Professional Documents
Culture Documents
But Brings
Business
Risks!
Inappropriate Back Door
Use Viruses
Web surfing
Network Abuse Web email
Instant Messenger Instant Messaging
P2P file sharing P2P file sharing
P2P file sharing
Audio/Video Streaming
Spyware
Intranet Public
Web Web
Servers Firewall Servers
Internal Public
Network Internet
Users
Firewalls block Hackers
at the perimeter . . .
Slide 3
Proxy Keep the Good Guys Good
Total Visibility and Control of All Web Communications
Intranet Public
Web Web
Servers Proxy Servers
Firewall
Internal Public
Network Internet
Users
Users
Restrict or control
access to unproductive Control pop-ups, ads,
web sites and spyware
Splash
Prevent
Log and
Restrict
Stop
Keep page
downloading
archive
viruses
intellectual
or for
IM
control
from
Splash page for Control
Stop webpop-ups,
content ads,
acceptable Internet traffic
of copyrighted
access
property byfrom
acceptable
webmail
to individual
unproductive
(Yahoo,
Internet
getting Prevent downloading
of copyrighted
use policy and spyware
such as .vbs, .exe MP3 files
text
MP3
Hotmail,
outmessages
use
web files
over
etc)
policy
sites
IM
and IM
Log and archive IM
Stop web content
traffic by individual
such as .vbs, .exe Stop viruses from Keep intellectual text messages
webmail (Yahoo, property from getting
Hotmail, etc) and IM out over IM
Slide 4
Proxy Appliance for Performance & Security
ISS
Technology
Partners
ProxyAV
Slide 7
Proxy Services
Proxy Support
HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel, IM
(AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
Method-level control options
Content Filtering, Content Security, Spyware Prevention
IM Control, P2P Blocking, Phishing & Pop-up Blocking
Web Virus Scanning with ProxyAV
Streaming Control
Compression (HTTP & TCP/SOCKS)
Bandwidth Management
SSL Termination & Acceleration
Reverse Proxy Mode (Application Acceleration)
Slide 8
Enterprise Policy Management
Set & Visual Policy Manager
Enforce
Policy
Corporate
Web
Policy
Reporter Distribute
Policy
Monitor Director
& Report
Slide 9
Complete Range of Proxy Appliances
Remote
Offices ProxySG 200 Series
Connected
Users Up to 250 users 100-2000 users 1000 - 50,000+ users
Slide 11
Worlds Major Institutions Trust Blue Coat
Financial Health & Pharmaceuticals
Government
Slide 12
META Group: Proxy Appliances Needed
The META Group white paper The Growing Security Threat: Your Employees can be
obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.
Slide 13
Introducing Bob Kent
Slide 14
In Control with Blue Coat
Keep good employees from doing bad
things on the Internet
Everything web leads to increased risks
Blue Coat is #1 proxy appliance leader (IDC)
Custom, object based OS with caching enables
wire-speed performance
Advise, coach and enforce with flexible policy
controls down to the user level
Shipped more than 20,000 proxy appliances
worldwide
Do you know what your employees are doing
on the Internet?
Find out with a Web Traffic Assessment
Plus learn about Spyware prevention
Slide 15