Presentation is loading. Please wait.

Presentation is loading. Please wait.

Visibility. Then Control

Similar presentations


Presentation on theme: "Visibility. Then Control"— Presentation transcript:

1 Visibility. Then Control
Visibility. Then Control. Keep good employees from doing bad things on the Internet Copyright © 2005 Blue Coat Systems, Inc. Presentation updated July 2005. Speaker notes are provided for key points, analogies and background information. Please send any questions about this presentation to

2 Web Browser Has Become the Universal Interface
Everything Web Web Browser Has Become the Universal Interface But Brings Business Risks! Inappropriate Use Back Door Viruses Network Abuse Web Instant Messaging P2P file sharing Web surfing Instant Messenger P2P file sharing Every web browser action affects your business. More and more jobs require Internet access, and more opportunities exist for inappropriate use, decreased network availability, and back doors for viruses and malicious code. Traditional network security defenses are polar, they accept or block content. Granular control is a new option, providing the benefits of a new technology to remove the risks. P2P file sharing Audio/Video Streaming Spyware Answer is to control, not just block

3 Firewalls  Keep the Bad Guys Out
Intranet Web Servers Public Web Servers Firewall Internal Network Public Internet Hackers But they are not designed to control at user level Users Firewalls block at the perimeter . . . Firewalls provide network security and often leave Port 80 for web traffic open. What was once the “World Wide Wait” is now the “World Wide Water Cooler” with opportunities and threats woven together. User level control with granular policies for content is the new security challenge.

4 Proxy  Keep the Good Guys Good
Total Visibility and Control of All Web Communications Intranet Web Servers Public Web Servers Proxy Firewall Internal Network Public Internet Users Users Restrict or control access to unproductive web sites Control pop-ups, ads, and spyware Restrict or control access to unproductive web sites Stop viruses from webmail (Yahoo, Hotmail, etc) and IM “Splash page” for acceptable Internet use policy Keep intellectual property from getting out over IM Stop web content such as .vbs, .exe Control pop-ups, ads, and spyware Prevent downloading of copyrighted MP3 files Log and archive IM traffic by individual text messages When users are typing away at their computers the opportunities and threats are woven together in an Internet fabric. Users sound busy, however many actions on the Internet are social time sinks, reduce network availability, open back doors and pose legal liabilities. “Splash page” for acceptable Internet use policy Prevent downloading of copyrighted MP3 files Stop web content such as .vbs, .exe Log and archive IM traffic by individual text messages Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Keep intellectual property from getting out over IM

5 Proxy Appliance for Performance & Security
Software Proxy Server Low Performance Poor Scalability Security Holes Hard to Manage Lacking Functionality Proxy Appliance Wire-Speed Performance Scalable Secure Easy to Manage Latest Web Functionality Software-based proxies were the starting point, however continuing innovation has left them behind for many reasons: Lack of performance, scalability, ease of management, and security Unable to handle web applications like streaming, P2P, and Instant Messaging Limited authentication support Significant management costs, deployment difficulties and patch efforts Do not scale to meet today’s enterprise traffic demands Software on top of general purpose file based OS using general purpose PC hardware is not keeping pace. Secure proxy appliances use a high-speed web-object based OS on purpose built hardware for enterprise performance, features and lower TCO.

6 Introducing Blue Coat ProxySG
Advise. Coach. Enforce. ProxySG is our flagship product that gives organizations total visibility and control of all Web communications. 1. Custom built OS, SGOS 2. Designed for object handling, the fundamental element of all Internet content 3. Ability to apply policy in real-time due to patent pending technologies, enabling wire-speed performance 4. Optimized performance by delivering approved, scanned content from an integrated cache ISCA certification means our solution has passed security analysis, vulnerability and intrusion tests, and provides secure administrative options with read-only logs. Because it’s an appliance, it installs easily and requires little on going maintenance. MORE SCRIPT IDEAS Cue up the experience issue early Explain the product briefly Purpose built custom based object OS Wire speed performance Wire speed performance comes from years of developing our web-object based OS that leverages our policy processing and technologies unique to the proxy market…making ProxySG a price/performance leader. Transparency comes from a wide array of proxies, and reliability comes from software based bridging, pass-through network cards, and active-active high availability with 3-tier enterprise management. Unique to ProxySG, central policy management for the six communication types listed exists in ONE management interface, providing tremendous leverage to solve multiple issues with one solution. Partnering with leading Anti-Virus and Content Filtering vendors provides customers “best in class” choices with ProxySG. Many customers choose ProxySG to solve one or two issues knowing the other options are available when required…an architecture to build upon. Purpose-built proxy appliance providing granular control with wire-speed performance

7 ProxySG Visibility. Control. Performance.
Enterprise Policy Management ISS Technology Partners ProxyAV Services On-Proxy URL Filtering Web Anti-Virus Anti- Spyware IM, Streaming & P2P Control Reverse Proxy The ProxySG architecture consists of the following: Purpose-built custom operating system (SGOS) Secure, high-performance foundation built for web-objects with caching and enterprise reliability Secure Proxy with integration across multiple simultaneous authentication systems, and customizable logging options LDAP, RADIUS, NTLM, AD, 2-factor, etc. Transparent proxy implementation – no changes required to clients Only proxy vendor to provide encrypted credentials acquisition for users and admins Policy Process Engine (PPE) that interprets policy to know who, what and when to control Leverages cache of approved or scanned content Advises, coaches and enforces acceptable use policies Security Services for today’s content issues with the ability to expand Content Filtering on ProxySG has a lower TCO, increased performance with cached content, and granular policy controls Web Virus Scanning on ProxySG has a 10x performance improvement and lower TCO than software based solutions IM Control provides enterprise granular policy control for all leading IM vendors (AIM, MSN, Yahoo!) Peer-to-Peer file sharing blocking of traffic and client downloads Pop-Up ad blocking with the ability to accept use for enterprise applications (ex. Outlook Web Access) Technology Partners for a best in class choice of leading vendors Nine Content Filtering URL databases run “on-proxy” Virus Scanning – ProxyAV with McAfee, Kaspersky, Sophos or Panda AV engines Integrated purpose built hardware appliances Performance, Scalability, Ease of management Enterprise Policy Management Policy administration (GUI or CLI), multiple appliance management Director, enterprise Reporter SGOS™  Object-based OS with Caching Authentication, Authorization, Logging Proxy Custom OS Policy Processing Engine Policy

8 Proxy Services Proxy Support
HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime Method-level control options Content Filtering, Content Security, Spyware Prevention IM Control, P2P Blocking, Phishing & Pop-up Blocking Web Virus Scanning with ProxyAV Streaming Control Compression (HTTP & TCP/SOCKS) Bandwidth Management SSL Termination & Acceleration Reverse Proxy Mode (Application Acceleration) This is a summary of proxy services for ProxySG, review our SOLUTIONS presentation for more details.

9 Enterprise Policy Management
Set & Enforce Policy Visual Policy Manager Corporate Web Policy Reporter Visual Policy Manager One interface for all policy controls Device configuration and management Policy development and management GUI or CLI Director Configuration and policy across network of Blue Coat appliances (up to 500) Ability to roll-out, backup and restore previous policies Reporter Reports can be viewed via a browser with options for authentication (LDAP, username/password) and role-based viewing allowing users to view specific reports. Custom reports can be created along with pre-defined reports such as: User Reports – track web user usage patterns regardless of location or application, Show access summaries, blocked sites, accessed by category and more. Network Traffic Reports – measure web traffic performance trends, errors, bandwidth, impact, streaming traffic levels and more. Security Reports – evaluate security risks and track user activity that is potentially dangerous. Quickly determine which users have accessed malicious content and report on activity into and out of firewalls. Instant Messaging Reports – evaluate security risks and track user activity within all major Instant Messaging protocols that may violate company policy or industry regulations. Top Ten Summaries – list top 10 sites accessed, users, categories, content types, and more. Distribute Policy Director Monitor & Report

10 Complete Range of Proxy Appliances
ProxySG 8000 Series Corporate Headquarters ProxySG 800 Series ProxySG 400 Series Remote Offices ProxySG 200 Series Blue Coat provides you a range of proxy appliances to support smaller branch offices on up to the largest enterprise implementations. Each is based on our custom operating system, SGOS, meaning the same comprehensive set of functionality for controlling Web communications is provided in each platform. And, each enables the granular policy enforcement demonstrated today along with wire speed performance with very little maintenance and virtually no patching. Name drop: The entire country of Saudi Arabia is granted Internet access through our proxy appliances. [NOTE: Use Other customers that you are familiar with eg, CompUSA, US Air Force, etc] Connected Users Up to 250 users users ,000+ users WAN Throughput Up to 15Mbps 15Mbps-80Mbps 80Mbps Mbps Performance

11 Leader in a Growing Market Segment
Worldwide Secure Content Management Appliance Revenue, ($M) 2001 2002 2003 2004 2005 2006 2007 200 400 600 800 1,000 1,200 1,400 1,600 1,800 Blue Coat as the fastest growing vendor in the Secure Content and Application Delivery market among Cisco, Network Appliance and Microsoft.  Blue Coat achieved 77% year-over-year growth and 30% share of the market. ($M) Annual report from IDC, Blue Coat has 30% market share…and is the faster growing vendor. Growth curve supports transfer for software based solutions moving to appliances with lower TCO and integrated features. Content continues a high growth curve on the Internet as Spyware, Instant Messaging and P2P file sharing set new records for use & abuse. Blue Coat #1 Leader with 30% Market Share Source: IDC - Worldwide Secure Content and Application Delivery Forecast and Analysis

12 World’s Major Institutions Trust Blue Coat
Financial Health & Pharmaceuticals Energy, Oil & Gas Mfg/Industrial Consumer & Retail                                                                                                                     Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – – for more details. Government

13 META Group: Proxy Appliances Needed
“Establishing a security solution to address the appropriateness of content and its usage has quickly become a legitimate business issue, due in part to productivity, liability, and privacy concerns. A separate solution focused on user and content control, ideally based on an appliance platform and a proxy architecture, will be warranted for most organizations.” Mark Bouchard Senior Program Director META Group The META Group white paper “The Growing Security Threat: Your Employees” can be obtained by visiting

14 Introducing Bob Kent Bob Kent works for Edge Corporation.
Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances … “Free network, free music, Oh yah!” -Bob Kent At Blue Coat, we focus on the security threat from within: your employees. Your users. Some of which are like Bob Kent who works for “Edge Corporation” They are actually considered good employees, but some times do bad things – intentionally or unintentionally - on the Internet. At Edge Corporation, where bob works, the IT manager recently installed a Blue Coat ProxySG. (The #1 proxy appliance and the proxy product of choice according to Gartner). Lets now join Bob, a typical employee not too unlike you and me, and see how his Internet experience has changed… Visit CARTOON from the left coast FUN look at web browsing (for mature audiences only) Visit Flash Movies & Demos Spyware Prevention, WebAV, Reverse Proxy, Original Bob Kent

15 In Control with Blue Coat
Keep “good” employees from doing “bad” things on the Internet Everything web leads to increased risks Blue Coat is #1 proxy appliance leader (IDC) Custom, object based OS with caching enables wire-speed performance Advise, coach and enforce with flexible policy controls down to the user level Shipped more than 20,000 proxy appliances worldwide Do you know what your employees are doing on the Internet? Find out with a “Web Traffic Assessment” Plus learn about Spyware prevention Blue Coat is #1 for many reasons… Increased Internet content and application growth requires granular control beyond blocking Inline performance, transparency and low TCO are market requirements Granular policy control for web communications via the “best in class” secure proxy available today Enterprise reputation with solid customer successes around the globe

16 This is the Blue Coat Systems OVERVIEW presentation as of July 2005.


Download ppt "Visibility. Then Control"

Similar presentations


Ads by Google