Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 16

Visibility. Then Control.

Keep good employees from doing bad things on the Internet


Everything Web
Web Browser Has Become the Universal Interface

But Brings
Business
Risks!
Inappropriate Back Door
Use Viruses
Web surfing
Network Abuse Web email
Instant Messenger Instant Messaging
P2P file sharing P2P file sharing
P2P file sharing
Audio/Video Streaming
Spyware

Answer is to control, not just block


Slide 2
Firewalls  Keep the Bad Guys Out

Intranet Public
Web Web
Servers Firewall Servers

Internal Public
Network Internet

Users
Firewalls block Hackers

at the perimeter . . .

But they are not designed


to control at user level

Slide 3
Proxy  Keep the Good Guys Good
Total Visibility and Control of All Web Communications
Intranet Public
Web Web
Servers Proxy Servers
Firewall
Internal Public
Network Internet
Users
Users

Restrict or control
access to unproductive Control pop-ups, ads,
web sites and spyware

Prevent
Log and
Restrict
Stop
“Splash
Keep downloading
archive
viruses
intellectual
or
page” IM
control
from
for
Control pop-ups,
Stop web content ads,
“Splash page” for
traffic
of copyrighted
access
property
webmailbyfrom
acceptable
to individual
unproductive
(Yahoo,
Internet
getting Prevent downloading
acceptable Internet
andasspyware
such .vbs, .exe of copyrighted

textMP3
messages
files
use policy MP3 files
Hotmail,
out
use
web over
etc)
policy
sitesIM
and IM
Log and archive IM
Stop web content
traffic by individual
such as .vbs, .exe Stop viruses from Keep intellectual text messages
webmail (Yahoo, property from getting
Hotmail, etc) and IM out over IM

Slide 4
Proxy Appliance for Performance & Security

Software Proxy Server Proxy Appliance

• Low Performance  Wire-Speed Performance


• Poor Scalability  Scalable
• Security Holes  Secure
• Hard to Manage  Easy to Manage
• Lacking Functionality  Latest Web Functionality
Slide 5
Introducing Blue Coat ProxySG

Advise. Coach. Enforce.

Purpose-built proxy appliance providing


granular control with
wire-speed performance
Slide 6
ProxySG Visibility. Control. Performance.

Enterprise Policy Management

ISS
Technology
Partners

ProxyAV

On-Proxy Web Anti- IM, Streaming Reverse


Services URL Filtering Anti-Virus Spyware & P2P Control Proxy

Policy Policy Processing Engine


Proxy Authentication, Authorization, Logging
Custom OS SGOS™  Object-based OS with Caching

Slide 7
Proxy Services
• Proxy Support
– HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel,
IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
– Method-level control options
• Content Filtering, Content Security, Spyware Prevention
• IM Control, P2P Blocking, Phishing & Pop-up Blocking
• Web Virus Scanning with ProxyAV
• Streaming Control
• Compression (HTTP & TCP/SOCKS)
• Bandwidth Management
• SSL Termination & Acceleration
• Reverse Proxy Mode (Application Acceleration)

Slide 8
Enterprise Policy Management
Set & Visual Policy Manager
Enforce
Policy

Corporate
Web
Policy
Reporter Distribute
Policy
Monitor Director
& Report

Slide 9
Complete Range of Proxy Appliances

ProxySG 8000 Series


Corporate
Headquarters

ProxySG 800 Series

ProxySG 400 Series

Remote
Offices ProxySG 200 Series

Connected
Users Up to 250 users 100-2000 users 1000 - 50,000+ users

WAN Up to 15Mbps 15Mbps-80Mbps 80Mbps -300+ Mbps


Throughput
Performance
Slide 10
Leader in a Growing Market Segment

Worldwide Secure Content Management Appliance


Revenue, 2001-2007 ($M)
1,800
1,600 Blue Coat as the fastest growing vendor in
the Secure Content and Application Delivery
1,400
market among Cisco, Network Appliance and
1,200 Microsoft.  Blue Coat achieved 77% year-
($M)

1,000 over-year growth and 30% share of the


800 market.
600
400
200
0
2001 2002 2003 2004 2005 2006 2007

Blue Coat #1 Leader with 30% Market Share


Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis

Slide 11
World’s Major Institutions Trust Blue Coat
Financial Health & Pharmaceuticals

Energy, Oil & Gas Mfg/Industrial Consumer & Retail


                                                                                                                    

Government

Slide 12
META Group: Proxy Appliances Needed

“Establishing a security solution to address the


appropriateness of content and its usage has quickly
become a legitimate business issue, due in part to
productivity, liability, and privacy concerns.
A separate solution focused on user and content control,
ideally based on an appliance platform and a proxy
architecture, will be warranted for most organizations.”
Mark Bouchard
Senior Program Director
META Group

The META Group white paper “The Growing Security Threat: Your Employees” can be
obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.

Slide 13
Introducing Bob Kent

• Bob Kent works for Edge Corporation.


• Bob is a “good” employee, but unfortunately likes to
do “bad” things on the Internet.
• Let’s see what happens now that Edge Corp has
installed Blue Coat proxy appliances …
“Free network,
free music,
Oh yah!”
-Bob Kent

Visit www.bobkent.net Visit www.bobkent.info


CARTOON from the left coast Flash Movies & Demos
FUN look at web browsing Spyware Prevention, WebAV,
(for mature audiences only) Reverse Proxy, Original Bob Kent

Slide 14
In Control with Blue Coat
• Keep “good” employees from doing “bad” things on the
Internet
– Everything web leads to increased risks
• Blue Coat is #1 proxy appliance leader (IDC)
– Custom, object based OS with caching enables wire-speed
performance
– Advise, coach and enforce with flexible policy controls down to
the user level
– Shipped more than 20,000 proxy appliances worldwide
• Do you know what your employees are doing on the
Internet?
– Find out with a “Web Traffic Assessment”
– Plus learn about Spyware prevention

Slide 15

You might also like