No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux
2 © Blue Coat Systems, Inc IT Losing Device Control Percent of Employee-Owned Devices
3 © Blue Coat Systems, Inc Device Use Proliferation 60% of Devices Used for Work & Personal Purposes Device Ownership by Users
4 © Blue Coat Systems, Inc Multiple, Employee Owned Single, Corporate Owned IT Sanctioned User Mandated Secure Perimeter Extended Perimeter Always On From the Office Enterprise Direction Devices Applications Network Access
5 © Blue Coat Systems, Inc Evolving Threat Landscape © Blue Coat Systems, Inc 76% Businesses Have BYOD Initiatives 72 Minutes Per Day Browsing the Mobile Web 240% Increase in Malicious Sites 2/3 of All Attacks in 2012 Launched via Malnets 1 in 16 Malicious Attacks Internet within an Internet 15% of Enterprise Apps by 2015 Web Applications Attacked Every Two MinutesMALNETS MOBILE DEVICES SAAS SOCIAL NETWORKING
6 © Blue Coat Systems, Inc Security Paradigm Shift
7 © Blue Coat Systems, Inc Security Service On-Premise Appliances Blue Coat Unified Security Solutions Unified
8 © Blue Coat Systems, Inc Blue Coat Value: Global Threat DefenseBlue Coat Unified Security Solutions Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Layered Defense for Comprehensive Protection Proactively Protect All Users in Any Location Universal Policy Universal Policy Global Threat Defense Unified Reporting
9 © Blue Coat Systems, Inc WebPulse Collaborative Defense Globally Diverse Awareness 75 Million Users Blue Coat Blocks 3.3 Million Malware, Phishing & Call-home Threats per Day Proactive Security 500 Malnets Web Ecosystem Intelligence 1 Billion Requests
10 © Blue Coat Systems, Inc Mapping Malnets
11 © Blue Coat Systems, Inc Active Threat Phase Infrastructure Phase Negative Day Defense Negative Day Defense Continues to Block Malnet Infrastructure Negative Day Defense Identifies and Blocks New Components AV Engines Begin Detection UTM Policy applied -30 Days Dynamic Payload Changes Domain Attack Begins Exploit Server 0 Day+1 Days+30 Days Attack Ends New Subnet, IP Address and Host Name
12 © Blue Coat Systems, Inc Rich Integration into Authentication Environments for Enforcement of Corporate IT Policies Flexible Engine for Granular Control of Policy- based Actions, Web Applications & Operations Multi-dimensional Ratings with Deep Language & Category Coverage for Accurate Content Controls Blue Coat Value: Universal Policy User Policies for across All Devices & Locations Universal Policy Universal Policy Global Threat Defense Unified Reporting
13 © Blue Coat Systems, Inc. 2012Remote Mobile HQ Branch Office Universal Policy SecuritySecurity ProductivityProductivity ComplianceCompliance Acceptable Use
14 © Blue Coat Systems, Inc Drill-down Analysis for Closed Loop Policy Actions & Infected Desktop Remediation Role-based Access & Data Anonymity to Meet Compliance Requirements Customizable Dashboards for Quick Access to Relevant Information Blue Coat Value: Unified Reporting Granular Insight into All Web & User Activity Universal Policy Global Threat Defense Unified Reporting
15 © Blue Coat Systems, Inc Blue Coat Secure Web Anywhere WebPulse
16 © Blue Coat Systems, Inc Blue Coat Web Security Value Proposition UNIFIED REPORTING Granular, Customizable Visibility into Web Traffic UNIFIED REPORTING Granular, Customizable Visibility into Web Traffic UNIVERSAL POLICY Advanced Content, App & Access Controls UNIVERSAL POLICY Advanced Content, App & Access Controls Unified Security through Seamless Integration of Appliances & SaaS GLOBAL THREAT DEFENSE Negative Day Defense with WebPulse GLOBAL THREAT DEFENSE Negative Day Defense with WebPulse