Transcript Document

Visibility. Then Control.
Keep good employees from doing bad things on the Internet
Everything Web
Web Browser Has Become the Universal Interface
But Brings
Business
Risks!
Back Door
Viruses
Inappropriate
Use
Web surfing
Instant Messenger
P2P file sharing
Network Abuse
Web email
Instant Messaging
P2P file sharing
P2P file sharing
Audio/Video Streaming
Spyware
Answer is to control, not just block
Slide 2
Firewalls  Keep the Bad Guys Out
Intranet
Web
Servers
Firewall
Internal
Network
Public
Web
Servers
Public
Internet
Users
Firewalls block
at the perimeter . . .
But they are not designed
to control at user level
Slide 3
Hackers
Proxy  Keep the Good Guys Good
Total Visibility and Control of All Web Communications
Intranet
Web
Servers
Public
Web
Servers
Proxy
Firewall
Internal
Network
Public
Internet
Users
Users
Restrict or control
access to unproductive
web sites
“Splash page” for
acceptable Internet
use policy
Stop web content
such as .vbs, .exe
Control pop-ups, ads,
and spyware
Prevent
Log
and
downloading
archive
IM
Restrict
Stop
“Splash
Keep
viruses
intellectual
or
page”
control
from
for
Control
pop-ups,
ads,
Stop web
content
traffic
of copyrighted
byfrom
individual
access
property
acceptable
webmail
to
unproductive
(Yahoo,
Internet
getting
and
spyware
such as .vbs, .exe
text
MP3
messages
files
Hotmail,
out
use
web
over
etc)
policy
sites
IM
and IM
Stop viruses from
webmail (Yahoo,
Hotmail, etc) and IM
Keep intellectual
property from getting
out over IM
Slide 4
Prevent downloading
of copyrighted
MP3 files
Log and archive IM
traffic by individual
text messages
Proxy Appliance for Performance & Security
Software Proxy Server
•
•
•
•
•
Proxy Appliance
 Wire-Speed Performance
 Scalable
 Secure
 Easy to Manage
 Latest Web Functionality
Low Performance
Poor Scalability
Security Holes
Hard to Manage
Lacking Functionality
Slide 5
Introducing Blue Coat ProxySG
Advise. Coach. Enforce.
Purpose-built proxy appliance providing
granular control with
wire-speed performance
Slide 6
ProxySG
Visibility. Control. Performance.
Enterprise Policy Management
Technology
Partners
ISS
ProxyAV
Services
On-Proxy
URL Filtering
Web
Anti-Virus
AntiSpyware
IM, Streaming
& P2P Control
Reverse
Proxy
Policy
Policy Processing Engine
Proxy
Authentication, Authorization, Logging
Custom OS
SGOS™  Object-based OS with Caching
Slide 7
Proxy Services
• Proxy Support
– HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel,
(AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
– Method-level control options
•
•
•
•
•
•
•
•
Content Filtering, Content Security, Spyware Prevention
IM Control, P2P Blocking, Phishing & Pop-up Blocking
Web Virus Scanning with ProxyAV
Streaming Control
Compression (HTTP & TCP/SOCKS)
Bandwidth Management
SSL Termination & Acceleration
Reverse Proxy Mode (Application Acceleration)
Slide 8
IM
Enterprise Policy Management
Set &
Enforce
Policy
Reporter
Corporate
Web
Policy
Monitor
& Report
Slide 9
Visual Policy Manager
Distribute
Policy
Director
Complete Range of Proxy Appliances
ProxySG 8000 Series
Corporate
Headquarters
ProxySG 800 Series
ProxySG 400 Series
Remote
Offices
ProxySG 200 Series
Connected
Users
Up to 250 users
100-2000 users
1000 - 50,000+ users
WAN
Throughput
Up to 15Mbps
15Mbps-80Mbps
80Mbps -300+ Mbps
Performance
Slide 10
Leader in a Growing Market Segment
Worldwide Secure Content Management Appliance
Revenue, 2001-2007 ($M)
1,800
($M)
1,600
1,400
1,200
1,000
800
600
Blue Coat as the fastest growing vendor in
the Secure Content and Application Delivery
market among Cisco, Network Appliance and
Microsoft. Blue Coat achieved 77% yearover-year growth and 30% share of the
market.
400
200
0
2001
2002
2003
2004
2005
2006
2007
Blue Coat #1 Leader with 30% Market Share
Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis
Slide 11
World’s Major Institutions Trust Blue Coat
Financial
Energy, Oil & Gas
Health & Pharmaceuticals
Mfg/Industrial
Government
Slide 12
Consumer & Retail
META Group: Proxy Appliances Needed
“Establishing a security solution to address the
appropriateness of content and its usage has quickly
become a legitimate business issue, due in part to
productivity, liability, and privacy concerns.
A separate solution focused on user and content control,
ideally based on an appliance platform and a proxy
architecture, will be warranted for most organizations.”
Mark Bouchard
Senior Program Director
META Group
The META Group white paper “The Growing Security Threat: Your Employees” can be
obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.
Slide 13
Introducing Bob Kent
• Bob Kent works for Edge Corporation.
• Bob is a “good” employee, but unfortunately likes to
do “bad” things on the Internet.
• Let’s see what happens now that Edge Corp has
installed Blue Coat proxy appliances …
“Free network,
free music,
Oh yah!”
-Bob Kent
Visit www.bobkent.net
Visit www.bobkent.info
CARTOON from the left coast
FUN look at web browsing
(for mature audiences only)
Flash Movies & Demos
Spyware Prevention, WebAV,
Reverse Proxy, Original Bob Kent
Slide 14
In Control with Blue Coat
• Keep “good” employees from doing “bad”
things on the Internet
– Everything web leads to increased risks
• Blue Coat is #1 proxy appliance leader (IDC)
– Custom, object based OS with caching enables
wire-speed performance
– Advise, coach and enforce with flexible policy
controls down to the user level
– Shipped more than 20,000 proxy appliances
worldwide
• Do you know what your employees are doing
on the Internet?
– Find out with a “Web Traffic Assessment”
– Plus learn about Spyware prevention
Slide 15