You are on page 1of 16

Visibility. Then Control.

Keep good employees from doing bad things on the Internet

Everything Web
Web Browser Has Become the Universal Interface

But Brings
Business
Risks!
Back Door
Viruses

Inappropriate
Use
Web surfing
Instant Messenger
P2P file sharing

Network Abuse

Web email
Instant Messaging
P2P file sharing

P2P file sharing


Audio/Video Streaming
Spyware

Answer is to control, not just block


Slide 2

Firewalls Keep the Bad Guys Out


Intranet
Web
Servers

Firewall

Internal
Network

Public
Web
Servers
Public
Internet

Users

Firewalls block
at the perimeter . . .

But they are not designed


to control at user level

Slide 3

Hackers

Proxy Keep the Good Guys Good


Total Visibility and Control of All Web Communications
Intranet
Web
Servers

Public
Web
Servers

Proxy
Firewall

Internal
Network

Public
Internet

Users
Users
Restrict or control
access to unproductive
web sites

Splash page for


acceptable Internet
use policy

Stop web content


such as .vbs, .exe

Control pop-ups, ads,


and spyware

Prevent
Log
and
downloading
archive
IM
Restrict
Stop
Splash
Keep
viruses
intellectual
or
page
control
from
for
Control
pop-ups,
ads,
Stop web
content
traffic
of copyrighted
byfrom
individual
access
property
acceptable
webmail
to
unproductive
(Yahoo,
Internet
getting
and
spyware
such as .vbs, .exe
text
MP3
messages
files
Hotmail,
out
use
web
over
etc)
policy
sites
IM
and IM
Stop viruses from
webmail (Yahoo,
Hotmail, etc) and IM

Keep intellectual
property from getting
out over IM
Slide 4

Prevent downloading
of copyrighted
MP3 files

Log and archive IM


traffic by individual
text messages

Proxy Appliance for Performance & Security


Software Proxy Server

Proxy Appliance

Wire-Speed Performance
Scalable
Secure
Easy to Manage
Latest Web Functionality

Low Performance
Poor Scalability
Security Holes
Hard to Manage
Lacking Functionality
Slide 5

Introducing Blue Coat ProxySG

Advise. Coach. Enforce.

Purpose-built proxy appliance providing


granular control with
wire-speed performance
Slide 6

ProxySG

Visibility. Control. Performance.

Enterprise Policy Management

Technology
Partners

ISS

ProxyAV

Services

On-Proxy
URL Filtering

Web
Anti-Virus

AntiSpyware

IM, Streaming
& P2P Control

Reverse
Proxy

Policy

Policy Processing Engine

Proxy

Authentication, Authorization, Logging

Custom OS

SGOS Object-based OS with Caching

Slide 7

Proxy Services
Proxy Support
HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel,
IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
Method-level control options

Content Filtering, Content Security, Spyware Prevention


IM Control, P2P Blocking, Phishing & Pop-up Blocking
Web Virus Scanning with ProxyAV
Streaming Control
Compression (HTTP & TCP/SOCKS)
Bandwidth Management
SSL Termination & Acceleration
Reverse Proxy Mode (Application Acceleration)
Slide 8

Enterprise Policy Management


Set &
Enforce
Policy

Reporter

Corporate
Web
Policy
Monitor
& Report

Slide 9

Visual Policy Manager

Distribute
Policy

Director

Complete Range of Proxy Appliances


ProxySG 8000 Series
Corporate
Headquarters

ProxySG 800 Series

ProxySG 400 Series


Remote
Offices

ProxySG 200 Series

Connected
Users

Up to 250 users

100-2000 users

1000 - 50,000+ users

WAN
Throughput

Up to 15Mbps

15Mbps-80Mbps

80Mbps -300+ Mbps

Performance
Slide 10

Leader in a Growing Market Segment


Worldwide Secure Content Management Appliance
Revenue, 2001-2007 ($M)
1,800

($M)

1,600
1,400
1,200
1,000
800
600

Blue Coat as the fastest growing vendor in


the Secure Content and Application Delivery
market among Cisco, Network Appliance and
Microsoft. Blue Coat achieved 77% yearover-year growth and 30% share of the
market.

400
200
0
2001

2002

2003

2004

2005

2006

2007

Blue Coat #1 Leader with 30% Market Share


Source: IDC - Worldwide Secure Content and Application Delivery 2005-2009 Forecast and Analysis
Slide 11

Worlds Major Institutions Trust Blue Coat


Financial

Energy, Oil & Gas

Health & Pharmaceuticals

Mfg/Industrial

Government

Slide 12

Consumer & Retail

META Group: Proxy Appliances Needed


Establishing a security solution to address the
appropriateness of content and its usage has quickly
become a legitimate business issue, due in part to
productivity, liability, and privacy concerns.
A separate solution focused on user and content control,
ideally based on an appliance platform and a proxy
architecture, will be warranted for most organizations.
Mark Bouchard
Senior Program Director
META Group
The META Group white paper The Growing Security Threat: Your Employees can be

obtained by visiting http://www.bluecoat.com/downloads/whitepapers/security_threat.html.

Slide 13

Introducing Bob Kent


Bob Kent works for Edge Corporation.
Bob is a good employee, but unfortunately likes to
do bad things on the Internet.
Lets see what happens now that Edge Corp has
installed Blue Coat proxy appliances
Free network,
free music,
Oh yah!
-Bob Kent

Visit www.bobkent.net

Visit www.bobkent.info

CARTOON from the left coast


FUN look at web browsing
(for mature audiences only)

Flash Movies & Demos


Spyware Prevention, WebAV,
Reverse Proxy, Original Bob Kent
Slide 14

In Control with Blue Coat


Keep good employees from doing bad
things on the Internet
Everything web leads to increased risks

Blue Coat is #1 proxy appliance leader (IDC)


Custom, object based OS with caching enables
wire-speed performance
Advise, coach and enforce with flexible policy
controls down to the user level
Shipped more than 20,000 proxy appliances
worldwide

Do you know what your employees are doing


on the Internet?
Find out with a Web Traffic Assessment
Plus learn about Spyware prevention
Slide 15

You might also like