Websense Web Filter to Blue Coat WebFilter Migration Guide
|
|
|
- Dwain Watson
- 9 years ago
- Views:
Transcription
1 Websense Web Filter to Blue Coat WebFilter Migration Guide October 2011
2 Websense Web Filter to Blue Coat WebFilter Migration Guide Table of Contents URL Category Map: Websense Web Filter to Blue Coat WebFilter...3 Migration Example...9 Example Policy to Block Executables from Certain Domains...12 Blue Coat's Recommended Web Security Policies...14 This document is designed to assist you in migrating your environment from using Websense Web Filter categories on Blue Coat ProxySG to using Blue Coat WebFilter s categories. The first part of the document contains category mappings to assist you in selecting which Blue Coat mapping to use. In many cases, there is a one to one matching. The second part of the document contains an example on how to migrate from Websense Web Filter categories to Blue Coat WebFilter in our policy engine. During the migration, ProxySG will allow you to run both Websense Web Filter and Blue Coat WebFilter so your web filtering service will not be interrupted during the process. The Recommended Web Security Policies contained in the last part of this guide are suggestions only. When in doubt, we recommend taking a conservative approach. With your migration to Blue Coat WebFilter, you are being backed by Blue Coat s WebPulse cloud service. This is important because of the dynamic and changing landscape with cybercrime. Malware is constantly evolving, so you need a dynamic security strategy that can keep up with the latest Web-based threats. To help protect your Web gateway from sophisticated malware attacks, the WebPulse cloud service leverages real-time URL ratings from a growing community of 70 million users, supports more than 50 languages, integrates multiple threat detection engines and provides more than six billion real-time Web content ratings per day. As soon as Blue Coat WebFilter is enabled, your latest security protection is automatic protecting your network with no requirement software downloads.
3 URL Category Map: Websense Web Filter to Blue Coat WebFilter To start the migration, the first thing that you need to do is review the categories that are being used for policy with the Websense Web Filter categories and map them to the corresponding Blue Coat WebFilter categories. The Websense Master Database is organized into more than 90 URL categories. Websense uses parent categories and some of them may be containers of subcategories. You can find the complete listing and definitions of the categories at this link: The Blue Coat WebFilter is organized into more than 80 URL categories. Blue Coat WebFilter has the ability to rate URLs under 4 different categories. For example, is categorized as For Kids and Entertainment. You can find the complete listing and definitions of the categories at this link: Blue Coat WebFilter also offers a service called Site Review. The purpose of Site Review is to allow Blue Coat customers to check the current database categorization of WebFilter URLs and report sites that they believe are incorrectly categorized. Several Websense WebFilter categories map to more than one Blue Coat category. The table below is meant to help you with making the decision in this mapping exercise. Bold categories denote a Websense parent category. New categories in RED Websense Category Corresponding Blue Coat Notable Differences Migration Recommendations Abortion Abortion Unlike Websense, Blue Coat doesn't distinguish between prolife, pro-choice, or neutral. All sites discussing abortion (pro or con) are categorized as abortion in Blue Coat's filter. Pro-Choice Pro-Life Adult Material Abortion Abortion Adult/Mature Content Adult Content Pornography Websense defines this as sites that display full or partial nudity in a sexual context. Blue Coat defines such sites as pornography. Lingerie and Swimsuit Intimate Apparel/Swimsuit Websense places semi-nudity into their Lingerie and Swimsuit category, Blue Coat places these into the nudity category. Otherwise, the categories are similar. Nudity Sex Sex Education Nudity Pornography Child Pornography Sex Education Websense's definition: Sites that depict or graphically describe sexual acts or activity, including exhibitionism; also sites offering direct links to such sites. Blue Coat categorizes such sites into the Pornography category. If a user wants to block certain abortion sites, but not others, recommendation would be to block the abortion category and allow exceptions for sites that shouldn t be blocked through an allow list. If user wants to block full or partial nudity depicted in a sexual context blocked, use the Blue Coat pornography category. If user wants semi-nudity blocked, but lingerie and swimwear allowed, block nudity category but not Intimate Apparel category. Websense customers that block the Sex category should block the Blue Coat Pornography category.
4 Websense Category Corresponding Blue Coat Notable Differences Migration Recommendations Advocacy Groups Political/Activist Groups Websense's definition: Sites that promote change or reform in public policy, public opinion, social practice, economic activities and relationships. Blue Coat's category is similar but includes political groups or movements. Bandwidth Educational Video Entertainment Video Internet Radio and TV Internet Telephony Peer-to-Peer file sharing Personal Network Storage and Backup Streaming Media Surveillance Viral Video Business and Economy Financial Data and Services Audio/Video Clips Audio/Video Clips Radio/Audio Stream TV/Video Stream Internet Telephony Peer to Peer Online Storage Radio/Audio Stream TV/Video Stream Audio/Video Clips TV/Video Stream Audio/Video Clips Business/Economy Financial Services Brokerage/Trading Blue Coat differentiates between Audio and Video categories. Websense's definition: Sites that offer news and quotations on stocks, bonds and other investment vehicles, investment advice, but not online trading. Includes banks, credit unions, credit cards, and insurance. If blocking the Political/Activist category, a customer can allow exceptions to certain Web sites. Use Blue Coat s Financial Services category for Banks, Credit Unions, and Credit cards. Hosted Business Applications Web Applications Blue Coat categorizes sites that offer news and quotations on stocks, bonds and other investment vehicles, investment advice, insurance, and online trading into Brokerage/Trading. Banks, credit unions, and credit cards are classified as Financial Services. Drugs *See notes Illegal drugs fall under the Illegal Drugs category. Prescription drugs fall under the health category. Abused Drugs Illegal Drugs Marijuana Illegal Drugs Websense has a separate category for marijuana. Blue Coat places marijuana in the Illegal Drugs category. Prescribed Medications Supplements and Unregulated Compounds Health Health Use Blue Coat s Brokerage/ Trading category for insurance, online trading, stock, bonds, investments, and investment advice. Use Blue Coat Health category for legal prescription, over the counter medications, and nutrition supplements. Use Blue Coat Illegal Drugs category for Abused Drugs, Marijuana, and questionable substances.
5 Websense Category Corresponding Blue Coat Notable Differences Migration Recommendations Education Cultural Institutions Educational Institutions Educational Materials Reference Materials Entertainment Education Art/Culture Education Education Reference Entertainment MP3 and Audio Download Services Audio/Video Clips Blue Coat's Audio/Video Clips category includes Sites that provide streams or downloads of audio or video clips typically 15 minutes or less in length. This also includes sites that provide downloaders and players for audio and video clips. Extended Protection Dynamic DNS Dynamic DNS Host Elevated Exposure Suspicious Emerging Exploits Hacking Potentially Damaging Content Placeholders WBSN: Sites likely to contain little or no useful content Gambling Games Gambling Games Government Government/Legal Websense's category does not include lawyers, adoption, legal services, and legal reference; Blue Coat's does. Military Political Organizations Military Political/Activist Groups Health Health Websense's Health category does not include prescription drugs, Blue Coat's does. Illegal or Questionable Scam/Questionable/Illegal Blue Coat's category includes educational cheating or related questionable activities. Websense does not make this distinction in their category definition. Information Technology Computer Security Hacking Proxy Avoidance Search Engines/Portals URL Translation Sites Web and Spam Web Collaboration Web Hosting Computers/Internet Computers/Internet Hacking Proxy Avoidance Search Engines/Portals Translation Spam Suspicious Online Meetings Web Hosting If a user wants to allow health sites but block prescription drug sites, they can add prescription drug sites to a block list, or block the health category and allow exceptions. Customers blocking Spam may also want to consider blocking Suspicious.
6 Websense Category Corresponding Blue Coat Notable Differences Migration Recommendations Internet Communication *See notes Websense's Internet Communication category is a parent category of Web Chat and Web-based . General Organizational Text and Media Messaging Chat/IM Blue Coat's category includes instant messaging sites and sites that support the download of chat and instant messaging clients. Web Chat Job Search Chat/IM Job Search/Careers Militancy and Extremist Violence/Hate/Racism Websense defines the Militancy and Extremist category as sites that provide information about or promote or are sponsored by groups advocating antigovernment beliefs or action. Blue Coat categorizes such sites as Violence/Hate/Racism. Miscellaneous Content Delivery Networks *See sub categories Content Servers Dynamic Content Web Advertisements Websense's Dynamic Content definition is included in Blue Coat's Web Advertisements definition. File Download Servers Software Downloads Image Servers Media Sharing Websense defines their Images Servers category as Web servers whose primary function is to deliver images. Blue Coat categorizes such sites in the Media Sharing category. Images (Media) Not Applicable See notes Websense describes this category as sites ending with image filenames. Blue Coat currently does not have an equivalent category. But such categorization is not necessary under Blue Coat's system since images are categorized based upon the type of image they are. Network Errors Unrated Websense describes this category as sites with hosts that do not resolve to IP addresses. Users that want to block militant and extremist sites should use the Blue Coat Violence/Hate/Racism category. Network errors do not have a need for filtering. This is for proxy reporting and handled through Blue Coat Reporter. Private IP Addresses Unrated Private IP addresses do not have a need for filtering. This is for proxy reporting. Uncategorized Unrated Users should not block the Unrated category, but can make exceptions as needed. News and Media News/Media
7 Websense Category Corresponding Blue Coat Notable Differences Migration Recommendations Alternative Journals Society/Daily Living Art/Culture Websense defines this category as the online equivalent of supermarket tabloids and other fringe publications. Blue Coat typically categorizes these types of publications as Society/ Daily Living or Art/Culture unless there is adult content or nudity involved. Parked Domain Productivity Advertisements Freeware and Software Download Instant Messaging Message Boards and Forums Online Brokerage and Trading Pay-to-Surf Racism and Hate Religion Non-Traditional Religions and Occult and Folklore Traditional Religions Security Bot Networks Keyloggers Malicious Embedded iframe Malicious Embedded Link Malicious Web Sites Phishing and Other Frauds Potentially Unwanted Software Spyware Sucpicious Embedded Link Shopping Internet Auctions Real Estate Social Organizations Professional or Worker Organizations Service and Philanthropic Organizations Social and Affiliation Organizations Society and Lifestyles Placeholders Web Advertisements Software Downloads Chat/IM Newsgroups/Forums Brokerage/Trading Pay to Surf Violence/Hate/Racism Religion Alternative Spirituality/Belief Religion Malicious Sources Malicious Sources Hacking Malicious Sources Malicious Sources Malicious Sources Phishing Potentially Unwanted Software Malicious Sources Malicious Outbound Data/Botnets Suspicious Shopping Auctions Real Estate Charitable Organizations Political/Activist Groups Business/ Economy Charitable Organization Charitable Organization Society/Daily Living Society/Daily Living Blue Coat differentiates between Malware sources and outbound data (call home traffic). Websense's Professional or Worker Organizations and Blue Coat's Political/Activist categories are similar. Blue Coat would also categorize such sites as Business/Economy. Websense customers familiar with the Alternative Journals category should use the Blue Coat Society/ Daily Living and Art/Culture categories. Users can make allowance and blocking exceptions as needed.
8 Websense Category Corresponding Blue Coat Notable Differences Migration Recommendations Alcohol and Tobacco Blogs and Personal Sites Gay or Lesbian or Bisexual Interest Hobbies Personals and Dating Restaurants and Dining Social Networking Alcohol Tobacco Blogs/Personal Pages LGBT Sports/Recreation Personals/Dating Restaurants/Dining/Food Social Networking Blue Coat differentiates between Alcohol and Tobacco. Special Events *See notes Websense defines this category as; sites devoted to a current event that requires a separate categorization. Blue Coat would categorize these based on the type of event. i.e. A sporting event would be classified Sports/ Recreation a concert would be Entertainment, and a religious conference would be Religion. Sports Sport Hunting and Gun Clubs Tasteless Travel Sports/Recreation Sports/Recreation Adult/Mature Content Travel User-Defined *See notes Blue Coat ProxySG also allows users to define their own categories. Vehicles Violence Weapons Vehicles Violence/Hate/Racism Weapons Websense Social Web Control Categories: Facebook, LinkedIn, Twitter, YouTube, Craigslist and WordPress. Categories and Operations: Blue Coat Web Application Policy Engine, 80+ Applications: Note: Websense does not have equivalent categories for the following: Users can add sites to allowed and blocked lists as needed. Informational: is a modifier category only and can be used to select out informational sites from broader categories. For example, sites that provide information about gambling would be categorized as both Gambling and Informational.
9 Migration Example 1. Download BCWF database. Enter Username and Password. Click Download now. Click View Download Status. 2. Take a coffee or tea break. Approximately 20 minutes. Check the Download status. It should be done by now. 3. Check the box to enable BCWF:
10 4. Launch the Visual Policy Manager: 5. Go through each Layer and check the Destination Field for Request URL Category Objects or any Combined Destination Objects as they may contain Category Objects. An example of what your policy might look like:
11 6. For the above example you would right-click AlwaysDeny and choose Edit. 7. Expand Blue Coat to see the available categories. The categories currently enforced for this rule can be seen on the right. Use the category mapping chart in this document to identify the 3rd party category (as seen on the right) and check the box under Blue Coat for the corresponding BCWF category. 8. Do this for each category in the Request URL Category Object. Do this for every rule where Category Objects are used, you only have to check the Destination field. 9. Install the policy when done. You should now be running BCWF and a 3rd party database concurrently. Make sure to test the policy to make sure it works as expected. When you are comfortable with the BCWF categories you can go back into the Visual Policy Manager and remove the check boxes for all the 3rd party categories. If you want to cut over immediately, simply uncheck the 3rd party categories once you have added all the corresponding BCWF categories. 10. Finally, you can disable the 3rd party content filtering database by selecting None:
12 Example of Policy to Block Executables From Certain Domains (see Recommendation #1 Below) 1. In VPM create a new Web Access Layer rule and place it above the Allow Rule: 2. Right click Destination in rule #3 and choose Set New Combined Destination Object. On the lower left select New Request URL Category and add the following categories: 3. Click OK. On the lower left select New Apparent Data Type. Select DOS/Windows Executable and click OK:
13 4. Click on BlockExecutableCategories and click the top Add. Click on Executables and click on the bottom Add: 5. Click OK and then OK. Install the policy.
14 Blue Coat s Recommended Web Security Policies Recommendation #1: (see instructions above) Use policy to block executable content from these categories. This is a blended rule which you would pick the category and the action is block executables. 1. None: In rare incidents there may be URLs that have not been rated in the WebPulse ecosystem. If this is the case, it is important to block executables as a precaution that it is malware content. 2. Adult: Many malware vectors begin with search engines, and many searches for Adult-themed material return links to malware. 3. Open/Mixed Content: Many malware sites use open content servers to host parts of their site, and occasionally their payloads. Legitimate business sites generally don't use these hosts. There are some consumer sites like that use open content servers, so don t block the category outright just block executables. 4. Online Storage: As with Open Content above, many malware sites use OS servers to host parts of their site, which frequently includes payloads. However, many popular (or at least widely used) sites fall into this category: e.g., file sharing sites like megaupload.com and rapidshare.com, and many photo-upload sites. 5. Web Advertisements: There has been a major increase in "malvertising" where major ad networks (including even "name brands" like doubleclick and yieldmanager) get duped into serving malicious ads from affiliate networks. 6. Non-viewable: Similar in threat profile to Web Advertisements. Sites in this category tend to be tracker/ analytics type services, typically serving such "non-viewable" content or small chunks of Javascript; the intent is to track users' visits to sites. 7. Web Hosting: A lot of malware is distributed via subdomains that are created on free or low-cost Web Hosting domains. 8. Software Downloads: Depending on the size of your organization and the autonomy of your users, you may want to use an Allow list approach for domains in this category, and block the rest. This is a great vector for a malware author to target, since the victims are actively looking for software to install making this a risky area. If you block executables, you have a chance to vet what your users are trying to download, and decide if it is safe or not. 9. Content Servers: Unlike sites in the Open Content category, these sites are run by larger, reputable companies and typically are used to store and serve images and videos and not executables. Recommendation #2: We strongly recommend blocking the following categories as we have found through our Web security labs that certain type of Web traffic have a high potential risk of containing some type of malware content. 1. Phishing, Malicious Sources, Malicious Outbound Data/Botnets 2. Pornography, Extreme: There are a lot of sites that include malware content masquerading as Pornography. 3. Hacking: Most of the remaining one-third of masqueraded content as Hacking related ("warez"). 4. Gambling: There are a large number of on-line casino sites that attempt to persuade you to load a malware client on your computer. 5. Suspicious: There is a large spectrum of sites that fall into this category. Many, if not most, of these are part of malware or spam networks.
15 6. Placeholder: These are generally "undead" domains, no longer truly alive and have become "search engine zombies" many with ties to malware networks' search engine optimization schemes. 7. Potentially Unwanted Software: This category includes adware-/spyware-relate and other "borderline" malware. 8. Scam/Questionable/Illegal: Many scammers, whose sites are flagged as Questionable, are also involved in malware-related activities. 9. Proxy Avoidance: If not blocked, then any of the above may be reached. 10. Dynamic DNS Host: This category identifies sites that do Dynamic DNS "hosting" or "aliasing". These sites have been used as "phone home" data sites in many high-profile targeted attacks. Customers should consider blocking all content, not just executables from Dynamic DNS sites. Recommendation #3: Include as much information as possible in the requests to WebPulse : The SG gives you the option of sending malware info; please use it. If you're running with a ProxyAV, and it finds malware in a download, the SG can let WebPulse know about it. This helps keep the whole Blue Coat WebFilter community safer. The SG gives you the option of sending the Full URL; please use it. To get the maximum anti-malware protection from WebPulse, it needs to have the full path and querystring available to it. Recommendation #4: Use Reporter to look for evidence of botnet activity on your network. 1. In addition to the "usual suspects" (Spyware/Malware Source, Spyware/Malware Effects, Suspicious, and Phishing), consider the categories named above as being worth an extra look. 2. Review the amount of "Unrated/None" traffic as an infection indicator: a normal SG customer sees around 90-95% of their traffic rated on ProxySG, so only about 5-10% of their traffic goes to WebPulse for a rating. If you see a lot of unrated traffic coming from a computer on the network, it may be an infected machine trying to "phone home" to a brand-new malware command-and-control domain. Recommendation #5: Many bots attempt to be stealthy by utilizing port 443 for their "phone home" communications to their Command and Control (C&C) servers. There are two steps you can take in your policy to block this sort of traffic: 1. Ensure that SSL protocol is using valid certificates. We recommend blocking SSL that isn't using a valid cert backed by a legitimate authority. We also recommend that you consider blocking SSL traffic to sites using self-signed certs. Any false positives in this traffic would need to be whitelisted. 2. We recommend blocking all non-ssl traffic that attempts to use port 443. Many botnets use custom encryption for their traffic, and this will stop them in their tracks. However, many legitimate apps also use custom encryption over port 443, and so this will generate some false positives, which must be investigated and whitelisted.
16 Blue Coat Systems, Inc BCOAT Direct Fax Copyright 2011 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter and BlueTouch are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.websensewf-to-bcwf-migration-guide-v2c-1011
Internet Content Filter Standard Version 2.0
Version 2.0 Please check the HSE intranet for the most up to date version of this standard http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/ 1.0 Purpose
Internet Content Filter Exemption Request Form
Internet Content Filter Exemption Request Form Version 2.0 This form maybe updated at anytime (without notice) to ensure changes to the HSE Internet Content Filter Standard and/or business practices are
Blue Coat WebFilter >
White Paper Blue Coat WebFilter > Delivering the web access your users want with the control you need Why Dynamic Content Filtering has Become Essential Two billion videos per day are watched on YouTube.
DriveLock Websecurity
Whitepaper DriveLock Websecurity Cloud-based internet security CenterTools Software GmbH 2015 Contents 1 DRIVELOCK WEBSECURITY... 2 1.1 WEBSECURITY CLOUDBASIERTE INTERNETSICHERHEIT... 2 1.2 KONFIGURATION
Why Websense Enterprise Beats SurfControl Web Filter VS
Why Websense Enterprise Beats SurfControl Web Filter VS Websense A Proven Enterprise Solution Founded in 1994, Websense is the world s leading Web filtering provider and is the preferred vendor of the
Downloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Summer 2009 Executive Summary In the summer of 2009, Cascadia Labs performed effectiveness tests on five market-leading
Blue Coat WebPulse TM >
White Paper Blue Coat WebPulse TM > Technical Overview of the WebPulse Collaborative Defense Table of Contents INTRODUCTION 1 BLUE COAT S WEB SECURITY ARCHITECTURE 2 PROACTIVE DEFENSES 2 BLUE COAT WEBFILTER
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
Blue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Configuring Web (HTTP) and File Transfer (FTP) Traffic
CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Bucksgfl Internet Web Filtering Policy
Bucksgfl Internet Web Filtering Introduction The requirement to ensure that children and young people are able to use the internet and related communications technologies appropriately and safely is addressed
Secure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Q4 2008 Executive Summary Companies rely on URL filtering and Web security products to protect their employees,
Configuring Web (HTTP) and File Transfer (FTP) Traffic
CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP
Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity
Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
CyberPatrol SiteSURV Web Filtering User Manual
CyberPatrol SiteSURV Web Filtering User Manual Page 1 Table of Contents Table of Contents Overview... 3 Product Diagram... 3 How it Works... 3 Managing Internet Access... 4 Activating Your Account... 5
BLUE COAT WEBFILTER URL CATEGORIES
BLUE COAT WEBFILTER URL CATEGORIES DATASHEET BCWF CATEGORIES The Blue Coat WebFilter database contains website ratings representing billions of web pages, published in more than 50 languages, and organized
ProxySG TechBrief Downloading & Configuring Web Filter
ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL
MEDIA DEVELOPMENT AUTHORITY OF SINGAPORE REGULATORY OPTIONS TO FACILITATE THE ADOPTION OF INTERNET PARENTAL CONTROLS PUBLIC CONSULTATION
MEDIA DEVELOPMENT AUTHORITY OF SINGAPORE REGULATORY OPTIONS TO FACILITATE THE ADOPTION OF INTERNET PARENTAL CONTROLS PUBLIC CONSULTATION 21 April 2014 1. INTRODUCTION 2. SUBSCRIPTION PROCESS FOR INTERNET
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect
Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
DUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
THE WEBPULSE COLLABORATIVE DEFENSE
WHITEPAPER PROACTIVELY DEFENDING YOUR NETWORK AGAINST MALWARE The ease with which we can access and share information in today s highly connected world is changing everything the way we live our personal
Check Point submitted the SWG-12600 Secure Web Gateway for
Key findings and conclusions: Lab Testing Summary Report September 213 Report 1382 Product Category: Web Security Gateway Vendors/Products Tested: Secure Web Gateway BlueCoat Proxy SG3-5 Appliance Websense
Balancing Social Networking with Network Security Objectives >
Balancing Social Networking with Network Security Objectives > October, 2010 Social Networking is Here to Stay With the explosion of other options for social networking, interaction and collaboration,
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
ITEM NO: 9. Date: 23 October 2013. Executive Member/Reporting Officer:
ITEM NO: 9 Report To: EXECUTIVE CABINET Date: 23 October 2013 Executive Member/Reporting Officer: Subject: Report Summary: Recommendations: Councillor John Taylor- Deputy Executive Leader Councillor Jim
Web Filtering For Branch SRX Series and J Series
APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table
Domains belonging to a domain name registration service or a holder of domain names of unused websites.
Olfeo s list of categories International database Secure / Optimize / Analyze Internet usage Legal Risk Theme Category Description Security Risk Child/Teenage Pornography Counterfeiting and Copyright Infringement
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
ProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
Olfeo's list of categories
Olfeo's list of categories Contents Legal Risk... 3 Security Risk... 5 Adult Content... 6 Risk of Unauthorized Disclosure... 7 Bandwidth... 8 Leisure and Social Activities...9 Education... 11 Consumer
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
Lab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices
Lab Testing Detailed Report DR131118 January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG 900-20 Secure Web Gateway, Proxy Edition Check
Web Application Classification Feature
Web Application Classification Feature PacketShaper 11.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015
Security Report Security Empowers Business DO NOT ENTER Blue Coat Research Maps the Web s Shadiest Neighborhoods September 2015 The Web s Shadiest Neighborhoods KEY FINDINGS There has been an explosion
Policy Guide. Version 6.8.2/Doc Revision: 10/23/15
Policy Guide Version 6.8.2/Doc Revision: 10/23/15 Blue Coat Web Security Service Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Access Control Rules: URL Filtering
The following topics describe how to configure URL filtering for your Firepower System: URL Filtering and Access Control, page 1 Reputation-Based URL Filtering, page 2 Manual URL Filtering, page 5 Limitations
WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES
APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Symantec RuleSpace Data Sheet
OEM URL Categorization Database and Real-time Web Categorization Technology Data Sheet: Security Intelligence OVERVIEW A major challenge today is ensuring a safe web environment for users and companies
NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Director Test Research: David Walkiewicz
7th August 2015 created by Markus Selinger Test: Parental control software for Windows and Mac OS X Those who don't want their children to be exposed to early unattended lessons in the birds and the bees
The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.
Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it
Comprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Security Intelligence Blacklisting
The following topics provide an overview of Security Intelligence, including use for blacklisting and whitelisting traffic and basic configuration. Security Intelligence Basics, page 1 Security Intelligence
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores
Solution Brief Aerohive and OpenDNS Advanced Network Security for Retail Stores Introduction Protecting your retail business requires security for all users and devices connected to the network, regardless
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
GFI WebMonitor 2011. Administration and Configuration Manual
GFI WebMonitor 2011 Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Malware Prevention with Blue Coat Proxies
Malware Prevention with Blue Coat Proxies Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is a portmanteau of the words "malicious" and "software".
Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense
Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
The Value of Managed Security Services > White Paper
> White Paper Executive Summary In today s networked world, being able to connect the right resources to the right opportunities or problems at the right time can give businesses the edge and agility they
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13
McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13 Key: Plain Text = Allowed Categories; Italics = Blocked Categories; Bold
Using PacketShaper to Control Bring Your Own Device Traffic
Blue Coat Systems Using PacketShaper to Control Bring Your Own Device Traffic Tips and Tricks Supporting the BYOD Worldwide Phenomenon Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.
ProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
