No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.

Slides:



Advertisements
Similar presentations
Govern the Flow of Data: Moving from Chaos to Control
Advertisements

Enabling business beyond the corporate network.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Unified Logs and Reporting for Hybrid Centralized Management
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IBM Security Network Protection (XGS)
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Borderless Networks Enabling the Borderless Organisation Mark Jackson,
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Dell Connected Security Solutions Simplify & unify.
McAfee Web Protection Protect Your Enterprise Against Web Threats.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.
Webroot Web Security SaaS A Better Approach to Web Security
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Bill Jensen Bashar Kachachi Session Code: SIA309.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential – Internal Use Only COMPLETE LIFECYCLE APPROACH TO ADVANCED THREAT.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Blue Coat Cloud Continuum
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Barracuda NG Firewall ™
Barracuda Web Security Flex
Barracuda Web Filtering Service
Hybrid Management and Security
Threat Management Gateway
Secure & Unified Identity
Prevent Costly Data Leaks from Microsoft Office 365
Software-Defined Secure Networks in Action
Check Point Connectra NGX R60
Secure once, run anywhere Simplify your security with Sophos
New Web Security Bundles For 1500 Users and Below
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Microsoft Data Insights Summit
Introduction to Symantec Security Service
In the attack index…what number is your Company?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux

2 © Blue Coat Systems, Inc IT Losing Device Control Percent of Employee-Owned Devices

3 © Blue Coat Systems, Inc Device Use Proliferation 60% of Devices Used for Work & Personal Purposes Device Ownership by Users

4 © Blue Coat Systems, Inc Multiple, Employee Owned Single, Corporate Owned IT Sanctioned User Mandated Secure Perimeter Extended Perimeter Always On From the Office Enterprise Direction Devices Applications Network Access

5 © Blue Coat Systems, Inc Evolving Threat Landscape © Blue Coat Systems, Inc  76% Businesses Have BYOD Initiatives  72 Minutes Per Day Browsing the Mobile Web  240% Increase in Malicious Sites  2/3 of All Attacks in 2012 Launched via Malnets  1 in 16 Malicious Attacks  Internet within an Internet  15% of Enterprise Apps by 2015  Web Applications Attacked Every Two MinutesMALNETS MOBILE DEVICES SAAS SOCIAL NETWORKING

6 © Blue Coat Systems, Inc Security Paradigm Shift

7 © Blue Coat Systems, Inc Security Service On-Premise Appliances Blue Coat Unified Security Solutions Unified

8 © Blue Coat Systems, Inc Blue Coat Value: Global Threat DefenseBlue Coat Unified Security Solutions Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Layered Defense for Comprehensive Protection Proactively Protect All Users in Any Location Universal Policy Universal Policy Global Threat Defense Unified Reporting

9 © Blue Coat Systems, Inc WebPulse Collaborative Defense Globally Diverse Awareness 75 Million Users Blue Coat Blocks 3.3 Million Malware, Phishing & Call-home Threats per Day Proactive Security 500 Malnets Web Ecosystem Intelligence 1 Billion Requests

10 © Blue Coat Systems, Inc Mapping Malnets

11 © Blue Coat Systems, Inc Active Threat Phase Infrastructure Phase Negative Day Defense Negative Day Defense Continues to Block Malnet Infrastructure Negative Day Defense Identifies and Blocks New Components AV Engines Begin Detection UTM Policy applied -30 Days Dynamic Payload Changes Domain Attack Begins Exploit Server 0 Day+1 Days+30 Days Attack Ends New Subnet, IP Address and Host Name

12 © Blue Coat Systems, Inc Rich Integration into Authentication Environments for Enforcement of Corporate IT Policies Flexible Engine for Granular Control of Policy- based Actions, Web Applications & Operations Multi-dimensional Ratings with Deep Language & Category Coverage for Accurate Content Controls Blue Coat Value: Universal Policy User Policies for across All Devices & Locations Universal Policy Universal Policy Global Threat Defense Unified Reporting

13 © Blue Coat Systems, Inc. 2012Remote Mobile HQ Branch Office Universal Policy SecuritySecurity ProductivityProductivity ComplianceCompliance Acceptable Use

14 © Blue Coat Systems, Inc Drill-down Analysis for Closed Loop Policy Actions & Infected Desktop Remediation Role-based Access & Data Anonymity to Meet Compliance Requirements Customizable Dashboards for Quick Access to Relevant Information Blue Coat Value: Unified Reporting Granular Insight into All Web & User Activity Universal Policy Global Threat Defense Unified Reporting

15 © Blue Coat Systems, Inc Blue Coat Secure Web Anywhere WebPulse

16 © Blue Coat Systems, Inc Blue Coat Web Security Value Proposition UNIFIED REPORTING Granular, Customizable Visibility into Web Traffic UNIFIED REPORTING Granular, Customizable Visibility into Web Traffic UNIVERSAL POLICY Advanced Content, App & Access Controls UNIVERSAL POLICY Advanced Content, App & Access Controls Unified Security through Seamless Integration of Appliances & SaaS GLOBAL THREAT DEFENSE Negative Day Defense with WebPulse GLOBAL THREAT DEFENSE Negative Day Defense with WebPulse