Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.

Slides:



Advertisements
Similar presentations
Deloitte Technology Fast 500 Asia Pacific Winners Accelerating Your Network WACC Technology.
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Visibility. Then Control. Keep good employees from doing bad things on the Internet.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
1 Adding WAN Optimisation to Boost Storage Sales Success Nigel Hawthorn VP EMEA Marketing Blue Coat in a Virtual World.
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
Security and Acceleration - A contradiction in terms? Nigel Hawthorn VP EMEA Marketing.
Blue Coat ® and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
1 Web 2.0 in a Virtualized World: Building an Architecture for Growth Presented by: Lori MacVittie Technical Marketing Manager, Application Services.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
The Business and Technology of Caching-based Services for State Education Networks Mike Lane Cacheflow, Inc. Phone (773)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
Secure your users Accelerate your data.
1 Enabling Secure Internet Access with ISA Server.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Course 201 – Administration, Content Inspection and SSL VPN
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Secure the Web with Blue Coat Stop the Bad. Allow the Good.
Barracuda Load Balancer Server Availability and Scalability.
Visibility – acceleration - security
Hosted by Gain Maximum WAN and LAN Performance Michael Hoch Research Director Aberdeen Group.
ShareTech 2015 Next-Gen UTM.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 WAN Application Acceleration Overview Bob Yee Product Marketing WAN.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Blue Coat Appliances – New HW, new SW, new everything Presented By Harri Kurronen.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
High Performance Web Accelerator WEB INSIGHT AG Product Introduction March – 2007 MONITORAPP Co.,Ltd.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Introducing ProxyClient Stop the Bad. Accelerate the Good. Everywhere. Antti Lahokoski – Sales -
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Security fundamentals Topic 10 Securing the network perimeter.
Microsoft ® Internet Security and Acceleration Server 2006 Beta Technical Overview Steve Lamb Information Security Evangelist
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Web Content Security Unlock the Power of the Web
Networking in the Enterprise
Networking in the Enterprise
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Securing the Network Perimeter with ISA 2004
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Threat Management Gateway
Introducing ProxyClient
Cisco Prime NAM for WAN Optimization Deployment
Ron Carovano Manager, Business Development F5 Networks
Presentation transcript:

Blue Coat Systems Securing and accelerating the Remote office Matt Bennett

The Business of IT Applications Delivered over the Network Experienced by Users Challenge: How to Reliably Deploy Applications Across Distributed Enterprise, While Reducing Costs? Challenge: How to Reliably Deploy Applications Across Distributed Enterprise, While Reducing Costs? And Keep it Fast and Safe too!

Common Themes Application Deployment Velocity –Everything Web (Evolving) –End to end encryption –Ubiquitous Access (application utility infrastructure) –Strategic application platform for all services Distributed Enterprise –Use of the public infrastructure (Emerging) –Business centric Internet based services –Employee / Partner / Customer Access –Lower cost of bandwidth Reducing Cost –Data Center / File Server Consolidation (Maturing) –Operational / License / Infrastructure cost savings

The Power of the Proxy™ PROTECT Prevent spyware, malware & viruses Stop DoS attacks IE vulnerabilities, IM threats Ultimate Control for Application Sessions ACCELERATE Caching BW Shaping, Compression, Protocol Optimization Sequence, Object & Predictive Caching & CONTROL Fine-grained policy for applications, protocols, content & users (allow, deny, transform, etc) Granular, flexible logging Authentication integration & Full Protocol Termination = Total Visibility & Context (HTTP, HTTPS, IM, Streaming, P2P, SOCKS, FTP, CIFS, MAPI, Telnet, DNS)

Expanding the Proxy Solution Internet Datacenter WAN Branch Enterprise Application Servers Public Web Servers Internet Users Sessions Visibility, Control & Acceleration Gateway Proxy Deposits Loans Checking Tellers Loan Agents Investment Advisors Expanded Focus to: All Users & Apps Sessions Visibility, Control & Acceleration Application-Front-End Proxy Branch Office Proxy Branch Office Proxy Head-End Proxy Customers Remote Users

Proxy Solutions for the Distributed Enterprise 1.Get “bad” sessions off the network first Built on Blue Coat Proxy Architecture

#1 Get “Bad” Sessions Off the Network Why? –No business wants viruses, worms, spyware, porn, P2P, MP3s … How? –Policy control and authentication –URL filtering –AV Scanning –Spyware prevention –IM, P2P blocking and control –Next! More session-level knowledge for specific web-apps Internet Datacenter Internal WAN Branch

Proxy Solution for the Distributed Enterprise 1.Get “bad” sessions off the network 2.Keep “good” content local Built on Blue Coat Proxy Architecture

#2 Keep Good Content Local Why? –LAN access will always be better than over the WAN How? –Web (HTTP/FTP) Caching –Secure Web (HTTPS) Caching –Streaming Caching and Splitting –Next! File Services (CIFS) Caching –Next! MAPI Proxy –Next! Byte Caching –Next! More customized application-level caching for specific web-apps Internet Datacenter Internal WAN Branch

Proxy Solution for the Distributed Enterprise 1.Get “bad” sessions off the network 2.Keep “good” content local 3.Maintain control of encrypted sessions Built on Blue Coat Proxy Architecture

#3 Maintain control of encrypted sessions Why? –End-to-end encryption assures information access to authorized personnel only –But end-to-end encryption should not thwart prototection, control and acceleration How? –SSL reverse proxy Internal apps Externally facing apps –4.2! SSL forward proxy Internet apps –Next! SSL forward proxy at branch Internal and Internet apps Internet Datacenter Internal WAN Branch

Proxy Solution for the Distributed Enterprise 1.Get “bad” sessions off the network 2.Keep “good” content local 3.Maintain control of encrypted sessions 4.Prioritize mission-critical sessions Built on Blue Coat Proxy Architecture

#4 Prioritize Mission-Critical Sessions Why? –Can’t allow background sessions to affect sessions that are time- critical How? –4.1! Traffic prioritization –4.1! B/W management –4.1! Prioritization with user and protocol-level knowledge –Next! Integration with network QoS (ToS/DiffServ) systems Internet Datacenter Internal WAN Branch High Priority Teller Transactions Low Priority Background POSTs

Proxy Solution for the Distributed Enterprise 1.Get “bad” sessions off the network 2.Keep “good” content local 3.Maintain control of encrypted sessions 4.Prioritize mission-critical sessions 5.Optimize the traffic on WAN Built on Blue Coat Proxy Architecture

#5 Optimize the Traffic on WAN Why? –Reduce effect of WAN latency and improve end- user response times How? –SSL offload & TCP offload to the branch –Protocol optimizations like HTTP Object Pipelining –4.1! Compression for Enterprise Web Applications and Internet traffic –4.1! Compression for Enterprise Client-Server Applications –Next! Byte Caching –Next! New TCP stack and performance optimizations Internet Datacenter Internal WAN Branch Optimize the traffic that is left on the WAN

Proxy Solution for the Distributed Enterprise 1.Get “bad” sessions off the network 2.Keep “good” content local 3.Maintain control of encrypted sessions 4.Prioritize mission-critical sessions 5.Optimize the traffic on WAN 6.Provide user & application visibility Built on Blue Coat Proxy Architecture

#6 Provide user & application Visibility Why? –Visibility enables action towards issue resolution How? –Director: Centralized management and policy control –Reporter: Detailed logging and reporting w/Reporter –Next! Health monitoring of delivery network w/Director –Next! Session-Level visibility of key metrics Reporter Health Monitoring Session Monitoring Centralized Mgmt Director Visibility Director & VPM

Management – The Big Picture ApplicationActive Sessions Idle Sessions Response Time Protection Level Google100.6 sec Support sec WebPower4546 sec Finance sec Salesforce.com sec Oracle sec Perforce sec Protection Drilldown Encryption Anti-VirusDOSMITMAuth Certificate Validation Anti- Spyware Access Logging Strict Parsing Web Filter 10.0          

Summary The Power of the Proxy –Firewall to protect, Proxy to control Management Consolidation Reporting is key

K9 - Free Free Web Filtering for consumers Download to Windows PCs Supports all 58 Blue Coat WebFilter categories –Dynamic Rating