Reverse Proxy for Trusted Web Environments > White Paper
|
|
|
- Delilah Lewis
- 10 years ago
- Views:
Transcription
1 > White Paper
2 ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business applications. As a result, growing security concerns, sluggish performance, and increasing complexity are straining existing web server infrastructures. To secure and accelerate web applications, like those from SAP, Oracle, Siebel, Microsoft, and other solutions, organizations turn to Blue Coat for reverse proxy deployments in trusted web environments. Why ProxySG for Reverse Proxy Deployments? Blue Coat ProxySG proxy appliances combine robust security, high performance content delivery, and operational simplicity, allowing organizations to secure and accelerate their web applications to trusted users. Protects Web Servers ProxySG securely isolates general-purpose servers from direct access, acting as an intermediary between web applications and the external clients who attempt to access them. ProxySG provides robust authentication and policy support and can either challenge users or transparently check authentication credentials using an organization s existing security framework. For high-performance, low-latency web threat protection of all uploaded content to web servers, ProxySG integrates with Blue Coat ProxyAV and offers a choice of five leading anti-malware engines. To ensure confidentiality, ProxySG can be configured to encrypt communications between users and web applications using Secure Sockets Layer (SSL). Accelerates Web Content At the heart of the ProxySG for Reverse Proxy solution is SGOS, a secure, object based operating system specifically designed to handle web content and rich media. SGOS combines patented proxy caching technology with an optimized TCP stack for efficient web content acceleration. SGOS s intelligent use of its integrated cache allows 60-90% of an application s web objects to be cached and served directly to users, further enhancing site performance and scalability, and simultaneously offloading web servers. Rich media support includes stream splitting and video on-demand caching, plus bandwidth controls on all proxy services. In addition, SSL services provide hardware-accelerated key negotiation, encryption, and decryption support. Simplifies Operations An integrated, optimized appliance that combines proxy software and hardware, ProxySG is easy to install, configure, and maintain. The Visual Policy Manager (VPM) provides an intuitive, graphical interface to define and manage a wide range of policy rules. Comprehensive logging and reporting provide detailed accounting information, giving administrators the visibility necessary to assess web usage patterns and track security issues, plus meet regulations and policy compliance. ProxySG Reverse Proxy enables organizations to: -> Accelerate delivery of web applications and content through proxy architecture with integrated caching, stream splitting, bandwidth controls, threat analysis of inbound and outbound web content, and a flexible policy language with unmatched user authentication options. 1 < >
3 -> Protect and secure web infrastructure by isolating origin servers from direct Internet access and scaling web farms by off-loading user authentication, SSL tunnels and web content optimization. Plus ProxySG health checks for HTTP, HTTPS, TCP, ICAP and ICMP to monitor web content servers and proxy related devices to alert administrators. -> Secure user access to web applications, such as web , intranet and extranets by acting as an SSL termination / origination point. In addition, ProxySG can also act as an IPv6 web gateway providing IPv6 to IPv4 and IPv4 to IPv6 proxy gateway capabilities. New media NOCs are migrating to IPv6 and ProxySG provides the ability to serve both IPv6 and IPv4 audiences. -> Provide compression support in HTTP to improve the web user experience. The ProxySG can compress or decompress content on the appliance and cache the response in various forms. For example, you can fetch the content in the uncompressed form, and deliver it to client in compressed form. If the content is cacheable, both compressed and uncompressed forms are stored on the ProxySG for future use. The supported compression formats are Gzip and deflate. Similarly, you can fetch compressed content from the origin web server if it provides compressed content, and decompress it on the ProxySG if the client is not capable of handling compressed content. -> Implement granular access policies based on users, groups, time of day, location, network address, user agent, and other attributes to meet unique business requirements. ProxySG has access to over 500 header request and response variables and leverages 40-plus triggers for advanced policy controls. For example, user policy can be enforced requiring certain browsers and/or browser software versions. -> Support load balancing for distribution of traffic to multiple web server farms and clustering of ProxySG appliances for high availability. Enhanced load balancing is also available with a number of partner based solutions. -> Logging per policy rule and exceptions. This is very useful when detecting unknown user agents and numeric hosts on a trusted network environment. The use of the negate option in policy creation allows logging on a policy rule when the element is not part of the approved list for the trusted environment. As a reverse proxy, this provides a white listing policy control. ProxySG also supports custom logging with field selection, custom text and formats within its graphical policy manager for point and click selection of custom logs. -> Provide control of file types, file extensions, true file type checks for masquerading files, the ability to strip and replace active content (Java, Visual Basic, ActiveX), restrict uploads of information, specify user agent types and versions to control client software, header inspection, rewrites and suppression, plus method level controls for HTTP, HTTPS, and FTP. ProxySG provides policy flexibility to header elements beyond typical regex processing for improved performance, plus full URL parsing when required. -> Authenticate clients using existing security framework, including Active Directory (NTLM, Kerberos, LDAP, SSO), edirectory (LDAP, SSO), tokens (SecurID, Safeword), authentication schemes (Oracle COREid, CA Siteminder, x.509 certificates, local password files), credential support (NTLM, Basic, HTTPS Basic, HTML Form, HTTPS HTML Form, Explicit Proxy Auth Pop-up Form), mapping users to traffic (IP addresses, Cookies, Check with Domain Server (SSO)), and supported authentication protocols (LDAP, RADIUS, XML Interface, Sequence of Authentication Realms, Assign failed users to Guest). -> Cache user credentials within its system. Depending on the security needs of the company and the trusted environment, credential cache can be set to store the credentials for any set period of time or flush immediately after use. 2 < >
4 -> Safeguard web infrastructure from malware, worms, and Trojans with real-time anti-malware analysis of all uploaded or downloaded content. ProxyAV integrates with ProxySG via ICAP+ or S-ICAP and leverages a dual intelligent cache design to optimize content analysis for threats. Cacheable objects are analyzed once, served and then cached for subsequent user requests. Any updates to the anti-malware analysis engine signals a new threat analysis cycle for cached objects based on user demand, the object cache is never flushed. Non-cacheable objects are fingerprinted if clean, served and then if seen again with the same fingerprint, they are served directly to users for a faster web experience. Any update to the anti-malware engine refreshes the non-cacheable fingerprint cache. ProxyAV supports six leading anti-malware engines (Kaspersky, McAfee, Sophos, Symantec, Panda and Trend Micro) and analyzes files up to 2GB in size and 99 layers of compression. ProxyAV can even detect masquerading files within compressed archives with Kaspersky or Sophos anti-malware engines. -> Deliver high-performance streaming media to thousands of simultaneous users with streaming proxies. ProxySG supports stream splitting to reduce the load on rich media servers using RTMP, RTSP or MMS, plus HTMLv5. Caching of video on demand provides a one-to-many benefit to ProxySG including RTMP and HTML objects including Flash. Today, users expect a rich media experience and ProxySG can off-load rich media content servers to scale server farms and provide an improved user experience. -> Gain visibility using Blue Coat Reporter to aggregate log files from multiple ProxySG devices for visibility and trending of Reverse Proxy utilization, threat detection from ProxyAV, user/group profile analysis, streaming and video usage, plus denied access attempts and custom logging. Reporter provides role-based access via Active Directory inheritance, custom dashboards and reports per reporting user, and the ability to schedule and deliver both standard and custom reports on a regular basis. -> Offload webserver traffic, reducing infrastructure costs while providing control, protection, and performance. ProxySG appliances are easily configured for reverse proxy mode and tuned for the workload of high traffic websites. IT administrators can use ProxySG to efficiently scale their web farms to address flash or peak periods of traffic, leveraging advanced features, such as content acceleration, compression, protection against Denial-of-Service attacks, and optional stream splitting and caching. Administrators can also use ProxySG to implement a scalable and secured web portal by front-ending web applications such as corporate web (e.g., Outlook Web Access, Lotus Domino, SharePoint) and web-based business applications (e.g., Siebel, Oracle, SAP). For added security, ProxySG can originate and terminate SSL-encrypted sessions between web applications and users. This allows organizations to secure actions such as authentication and message review on both sides of the data stream. To prevent subsequent users to a particular kiosk or workstation from accessing a previous user s account, ProxySG can be configured to erase cached authentication cookies. For added protection, ProxySG for Reverse Proxy solution can be configured to automatically time out after a specified period of inactivity, enabling administrators to strengthen secure access from public networks. Blue Coat ProxySG is the leading proxy appliance for securing and accelerating web applications in trusted environments. ProxySG for Reverse Proxy integrates robust web server protection and accelerated web content delivery in a scalable, centralized proxy architecture that simplifies operations while significantly enhancing network performance. 3 < >
5 Key Features and Benefits: Protects Web Servers -> Securely isolates general-purpose servers from direct access. -> Built on SGOS, a secure object-based operating system specifically designed to handle web content. ProxySG is FIPS certified, plus Common Criteria EAL2 certified (3 major SGOS versions). -> Controls user access with robust authentication and policy rules. -> Intelligent OS distinguishes between valid and malicious connections to service legitimate users while resisting DoS attacks. Accelerates Web Content -> Optimized TCP stack rapidly serves large amounts of static and dynamic web content. -> Intelligent cache allows 60-90% of an application s web objects to be cached and served directly to users. -> HTTP compression reduces required bandwidth, conserves CPU resources, and delivers previously compressed pages faster. -> Hardware-accelerated SSL processing of key negotiations. -> Streaming proxies provide stream splitting and caching of video on demand to deliver high-performance streams to thousands of simultaneous users. Simplifies Operations -> Set and forget proxy appliance is easy to deploy and manage. -> Integrated appliance eliminates need to install applications or OS patches. -> Scalable solution reduces number of web servers required. -> Intuitive graphical interface simplifies policy rule creation and management. -> Comprehensive logging and reporting provide visibility into web usage patterns and security issues. -> Offloads IT web infrastructure, while adding control, protection, and performance to existing applications. Summary For trusted web environments, ProxySG provides a Reverse Proxy solution rich in authentication options, SSL off-loading, and both object caching and rich media optimization to scale web applications. As users move to tablets and smart phones with access from unknown networks, or their everyday desktop within a company office location, they expect a fast web experience, no delays, available web content and rich media on demand. While virtualization enables new data center economics and scale, the ability to optimize and scale out both traditional web server farms, or virtualized ones, remains a reverse proxy benefit. As SSL growth continues due to remote access with mobile workers, ProxySG scales out SSL performance to off-load web server infrastructure. ProxySG as a reverse proxy within a DMZ using a secure proprietary OS provides a safer footprint and keeps web origin servers safely protected inside a network and out of harm s way. Web-based business applications, collaboration solutions, web-based , and online training or live media all benefit from ProxySG as a Reverse Proxy. 4 < >
6 Blue Coat Systems, Inc BCOAT Direct Fax Copyright 2011 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter and BlueTouch are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.wp-reverse-proxy-trusted-web-environments-v1-1011
Web Application Firewall for Untrusted Web Environments > White Paper
> White Paper ProxySG Web Application Firewall Web-based solutions are being implemented for nearly every aspect of business operations, and these are increasingly under attack within public web access
Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?
Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible
WAN Optimization for Microsoft SharePoint BPOS >
White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
ProxySG ICAP Integration
ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.
ProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
LDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
ProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
ProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Cisco ACE 4710 Application Control Engine
Data Sheet Cisco ACE 4710 Application Control Engine Product Overview The Cisco ACE 4710 Application Control Engine (Figure 1) belongs to the Cisco ACE family of application switches, used to increase
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
Reverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
Blue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Securing and Optimizing the Next Generation Branch Office
Securing and Optimizing the Next Generation Branch Office 1 Global Organizations Current state of affairs 3 Globally distributed enterprises rely on the WAN for day to day operations to stay competitive
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Blue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,
Deliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
BlueCoat s Guide to Authentication V1.0
BlueCoat s Guide to Authentication V1.0 Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service names are
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Deploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
Downloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
Secure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
Barracuda Load Balancer Online Demo Guide
Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS
SECURING NETWEAVER DEPLOYMENTS A RSACCESS WHITE PAPER SECURING NETWEAVER DEPLOYMENTS 1 Introduction 2 NetWeaver Deployments 3 Safe-T RSAccess Overview 4 Securing NetWeaver Deployments with Safe-T RSAccess
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0
APPLICATION READY NETWORK GUIDE ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0 Comprehensive Application Ready infrastructure that enhances the security, availability, and performance of Oracle s Siebel deployments
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Blue Coat ProxySG Authentication Guide. SGOS 6.5.x
Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise
KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure
KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >
White Paper Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > Table of Contents INTRODUCTION................................................... 2 SOLUTION ARCHITECTURE.........................................
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
Microsoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Mobile Access R75.40. Administration Guide. 13 August 2012. Classification: [Protected]
Mobile Access R75.40 Administration Guide 13 August 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
How To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2
Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2 Cisco Adaptive Security Device Manager (ASDM) delivers world-class security management and monitoring
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Malware Prevention with Blue Coat Proxies
Malware Prevention with Blue Coat Proxies Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is a portmanteau of the words "malicious" and "software".
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Secure Web Gateway 11.5 Release Notes
Trustwave is pleased to announce the release of Secure Web Gateway version 11.5. Review the Release Notes below for further information. Contents New Features... 1 General Enhancements and Bug Fixes...
Stingray Traffic Manager Sizing Guide
STINGRAY TRAFFIC MANAGER SIZING GUIDE 1 Stingray Traffic Manager Sizing Guide Stingray Traffic Manager version 8.0, December 2011. For internal and partner use. Introduction The performance of Stingray
February 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Secure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
Intelligent, Scalable Web Security
Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler
Data Sheet. VLD 500 A Series Viaedge Load Director. VLD 500 A Series: VIAEDGE Load Director
Data Sheet VLD 500 A Series Viaedge Load Director VLD 500 A Series: VIAEDGE Load Director VLD : VIAEDGE Load Director Key Advantages: Server Load Balancing for TCP/UDP based protocols. Server load balancing
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
