Download presentation
Presentation is loading. Please wait.
Published byArmani Phenix Modified over 9 years ago
1
Visibility. Then Control. Keep good employees from doing bad things on the Internet
2
Slide 2 Everything Web Web Browser Has Become the Universal Interface Answer is to control, not just block But Brings Business Risks! Network Abuse Back Door Viruses Inappropriate Use P2P file sharing Audio/Video Streaming Spyware Web email Instant Messaging P2P file sharing Web surfing Instant Messenger P2P file sharing
3
Slide 3 Firewalls Keep the Bad Guys Out Public Web Servers Intranet Web Servers Public Internet Firewalls block at the perimeter... Firewall But they are not designed to control at user level Users Hackers Internal Network
4
Slide 4 Restrict or control access to unproductive web sites Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Keep intellectual property from getting out over IM “Splash page” for acceptable Internet use policy Stop web content such as.vbs,.exe Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Keep intellectual property from getting out over IM Log and archive IM traffic by individual text messages Prevent downloading of copyrighted MP3 files Control pop-ups, ads, and spyware Public Web Servers Intranet Web Servers Internal Network Proxy Keep the Good Guys Good Users Firewall Users Proxy Public Internet Restrict or control access to unproductive web sites “Splash page” for acceptable Internet use policy Stop web content such as.vbs,.exe Log and archive IM traffic by individual text messages Prevent downloading of copyrighted MP3 files Control pop-ups, ads, and spyware Total Visibility and Control of All Web Communications
5
Slide 5 Proxy Appliance Wire-Speed Performance Scalable Secure Easy to Manage Latest Web Functionality Wire-Speed Performance Scalable Secure Easy to Manage Latest Web Functionality Proxy Appliance for Performance & Security Software Proxy Server Low Performance Poor Scalability Security Holes Hard to Manage Lacking Functionality
6
Slide 6 Introducing Blue Coat ProxySG Purpose-built proxy appliance providing granular control with wire-speed performance Advise.Coach.Enforce.
7
Slide 7 ProxySG Visibility. Control. Performance. Enterprise Policy Management Technology Partners SGOS™ Object-based OS with Caching Authentication, Authorization, Logging Proxy Custom OS Policy Processing Engine Policy On-Proxy URL Filtering Web Anti-Virus Anti- Spyware Services IM, Streaming & P2P Control Reverse Proxy ProxyAV ISS
8
Slide 8 Proxy Services Proxy Support –HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime –Method-level control options Content Filtering, Content Security, Spyware Prevention IM Control, P2P Blocking, Phishing & Pop-up Blocking Web Virus Scanning with ProxyAV Streaming Control Compression (HTTP & TCP/SOCKS) Bandwidth Management SSL Termination & Acceleration Reverse Proxy Mode (Application Acceleration)
9
Slide 9 Reporter Enterprise Policy Management Distribute Policy Monitor & Report Set & Enforce Policy Visual Policy Manager Director Corporate Web Policy
10
Slide 10 Complete Range of Proxy Appliances ProxySG 400 Series ProxySG 800 Series ProxySG 8000 Series Performance Remote Offices Up to 250 users100-2000 users1000 - 50,000+ users WAN Throughput Connected Users Up to 15Mbps15Mbps-80Mbps80Mbps -300+ Mbps Corporate Headquarters ProxySG 200 Series
11
Slide 11 Leader in a Growing Market Segment Blue Coat #1 Leader with 30% Market Share Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis Worldwide Secure Content Management Appliance Revenue, 2001-2007 ($M) ($M) 2001200220032004200520062007 200 0 400 600 800 1,000 1,200 1,400 1,600 1,800 Blue Coat as the fastest growing vendor in the Secure Content and Application Delivery market among Cisco, Network Appliance and Microsoft. Blue Coat achieved 77% year- over-year growth and 30% share of the market.
12
Slide 12 Energy, Oil & Gas Health & Pharmaceuticals Government World’s Major Institutions Trust Blue Coat Financial Mfg/IndustrialConsumer & Retail
13
Slide 13 META Group: Proxy Appliances Needed “Establishing a security solution to address the appropriateness of content and its usage has quickly become a legitimate business issue, due in part to productivity, liability, and privacy concerns. A separate solution focused on user and content control, ideally based on an appliance platform and a proxy architecture, will be warranted for most organizations.” Mark Bouchard Senior Program Director META Group The META Group white paper “The Growing Security Threat: Your Employees” can be obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.http://www.bluecoat.com/downloads/whitepapers/security_threat.html
14
Slide 14 Introducing Bob Kent Bob Kent works for Edge Corporation. Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances … Visit www.bobkent.netwww.bobkent.net CARTOON from the left coast FUN look at web browsing (for mature audiences only) “Free network, free music, Oh yah!” -Bob Kent Visit www.bobkent.infowww.bobkent.info Flash Movies & Demos Spyware Prevention, WebAV, Reverse Proxy, Original Bob Kent
15
Slide 15 In Control with Blue Coat Keep “good” employees from doing “bad” things on the Internet –Everything web leads to increased risks Blue Coat is #1 proxy appliance leader (IDC) –Custom, object based OS with caching enables wire-speed performance –Advise, coach and enforce with flexible policy controls down to the user level –Shipped more than 20,000 proxy appliances worldwide Do you know what your employees are doing on the Internet? –Find out with a “Web Traffic Assessment” –Plus learn about Spyware prevention
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.