Professional Documents
Culture Documents
Everything Web
Web Browser Has Become the Universal Interface
But Brings
Business
Risks!
Back Door
Viruses
Inappropriate
Use
Web surfing
Instant Messenger
P2P file sharing
Network Abuse
Web email
Instant Messaging
P2P file sharing
Firewall
Internal
Network
Public
Web
Servers
Public
Internet
Users
Firewalls block
at the perimeter . . .
Slide 3
Hackers
Public
Web
Servers
Proxy
Firewall
Internal
Network
Public
Internet
Users
Users
Restrict or control
access to unproductive
web sites
Prevent
Log
and
downloading
archive
IM
Restrict
Stop
Splash
Keep
viruses
intellectual
or
page
control
from
for
Control
pop-ups,
ads,
Stop web
content
traffic
of copyrighted
byfrom
individual
access
property
acceptable
webmail
to
unproductive
(Yahoo,
Internet
getting
and
spyware
such as .vbs, .exe
text
MP3
messages
files
Hotmail,
out
use
web
over
etc)
policy
sites
IM
and IM
Stop viruses from
webmail (Yahoo,
Hotmail, etc) and IM
Keep intellectual
property from getting
out over IM
Slide 4
Prevent downloading
of copyrighted
MP3 files
Proxy Appliance
Wire-Speed Performance
Scalable
Secure
Easy to Manage
Latest Web Functionality
Low Performance
Poor Scalability
Security Holes
Hard to Manage
Lacking Functionality
Slide 5
ProxySG
Technology
Partners
ISS
ProxyAV
Services
On-Proxy
URL Filtering
Web
Anti-Virus
AntiSpyware
IM, Streaming
& P2P Control
Reverse
Proxy
Policy
Proxy
Custom OS
Slide 7
Proxy Services
Proxy Support
HTTP, HTTPS, FTP, P2P, Telnet, SOCKS, DNS, TCP-Tunnel,
IM (AIM, MSN, Yahoo!), MMS, RTSP, QuickTime
Method-level control options
Reporter
Corporate
Web
Policy
Monitor
& Report
Slide 9
Distribute
Policy
Director
Connected
Users
Up to 250 users
100-2000 users
WAN
Throughput
Up to 15Mbps
15Mbps-80Mbps
Performance
Slide 10
($M)
1,600
1,400
1,200
1,000
800
600
400
200
0
2001
2002
2003
2004
2005
2006
2007
Mfg/Industrial
Government
Slide 12
Slide 13
Visit www.bobkent.net
Visit www.bobkent.info