A Day in the Life of “Bob Kent” Visibility. Then Control.

Slides:



Advertisements
Similar presentations
Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
Advertisements

Enabling Secure Internet Access with ISA Server
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Visibility. Then Control. Keep good employees from doing bad things on the Internet.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Secure your users Accelerate your data.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Norman SecureSurf Protect your users when surfing the Internet.
Managing Client Access
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Secure the Web with Blue Coat Stop the Bad. Allow the Good.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Using SWHS: The AUP [Acceptable Use Policy]
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
The Internet and World Wide Web By: Shilpa Phanse 10/8/2008.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
The Intranet.
Introducing ProxyClient Stop the Bad. Accelerate the Good. Everywhere. Antti Lahokoski – Sales -
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
XP Browser and Basics COM111 Introduction to Computer Applications.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
What is Multimedia? Multimedia is the integration of text, still and moving images, and sound by means of computer technology.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Visibility. Then Control
TMG Client Protection 6NPS – Session 7.
Threat Management Gateway
Call AVG Antivirus Support | Fix Your PC
Introducing ProxyClient
Unit# 5: Internet and Worldwide Web
The Internet and Electronic mail
Presentation transcript:

A Day in the Life of “Bob Kent” Visibility. Then Control.

Everything Web Web Browser Has Become the Universal Client Answer is to control, not just block But Brings Business Risks! Network Abuse Back Door Viruses Inappropriate Use P2P file sharing Audio/Video Streaming Spyware Web Instant Messaging P2P file sharing Web surfing Instant Messenger P2P file sharing

Web Creates Business Risk

Introducing Blue Coat ProxySG Purpose-built proxy appliance providing granular control with wire-speed performance Advise.Coach.Enforce.

A Day in the Life of “Bob Kent”

Introducing Bob Kent Bob works for Edge Corporation. Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances …

Launch Internet Explorer Browser Finds and displays information and Web sites on the Internet 10:45

10:46 Microsoft Corporation – Microsoft Internet Explorer

Deferred Access Policy – Microsoft Internet Explorer Welcome Bob Kent to Edge Corp. intranet and Internet connection News of the Day: Employee meeting will take place in the restaurant at 3:00 pm today Before accessing the Internet, you must read and acknowledge our corporate acceptable use policy CLICK HERE TO ACCEPT AND ACCESS THE INTERNET Any IT problems, please IT Support Desk or call extension 2875 IP address: DateFebruary 20, 2004 Time:9:15 am CLICK HERE TO ACCEPT AND ACCESS THE INTERNET 10:46

10:59 Yahoo! – Microsoft Internet Explorer

Deferred Access Policy – Microsoft Internet Explorer 10:59 Hello again, Bob Kent This is a message from the IT department. The website you are trying to access: Is listed as a site within the category ADULT CONTENT and you are not allowed to visit this site. Our Internet Acceptable Use Policy is available here: For more help, IT Support Desk or call extension 2875

Deferred Access Policy – Microsoft Internet Explorer 11:01 Hello again, Bob Kent This is a message from the IT department. The website you are trying to access: Is listed as a site within the category SPORTS This category of site is accessible by you before 9:00 am, between 12:00 and 1:00 pm and after 6:00 pm Our Internet Acceptable Use Policy is available here: For more help, IT Support Desk or call extension 2875

Amazon.com Welcome! – Microsoft Internet Explorer 11:15 Hello again Bob Kent This is a message from the IT department. The company policy is to allow users access to shopping sites, however all access is logged and sent to management every week. This window will disappear in 5 seconds.

CNN.com – Microsoft Internet Explorer 11:32 Hello again Bob Kent This is a message from the IT department. Your role allows you to access news sites for a maximum of 15 minutes a day. Please continue. This window will disappear in 5 seconds. 11:32

Deferred Access Policy – Microsoft Internet Explorer 11:59 Hello again, Bob Kent As valued member of staff, we want to make sure you are happy here at Edge Corp. If you would like an interview with HR to discuss your role, please me. Best Regards, Lucy Smith

Yahoo! F – Microsoft Internet Explorer 12:13

Yahoo! F – Microsoft Internet Explorer 12:26 I work for Toyota. Rumor here is that we are going to merge with Ford in 30 days. Hello again Bob Kent This is a message from the IT department. You are not allowed to POST messages on Stock bulletin board or chat rooms. See you manager or IT support for help.

MSN Hotmail - Home – Microsoft Internet Explorer 12:42

MSN Hotmail - Home – Microsoft Internet Explorer 12:43 Here’s an Interesting file. Take a look.

MSN Hotmail - Home – Microsoft Internet Explorer 12: Message Attachments – Edge Corp XLS WARNING! Even though you do have authority to access Web- sites, you cannot send out attachments of files or MIME-type.XLS or.zip

Windows Media Player Plays your digital media including music, videos, CDs, DVDs and Internet Radio 1:45

1:46 Hello again Bob Kent Streaming media can adversely effect network performance and employee productivity. You cannot access Internet radio sites, or streaming media from entertainment and sports sites. Streaming from approved business sites is limited to 128Kbps. You can access streaming media from internal sites with no restrictions.

Launch Kazaa 1:52

Geez Bob Kent... What are you up to now? Peer-to-peer applications are forbidden on Edge Corp. resources. This application will not be allowed to connect to other P2P nodes. Please uninstall your P2P client on your computer or your Internet access privileges will be taken away. Click here to read the AUP or contact IT support desk on x2785 1:52 Disconnected

Launch Internet Explorer Browser Finds and displays information and Web sites on the Internet 2:04

10:46 Microsoft Corporation – Microsoft Internet Explorer 2:05

Deferred Access Policy – Microsoft Internet Explorer Hi Bob Kent, Edge Corp employees are permitted to access personal, Web-based accounts. However, all file attachments will be scanned and infected files deleted. CLICK HERE TO CONTINUE Any IT problems, please IT Support Desk or call extension 2875 IP address: DateFebruary 20, 2004 Time:2:05 pm CLICK HERE TO CONTINUE 10:46 2:05

MSN Hotmail – Inbox – Microsoft Internet Explorer from Jack R.Mar 3129KB Win A Trip for Two To Hawaii Mar 31768KB Hotmail StaffIncrease your capacityMar 301KB Your File!Mar 3029KB Sam Johnson Did you see the game last night? Mar 307KB Cassandra LoveCall Me.Mar 30540KB with Peg and Alan on 4 th ?Mar 3029KB Mary SmithDid you call mom and dad about photos?Mar 2919KB Kyle LissabetWin a free computer.Mar 29760KB 2:06

MSN Hotmail – Inbox – Microsoft Internet Explorer from Jack R.Mar 3129KB Win A Trip for Two To Hawaii Mar 31768KB Hotmail StaffIncrease your capacityMar 301KB Your File!Mar 3029KB Sam Johnson Did you see the game last night? Mar 307KB Cassandra LoveCall Me.Mar 30540KB with Peg and Alan on 4 th ?Mar 3029KB Mary SmithDid you call mom and dad about photos?Mar 2919KB Kyle LissabetWin a free computer.Mar 29760KB March 31, :35 pm Win A Trip for Two To Hawaii Free_trip.pif You’ve won a free trip to Hawaii. Download the Attached claim form to register and win your trip ! 2:06

MSN Hotmail – Inbox – Microsoft Internet Explorer from Jack R.Mar 3129KB Win A Trip for Two To Hawaii Mar 31768KB Hotmail StaffIncrease your capacityMar 301KB Your File!Mar 3029KB Sam Johnson Did you see the game last night? Mar 307KB Cassandra LoveCall Me.Mar 30540KB with Peg and Alan on 4 th ?Mar 3029KB Mary SmithDid you call mom and dad about photos?Mar 2919KB Kyle LissabetWin a free computer.Mar 29760KB March 31, :35 pm Win A Trip for Two To Hawaii Free_trip.pif You’ve won a free trip to Hawaii. Download the Attached claim form to register and win your trip ! 2:06 Free_trip.pif Hello Bob Kent A virus was detected in the file you were attempting to download. The attachment/file has been successfully deleted.

Microsoft Internet Explorer Hello Bob Kent This is a message from the IT department. We noticed that your PC was about to download some spyware. We have saved your PC from infection

Microsoft Internet Explorer Hello, Bob Kent This is a message from the IT department. Your PC has just tried to send information to a known spyware site: We have blocked the spyware from sending your personal information out of the organization (using our Proxy appliance), however your PC will run more slowly until the spyware is removed. We are about to redirect you to the spyware removal software to remove this and any other spyware from your PC, please click HERE to start. For more help, IT Support Desk or call extension 2875

2:08 10:46 Google – Microsoft Internet Explorer 2:12

2:08 10:46 Google – Microsoft Internet Explorer 2:12 breast

Launch Microsoft OutLook J. TrentonPlans for Sales Conference12kThu 3/25/ :07 pm Sam JohnsonPlans for Friday??? See attached invite600kWed 3/24/2004 9:00 am spread sheet for NE Sales134kWed 3/24/2004 7:00 am Sue BransonReporting56kTues 3/23/ :37 pm Your NIC Card issue12kTues 3/23/2004 8:47 am exec...Re: Request for final March figures34kTues 3/23/2004 8:01 am Mary SmithVacation photos989kMon 3/22/2004 6:35 pm Sam JohnsonHey.78kMon 3/22/2004 5:38 pm J. TrentonPlans for Sales Conference12kThu 3/25/04 12:07 pm Sam JohnsonPlans for Friday??? See attached invite600kWed 3/24/04 9:00 am spread sheet for NE Sales134kWed 3/24/04 7:00 am Sue BransonReporting56kTues 3/23/04 12:37 pm Your NIC Card issue12kTues 3/23/04 8:47 am exec...Re: Request for final March figures34kTues 3/23/04 8:01 am Mary SmithVacation photos989kMon 3/22/04 6:35 pm Sam JohnsonHey.78kMon 3/22/04 5:38 pm Britny566Girls. Girls. Girls.78kThu 3/25/04 2:01 pm Come see us now! Adult Content Graphics/Images removed Adult Content Graphics/Images removed From: Britny566 Subject:Girls. Girls. Girls. To: Cc: Britny566Girls. Girls. Girls.78kThu 3/25/04 2:01 pm 2:15

User Experience Summary Bob is considered a “good guy” at the office –Every browser click has an affect on your business –Reducing Bob-like actions is the job of ProxySG ProxySG provides the ability to: –Advise Bob on Acceptable Use Policies –Coach Bob on best practices and time allocations –Enforce policy to control viruses, spyware, legal liabilities, adverse bandwidth use & reduced productivity

In Control with Blue Coat Keep “good” employees from doing “bad” things on the Internet –Everything web leads to increased risks Blue Coat is #1 proxy appliance leader (IDC) –Custom, object based OS with caching enables wire-speed performance –Shipped more than 20,000 proxy appliances worldwide Do you know what your users are doing on the network? –Find out with a “Web Traffic Assessment” –Plus learn more about Spyware prevention

The Business of IT Applications Delivered over the Network Experienced by Users Challenge: How to Increase Velocity of Application Deployment Across Distributed Enterprise, While Reducing Costs? Challenge: How to Increase Velocity of Application Deployment Across Distributed Enterprise, While Reducing Costs? And Keep it Fast and Safe too!

Full Protocol Termination = Total Visibility & Context (HTTP, HTTPS, IM, Streaming, P2P, SOCKS, FTP, CIFS, MAPI, Telnet, DNS) The Power of the Proxy PROTECT Prevent spyware, malware & viruses Stop DoS attacks IE vulnerabilities, IM threats Ultimate Control Point for Web Communications ACCELERATE Multiprotocol Accelerated Caching Hierarchy (MACH) BW Shaping, Compression, Protocol Optimization Sequence, Object & Predictive Caching + CONTROL Fine-grained policy for applications, protocols, content & users (allow, deny, transform, etc) Granular, flexible logging Authentication integration +

Real World “Power of the Proxy” Problems –Lack of Security and Control of Internet Use –Server ‘overload’ in Data Center –Poor to unusable application performance in branch office Retail Branches Headquarters Proxy Switch Router SwitchRouterFirewall Internet Internal Network Retail Branches Real example of a “webified” business –Over 250 web based applications –Customer Facing – Partner Exchanges – Employee Tools –Streaming / / file / JAVA / XML / etc., (virtually anything Web enabled) Application Servers Proxy

ProxySG Protect. Control. Accelerate. Enterprise Policy Management Technology Partners SGOS™  Object-based OS with Caching Authentication, Authorization, Logging Proxy Custom OS Policy Processing Engine Policy On-Proxy URL Filtering Web Anti-Virus Anti- Spyware Services IM, Streaming & P2P Control Reverse Proxy ProxyAV ISS

Complete Range of Proxy Appliances ProxySG 400 Series ProxySG 800 Series ProxySG 8000 Series Performance Remote Offices Up to 250 users users ,000+ users WAN Throughput Connected Users Up to 15Mbps15Mbps-80Mbps80Mbps Mbps Corporate Headquarters ProxySG 200 Series

Thank You!