Transcript Document
Visibility. Then Control. Keep good employees from doing bad things on the Internet Everything Web Web Browser Has Become the Universal Interface But Brings Business Risks! Back Door Viruses Inappropriate Use Web surfing Instant Messenger P2P file sharing Network Abuse Web email Instant Messaging P2P file sharing P2P file sharing Audio/Video Streaming Spyware Answer is to control, not just block Slide 2 Firewalls Keep the Bad Guys Out Intranet Web Servers Firewall Internal Network Public Web Servers Public Internet Users Firewalls block at the perimeter . . . But they are not designed to control at user level Slide 3 Hackers Proxy Keep the Good Guys Good Total Visibility and Control of All Web Communications Intranet Web Servers Public Web Servers Proxy Firewall Internal Network Public Internet Users Users Restrict or control access to unproductive web sites “Splash page” for acceptable Internet use policy Stop web content such as .vbs, .exe Control pop-ups, ads, and spyware Prevent Log and downloading archive IM Restrict Stop “Splash Keep viruses intellectual or page” control from for Control pop-ups, ads, Stop web content traffic of copyrighted byfrom individual access property acceptable webmail to unproductive (Yahoo, Internet getting and spyware such as .vbs, .exe text MP3 messages files Hotmail, out use web over etc) policy sites IM and IM Stop viruses from webmail (Yahoo, Hotmail, etc) and IM Keep intellectual property from getting out over IM Slide 4 Prevent downloading of copyrighted MP3 files Log and archive IM traffic by individual text messages Proxy Appliance for Performance & Security Software Proxy Server • • • • • Proxy Appliance Wire-Speed Performance Scalable Secure Easy to Manage Latest Web Functionality Low Performance Poor Scalability Security Holes Hard to Manage Lacking Functionality Slide 5 Introducing Blue Coat ProxySG Advise. Coach. Enforce. Purpose-built proxy appliance providing granular control with wire-speed performance Slide 6 ProxySG Visibility. Control. Performance. Enterprise Policy Management Technology Partners ISS ProxyAV Services On-Proxy URL Filtering Web Anti-Virus AntiSpyware IM, Streaming & P2P Control Reverse Proxy Policy Policy Processing Engine Proxy Authentication, Authorization, Logging Custom OS SGOS™ Object-based OS with Caching Slide 7 Proxy Services • Proxy Support – HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime – Method-level control options • • • • • • • • Content Filtering, Content Security, Spyware Prevention IM Control, P2P Blocking, Phishing & Pop-up Blocking Web Virus Scanning with ProxyAV Streaming Control Compression (HTTP & TCP/SOCKS) Bandwidth Management SSL Termination & Acceleration Reverse Proxy Mode (Application Acceleration) Slide 8 IM Enterprise Policy Management Set & Enforce Policy Reporter Corporate Web Policy Monitor & Report Slide 9 Visual Policy Manager Distribute Policy Director Complete Range of Proxy Appliances ProxySG 8000 Series Corporate Headquarters ProxySG 800 Series ProxySG 400 Series Remote Offices ProxySG 200 Series Connected Users Up to 250 users 100-2000 users 1000 - 50,000+ users WAN Throughput Up to 15Mbps 15Mbps-80Mbps 80Mbps -300+ Mbps Performance Slide 10 Leader in a Growing Market Segment Worldwide Secure Content Management Appliance Revenue, 2001-2007 ($M) 1,800 ($M) 1,600 1,400 1,200 1,000 800 600 Blue Coat as the fastest growing vendor in the Secure Content and Application Delivery market among Cisco, Network Appliance and Microsoft. Blue Coat achieved 77% yearover-year growth and 30% share of the market. 400 200 0 2001 2002 2003 2004 2005 2006 2007 Blue Coat #1 Leader with 30% Market Share Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis Slide 11 World’s Major Institutions Trust Blue Coat Financial Energy, Oil & Gas Health & Pharmaceuticals Mfg/Industrial Government Slide 12 Consumer & Retail META Group: Proxy Appliances Needed “Establishing a security solution to address the appropriateness of content and its usage has quickly become a legitimate business issue, due in part to productivity, liability, and privacy concerns. A separate solution focused on user and content control, ideally based on an appliance platform and a proxy architecture, will be warranted for most organizations.” Mark Bouchard Senior Program Director META Group The META Group white paper “The Growing Security Threat: Your Employees” can be obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html. Slide 13 Introducing Bob Kent • Bob Kent works for Edge Corporation. • Bob is a “good” employee, but unfortunately likes to do “bad” things on the Internet. • Let’s see what happens now that Edge Corp has installed Blue Coat proxy appliances … “Free network, free music, Oh yah!” -Bob Kent Visit www.bobkent.net Visit www.bobkent.info CARTOON from the left coast FUN look at web browsing (for mature audiences only) Flash Movies & Demos Spyware Prevention, WebAV, Reverse Proxy, Original Bob Kent Slide 14 In Control with Blue Coat • Keep “good” employees from doing “bad” things on the Internet – Everything web leads to increased risks • Blue Coat is #1 proxy appliance leader (IDC) – Custom, object based OS with caching enables wire-speed performance – Advise, coach and enforce with flexible policy controls down to the user level – Shipped more than 20,000 proxy appliances worldwide • Do you know what your employees are doing on the Internet? – Find out with a “Web Traffic Assessment” – Plus learn about Spyware prevention Slide 15