication Environments for Enforcement of Corporate IT Policies Flexible Engine for Granular Control of Policy- based Actions, Web Applications & Operations Multi-dimensional Ratings with Deep Language & Category Coverage for Accurate Content Controls Blue Coat Value: Universal Policy User Policies for across All Devices & Locations Universal Policy Universal Policy Global Threat Defense Unified Reporting
13
13 © Blue Coat Systems, Inc. 2012Remote Mobile HQ Branch Office Universal Policy SecuritySecurity ProductivityProductivity ComplianceCompliance Acceptable Use
14
14 © Blue Coat Systems, Inc. 2012 Drill-down Analysis for Closed Loop Policy Actions & Infected Desktop Remediation Role-based Access & Data Anonymity to Meet Compliance Requirements Customizable Dashboards for Quick Access to Relevant Information Blue Coat Value: Unified Reporting Granular Insight into All Web & User Activity Universal Policy Global Threat Defense Unified Reporting
15
15 © Blue Coat Systems, Inc. 2012 Blue Coat Secure Web Anywhere WebPulse
16
16 © Blue Coat Systems, Inc. 2012 Blue Coat Web Security Value Proposition UNIFIED REPORTING Granular, Customizable Visibility into Web Traffic UNIFIED REPORTING Granular, Customizable Visibility into Web Traffic UNIVERSAL POLICY Advanced Content, App & Access Controls UNIVERSAL POLICY Advanced Content, App & Access Controls Unified Security through Seamless Integration of Appliances & SaaS GLOBAL THREAT DEFENSE Negative Day Defense with WebPulse GLOBAL THREAT DEFENSE Negative Day Defense with WebPulse
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.