You are on page 1of 16

Visibility. Then Control.

Keep good employees from doing bad things on the Internet


Everything Web
Web Browser Has Become the Universal Interface

But Brings
Business
Risks!
Inappropriate Back Door
Use Viruses
Web surfing
Network Abuse Web email
Instant Messenger Instant Messaging
P2P file sharing P2P file sharing
P2P file sharing
Audio/Video Streaming
Spyware

Answer is to control, not just block


Slide 2
Firewalls Keep the Bad Guys Out

Intranet Public
Web Web
Servers Firewall Servers

Internal Public
Network Internet

Users
Firewalls block Hackers

at the perimeter . . .

But they are not designed


to control at user level

Slide 3
Proxy Keep the Good Guys Good
Total Visibility and Control of All Web Communications
Intranet Public
Web Web
Servers Proxy Servers
Firewall
Internal Public
Network Internet
Users
Users

Restrict or control
access to unproductive Control pop-ups, ads,
web sites and spyware

Splash
Prevent
Log and
Restrict
Stop
Keep page
downloading
archive
viruses
intellectual
or for
IM
control
from
Splash page for Control
Stop webpop-ups,
content ads,
acceptable Internet traffic
of copyrighted
access
property byfrom
acceptable
webmail
to individual
unproductive
(Yahoo,
Internet
getting Prevent downloading
of copyrighted
use policy and spyware
such as .vbs, .exe MP3 files
text
MP3
Hotmail,
outmessages
use
web files
over
etc)
policy
sites
IM
and IM
Log and archive IM
Stop web content
traffic by individual
such as .vbs, .exe Stop viruses from Keep intellectual text messages
webmail (Yahoo, property from getting
Hotmail, etc) and IM out over IM

Slide 4
Proxy Appliance for Performance & Security

Software Proxy Server Proxy Appliance

Low Performance Wire-Speed Performance


Poor Scalability Scalable
Security Holes Secure
Hard to Manage Easy to Manage
Lacking Functionality Latest Web Functionality
Slide 5
Introducing Blue Coat ProxySG

Advise. Coach. Enforce.

Purpose-built proxy appliance providing


granular control with
wire-speed performance
Slide 6
ProxySG Visibility. Control. Performance.

Enterprise Policy Management

ISS
Technology
Partners

ProxyAV

On-Proxy Web Anti- IM, Streaming Reverse


Services URL Filtering Anti-Virus Spyware & P2P Control Proxy

Policy Policy Processing Engine


Proxy Authentication, Authorization, Logging
Custom OS SGOS Object-based OS with Caching

Slide 7
Proxy Services
Proxy Support
HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, IM
(AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
Method-level control options
Content Filtering, Content Security, Spyware Prevention
IM Control, P2P Blocking, Phishing & Pop-up Blocking
Web Virus Scanning with ProxyAV
Streaming Control
Compression (HTTP & TCP/SOCKS)
Bandwidth Management
SSL Termination & Acceleration
Reverse Proxy Mode (Application Acceleration)

Slide 8
Enterprise Policy Management
Set & Visual Policy Manager
Enforce
Policy

Corporate
Web
Policy
Reporter Distribute
Policy
Monitor Director
& Report

Slide 9
Complete Range of Proxy Appliances

ProxySG 8000 Series


Corporate
Headquarters

ProxySG 800 Series

ProxySG 400 Series

Remote
Offices ProxySG 200 Series

Connected
Users Up to 250 users 100-2000 users 1000 - 50,000+ users

WAN Up to 15Mbps 15Mbps-80Mbps 80Mbps -300+ Mbps


Throughput
Performance
Slide 10
Leader in a Growing Market Segment

Worldwide Secure Content Management Appliance


Revenue, 2001-2007 ($M)
1,800
1,600 Blue Coat as the fastest growing vendor in
1,400 the Secure Content and Application Delivery
market among Cisco, Network Appliance and
1,200 Microsoft. Blue Coat achieved 77% year-
($M)

1,000 over-year growth and 30% share of the


800 market.
600
400
200
0
2001 2002 2003 2004 2005 2006 2007

Blue Coat #1 Leader with 30% Market Share


Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis

Slide 11
Worlds Major Institutions Trust Blue Coat
Financial Health & Pharmaceuticals

Energy, Oil & Gas Mfg/Industrial Consumer & Retail

Government

Slide 12
META Group: Proxy Appliances Needed

Establishing a security solution to address the


appropriateness of content and its usage has quickly
become a legitimate business issue, due in part to
productivity, liability, and privacy concerns.
A separate solution focused on user and content control,
ideally based on an appliance platform and a proxy
architecture, will be warranted for most organizations.
Mark Bouchard
Senior Program Director
META Group

The META Group white paper The Growing Security Threat: Your Employees can be
obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.

Slide 13
Introducing Bob Kent

Bob Kent works for Edge Corporation.


Bob is a good employee, but unfortunately likes to
do bad things on the Internet.
Lets see what happens now that Edge Corp has
installed Blue Coat proxy appliances
Free network,
free music,
Oh yah!
-Bob Kent

Visit www.bobkent.net Visit www.bobkent.info


CARTOON from the left coast Flash Movies & Demos
FUN look at web browsing Spyware Prevention, WebAV,
(for mature audiences only) Reverse Proxy, Original Bob Kent

Slide 14
In Control with Blue Coat
Keep good employees from doing bad
things on the Internet
Everything web leads to increased risks
Blue Coat is #1 proxy appliance leader (IDC)
Custom, object based OS with caching enables
wire-speed performance
Advise, coach and enforce with flexible policy
controls down to the user level
Shipped more than 20,000 proxy appliances
worldwide
Do you know what your employees are doing
on the Internet?
Find out with a Web Traffic Assessment
Plus learn about Spyware prevention
Slide 15

You might also like