Professional Documents
Culture Documents
Visibility. Then Control.: Keep Good Employees From Doing Bad Things On The Internet
Visibility. Then Control.: Keep Good Employees From Doing Bad Things On The Internet
But Brings
Business
Risks!
Inappropriate Back Door
Use Viruses
Web surfing
Network Abuse Web email
Instant Messenger Instant Messaging
P2P file sharing P2P file sharing
P2P file sharing
Audio/Video Streaming
Spyware
Intranet Public
Web Web
Servers Firewall Servers
Internal Public
Network Internet
Users
Firewalls block Hackers
at the perimeter . . .
Slide 3
Proxy Keep the Good Guys Good
Total Visibility and Control of All Web Communications
Intranet Public
Web Web
Servers Proxy Servers
Firewall
Internal Public
Network Internet
Users
Users
Restrict or control
access to unproductive Control pop-ups, ads,
web sites and spyware
Prevent
Log and
Restrict
Stop
“Splash
Keep downloading
archive
viruses
intellectual
or
page” IM
control
from
for
Control pop-ups,
Stop web content ads,
“Splash page” for
traffic
of copyrighted
access
property
webmailbyfrom
acceptable
to individual
unproductive
(Yahoo,
Internet
getting Prevent downloading
acceptable Internet
andasspyware
such .vbs, .exe of copyrighted
textMP3
messages
files
use policy MP3 files
Hotmail,
out
use
web over
etc)
policy
sitesIM
and IM
Log and archive IM
Stop web content
traffic by individual
such as .vbs, .exe Stop viruses from Keep intellectual text messages
webmail (Yahoo, property from getting
Hotmail, etc) and IM out over IM
Slide 4
Proxy Appliance for Performance & Security
ISS
Technology
Partners
ProxyAV
Slide 7
Proxy Services
• Proxy Support
– HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel,
IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
– Method-level control options
• Content Filtering, Content Security, Spyware Prevention
• IM Control, P2P Blocking, Phishing & Pop-up Blocking
• Web Virus Scanning with ProxyAV
• Streaming Control
• Compression (HTTP & TCP/SOCKS)
• Bandwidth Management
• SSL Termination & Acceleration
• Reverse Proxy Mode (Application Acceleration)
Slide 8
Enterprise Policy Management
Set & Visual Policy Manager
Enforce
Policy
Corporate
Web
Policy
Reporter Distribute
Policy
Monitor Director
& Report
Slide 9
Complete Range of Proxy Appliances
Remote
Offices ProxySG 200 Series
Connected
Users Up to 250 users 100-2000 users 1000 - 50,000+ users
Slide 11
World’s Major Institutions Trust Blue Coat
Financial Health & Pharmaceuticals
Government
Slide 12
META Group: Proxy Appliances Needed
The META Group white paper “The Growing Security Threat: Your Employees” can be
obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.
Slide 13
Introducing Bob Kent
Slide 14
In Control with Blue Coat
• Keep “good” employees from doing “bad” things on the
Internet
– Everything web leads to increased risks
• Blue Coat is #1 proxy appliance leader (IDC)
– Custom, object based OS with caching enables wire-speed
performance
– Advise, coach and enforce with flexible policy controls down to
the user level
– Shipped more than 20,000 proxy appliances worldwide
• Do you know what your employees are doing on the
Internet?
– Find out with a “Web Traffic Assessment”
– Plus learn about Spyware prevention
Slide 15