Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Day in the Life of “Bob Kent” Visibility. Then Control.

Similar presentations


Presentation on theme: "A Day in the Life of “Bob Kent” Visibility. Then Control."— Presentation transcript:

1

2 A Day in the Life of “Bob Kent” Visibility. Then Control.

3 Everything Web Web Browser Has Become the Universal Client Answer is to control, not just block But Brings Business Risks! Network Abuse Back Door Viruses Inappropriate Use P2P file sharing Audio/Video Streaming Spyware Web Instant Messaging P2P file sharing Web surfing Instant Messenger P2P file sharing

4 Web Creates Business Risk

5 Introducing Blue Coat ProxySG Purpose-built proxy appliance providing granular control with wire-speed performance Advise.Coach.Enforce.

6 A Day in the Life of “Bob Kent”

7 Introducing Bob Kent Bob works for Edge Corporation. Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances …

8

9 Launch Internet Explorer Browser Finds and displays information and Web sites on the Internet 10:45

10 10:46 Microsoft Corporation – Microsoft Internet Explorer

11 Deferred Access Policy – Microsoft Internet Explorer Welcome Bob Kent to Edge Corp. intranet and Internet connection News of the Day: Employee meeting will take place in the restaurant at 3:00 pm today Before accessing the Internet, you must read and acknowledge our corporate acceptable use policy CLICK HERE TO ACCEPT AND ACCESS THE INTERNET Any IT problems, please IT Support Desk or call extension 2875 IP address: DateFebruary 20, 2004 Time:9:15 am CLICK HERE TO ACCEPT AND ACCESS THE INTERNET 10:46

12 10:59 Yahoo! – Microsoft Internet Explorer

13 Deferred Access Policy – Microsoft Internet Explorer 10:59 Hello again, Bob Kent This is a message from the IT department. The website you are trying to access: Is listed as a site within the category ADULT CONTENT and you are not allowed to visit this site. Our Internet Acceptable Use Policy is available here: For more help, IT Support Desk or call extension 2875

14 Deferred Access Policy – Microsoft Internet Explorer 11:01 Hello again, Bob Kent This is a message from the IT department. The website you are trying to access: Is listed as a site within the category SPORTS This category of site is accessible by you before 9:00 am, between 12:00 and 1:00 pm and after 6:00 pm Our Internet Acceptable Use Policy is available here: For more help, IT Support Desk or call extension 2875

15 Amazon.com Welcome! – Microsoft Internet Explorer 11:15 Hello again Bob Kent This is a message from the IT department. The company policy is to allow users access to shopping sites, however all access is logged and sent to management every week. This window will disappear in 5 seconds.

16 CNN.com – Microsoft Internet Explorer 11:32 Hello again Bob Kent This is a message from the IT department. Your role allows you to access news sites for a maximum of 15 minutes a day. Please continue. This window will disappear in 5 seconds. 11:32

17 Deferred Access Policy – Microsoft Internet Explorer 11:59 Hello again, Bob Kent As valued member of staff, we want to make sure you are happy here at Edge Corp. If you would like an interview with HR to discuss your role, please me. Best Regards, Lucy Smith

18 Yahoo! F – Microsoft Internet Explorer 12:13

19 Yahoo! F – Microsoft Internet Explorer 12:26 I work for Toyota. Rumor here is that we are going to merge with Ford in 30 days. Hello again Bob Kent This is a message from the IT department. You are not allowed to POST messages on Stock bulletin board or chat rooms. See you manager or IT support for help.

20 MSN Hotmail - Home – Microsoft Internet Explorer 12:42

21 MSN Hotmail - Home – Microsoft Internet Explorer 12:43 Here’s an Interesting file. Take a look.

22 MSN Hotmail - Home – Microsoft Internet Explorer 12: Message Attachments – Edge Corp XLS WARNING! Even though you do have authority to access Web- sites, you cannot send out attachments of files or MIME-type.XLS or.zip

23

24

25 Windows Media Player Plays your digital media including music, videos, CDs, DVDs and Internet Radio 1:45

26 1:46 Hello again Bob Kent Streaming media can adversely effect network performance and employee productivity. You cannot access Internet radio sites, or streaming media from entertainment and sports sites. Streaming from approved business sites is limited to 128Kbps. You can access streaming media from internal sites with no restrictions.

27 Launch Kazaa 1:52

28 Geez Bob Kent... What are you up to now? Peer-to-peer applications are forbidden on Edge Corp. resources. This application will not be allowed to connect to other P2P nodes. Please uninstall your P2P client on your computer or your Internet access privileges will be taken away. Click here to read the AUP or contact IT support desk on x2785 1:52 Disconnected

29 Launch Internet Explorer Browser Finds and displays information and Web sites on the Internet 2:04

30 10:46 Microsoft Corporation – Microsoft Internet Explorer 2:05

31 Deferred Access Policy – Microsoft Internet Explorer Hi Bob Kent, Edge Corp employees are permitted to access personal, Web-based accounts. However, all file attachments will be scanned and infected files deleted. CLICK HERE TO CONTINUE Any IT problems, please IT Support Desk or call extension 2875 IP address: DateFebruary 20, 2004 Time:2:05 pm CLICK HERE TO CONTINUE 10:46 2:05

32 MSN Hotmail – Inbox – Microsoft Internet Explorer from Jack R.Mar 3129KB Win A Trip for Two To Hawaii Mar 31768KB Hotmail StaffIncrease your capacityMar 301KB Your File!Mar 3029KB Sam Johnson Did you see the game last night? Mar 307KB Cassandra LoveCall Me.Mar 30540KB with Peg and Alan on 4 th ?Mar 3029KB Mary SmithDid you call mom and dad about photos?Mar 2919KB Kyle LissabetWin a free computer.Mar 29760KB 2:06

33 MSN Hotmail – Inbox – Microsoft Internet Explorer from Jack R.Mar 3129KB Win A Trip for Two To Hawaii Mar 31768KB Hotmail StaffIncrease your capacityMar 301KB Your File!Mar 3029KB Sam Johnson Did you see the game last night? Mar 307KB Cassandra LoveCall Me.Mar 30540KB with Peg and Alan on 4 th ?Mar 3029KB Mary SmithDid you call mom and dad about photos?Mar 2919KB Kyle LissabetWin a free computer.Mar 29760KB March 31, :35 pm Win A Trip for Two To Hawaii Free_trip.pif You’ve won a free trip to Hawaii. Download the Attached claim form to register and win your trip ! 2:06

34 MSN Hotmail – Inbox – Microsoft Internet Explorer from Jack R.Mar 3129KB Win A Trip for Two To Hawaii Mar 31768KB Hotmail StaffIncrease your capacityMar 301KB Your File!Mar 3029KB Sam Johnson Did you see the game last night? Mar 307KB Cassandra LoveCall Me.Mar 30540KB with Peg and Alan on 4 th ?Mar 3029KB Mary SmithDid you call mom and dad about photos?Mar 2919KB Kyle LissabetWin a free computer.Mar 29760KB March 31, :35 pm Win A Trip for Two To Hawaii Free_trip.pif You’ve won a free trip to Hawaii. Download the Attached claim form to register and win your trip ! 2:06 Free_trip.pif Hello Bob Kent A virus was detected in the file you were attempting to download. The attachment/file has been successfully deleted.

35 Microsoft Internet Explorer Hello Bob Kent This is a message from the IT department. We noticed that your PC was about to download some spyware. We have saved your PC from infection

36 Microsoft Internet Explorer Hello, Bob Kent This is a message from the IT department. Your PC has just tried to send information to a known spyware site: We have blocked the spyware from sending your personal information out of the organization (using our Proxy appliance), however your PC will run more slowly until the spyware is removed. We are about to redirect you to the spyware removal software to remove this and any other spyware from your PC, please click HERE to start. For more help, IT Support Desk or call extension 2875

37 2:08 10:46 Google – Microsoft Internet Explorer 2:12

38 2:08 10:46 Google – Microsoft Internet Explorer 2:12 breast

39

40 Launch Microsoft OutLook J. TrentonPlans for Sales Conference12kThu 3/25/ :07 pm Sam JohnsonPlans for Friday??? See attached invite600kWed 3/24/2004 9:00 am spread sheet for NE Sales134kWed 3/24/2004 7:00 am Sue BransonReporting56kTues 3/23/ :37 pm Your NIC Card issue12kTues 3/23/2004 8:47 am exec...Re: Request for final March figures34kTues 3/23/2004 8:01 am Mary SmithVacation photos989kMon 3/22/2004 6:35 pm Sam JohnsonHey.78kMon 3/22/2004 5:38 pm J. TrentonPlans for Sales Conference12kThu 3/25/04 12:07 pm Sam JohnsonPlans for Friday??? See attached invite600kWed 3/24/04 9:00 am spread sheet for NE Sales134kWed 3/24/04 7:00 am Sue BransonReporting56kTues 3/23/04 12:37 pm Your NIC Card issue12kTues 3/23/04 8:47 am exec...Re: Request for final March figures34kTues 3/23/04 8:01 am Mary SmithVacation photos989kMon 3/22/04 6:35 pm Sam JohnsonHey.78kMon 3/22/04 5:38 pm Britny566Girls. Girls. Girls.78kThu 3/25/04 2:01 pm Come see us now! Adult Content Graphics/Images removed Adult Content Graphics/Images removed From: Britny566 Subject:Girls. Girls. Girls. To: Cc: Britny566Girls. Girls. Girls.78kThu 3/25/04 2:01 pm 2:15

41 User Experience Summary Bob is considered a “good guy” at the office –Every browser click has an affect on your business –Reducing Bob-like actions is the job of ProxySG ProxySG provides the ability to: –Advise Bob on Acceptable Use Policies –Coach Bob on best practices and time allocations –Enforce policy to control viruses, spyware, legal liabilities, adverse bandwidth use & reduced productivity

42 In Control with Blue Coat Keep “good” employees from doing “bad” things on the Internet –Everything web leads to increased risks Blue Coat is #1 proxy appliance leader (IDC) –Custom, object based OS with caching enables wire-speed performance –Shipped more than 20,000 proxy appliances worldwide Do you know what your users are doing on the network? –Find out with a “Web Traffic Assessment” –Plus learn more about Spyware prevention

43 The Business of IT Applications Delivered over the Network Experienced by Users Challenge: How to Increase Velocity of Application Deployment Across Distributed Enterprise, While Reducing Costs? Challenge: How to Increase Velocity of Application Deployment Across Distributed Enterprise, While Reducing Costs? And Keep it Fast and Safe too!

44 Full Protocol Termination = Total Visibility & Context (HTTP, HTTPS, IM, Streaming, P2P, SOCKS, FTP, CIFS, MAPI, Telnet, DNS) The Power of the Proxy PROTECT Prevent spyware, malware & viruses Stop DoS attacks IE vulnerabilities, IM threats Ultimate Control Point for Web Communications ACCELERATE Multiprotocol Accelerated Caching Hierarchy (MACH) BW Shaping, Compression, Protocol Optimization Sequence, Object & Predictive Caching + CONTROL Fine-grained policy for applications, protocols, content & users (allow, deny, transform, etc) Granular, flexible logging Authentication integration +

45 Real World “Power of the Proxy” Problems –Lack of Security and Control of Internet Use –Server ‘overload’ in Data Center –Poor to unusable application performance in branch office Retail Branches Headquarters Proxy Switch Router SwitchRouterFirewall Internet Internal Network Retail Branches Real example of a “webified” business –Over 250 web based applications –Customer Facing – Partner Exchanges – Employee Tools –Streaming / / file / JAVA / XML / etc., (virtually anything Web enabled) Application Servers Proxy

46 ProxySG Protect. Control. Accelerate. Enterprise Policy Management Technology Partners SGOS™  Object-based OS with Caching Authentication, Authorization, Logging Proxy Custom OS Policy Processing Engine Policy On-Proxy URL Filtering Web Anti-Virus Anti- Spyware Services IM, Streaming & P2P Control Reverse Proxy ProxyAV ISS

47 Complete Range of Proxy Appliances ProxySG 400 Series ProxySG 800 Series ProxySG 8000 Series Performance Remote Offices Up to 250 users users ,000+ users WAN Throughput Connected Users Up to 15Mbps15Mbps-80Mbps80Mbps Mbps Corporate Headquarters ProxySG 200 Series

48 Thank You!


Download ppt "A Day in the Life of “Bob Kent” Visibility. Then Control."

Similar presentations


Ads by Google