DUBEX CUSTOMER MEETING

Similar documents
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Threat Containment for Facebook

How To Protect Your Mobile Device From Attack

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Secure Web Gateways Buyer s Guide >

When enterprise mobility strategies are discussed, security is usually one of the first topics

Comprehensive real-time protection against Advanced Threats and data theft

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Ensuring the security of your mobile business intelligence

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Blue Coat WebFilter >

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Parla, Secure Cloud

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Introduction to the Mobile Access Gateway

Codeproof Mobile Security & SaaS MDM Platform

Top 10 Reasons Enterprises are Moving Security to the Cloud

Stop advanced targeted attacks, identify high risk users and control Insider Threats

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Zscaler Internet Security Frequently Asked Questions

Secure , Calendar, Contacts, Tasks, File sharing and Notes across devices

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Configuration Guide BES12. Version 12.2

EndUser Protection. Peter Skondro. Sophos

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Managing Web Security in an Increasingly Challenging Threat Landscape

Cisco Cloud Web Security

Secure Your Mobile Workplace

Content Security: Protect Your Network with Five Must-Haves

Configuration Guide BES12. Version 12.1

Downloading and Configuring WebFilter

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Google Identity Services for work

Move over, TMG! Replacing TMG with Sophos UTM

Simple security is better security Or: How complexity became the biggest security threat

Blue Coat WebPulse TM >

ManageEngine Desktop Central. Mobile Device Management User Guide

The Incident Response Playbook for Android and ios

PULSE SECURE FOR GOOGLE ANDROID

Web Security Gateway Anywhere

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

WildFire. Preparing for Modern Network Attacks

Ensuring the security of your mobile business intelligence

Sophos Mobile Control

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Unified Security, ATP and more

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Systems Manager Cloud Based Mobile Device Management

Intelligent, Scalable Web Security

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Feature List for Kaspersky Security for Mobile

SA Series SSL VPN Virtual Appliances

Deploying iphone and ipad Security Overview

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

What We Do: Simplify Enterprise Mobility

MTP. MTP AirWatch Integration Guide. Release 1.0

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

APPLICATION PROGRAMMING INTERFACE

Workday Mobile Security FAQ

Securing and Optimizing the Next Generation Branch Office

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Zscaler Cloud Web Gateway Test

Readiness Assessments: Vital to Secure Mobility

What s New in Juniper s SSL VPN Version 6.0

Meraki: Introduction to Cloud Networking

Direct or Transparent Proxy?

The Hillstone and Trend Micro Joint Solution

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

Transcription:

DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1

AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2

WEBPULSE 3

GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE First layer of defense Malnet tracking and blocking Dynamic rating, heuristics, sandboxing, exploit analysis Blocking inbound and outbound (call home) threats DEFENSE IN DEPTH Web protection Malware protection SSL inspection Advanced Threat Protection Rich data analytics Advanced correlation GLOBAL INTELLIGENCE NETWORK 75 million enterprise and consumer users Intelligence from 1 billion requests/day Real time updates on new defenses and results to ALL users Blocks 3.3 million threats/day 4

NEGATIVE DAY DEFENSE WITH WEBPULSE ProxyAV Content Analysis System Proxy AV SWG Virtual Appliance K9 PacketShaper Web Security Service Cache Flow Mobile Device Security Service Third Party AWARE INTELLIGENT PROACTIVE 5

MAPPING MALNETS SEARCH ENGINE POISONING MALVERTISING PORN MOBILE PHISHING Content Zero-day Attack and encryption type exploits doesn t don t doesn t matter. matter. Device type doesn t matter. 6

BLOCKING A ZERO-DAY JAVA EXPLOIT New exploit site named ok.aa24.net becomes active New C&C site comes online ok.aa24.net actively distributes malicious executable that uses zero-day Java exploit Infected systems begin communicating with command and control domain 2012 Jan -225 Days April -120 Days Aug 26 0 Day Aug 26 0 Day WebPulse rates as malware source & begins blocking WebPulse rates IP address as suspicious and begins blocking WebPulse automatically blocks all requests to site WebPulse automatically blocks all requests to domain 7

MULTI DIMENSION CATEGORY Blue Coat supports up to 4 categories for a given site Traditional security relies on only 1 category for a given site Society / Living Shopping Entertainment Sports Gambling Adult Content Intimate Apparel Economy Objectionable Economy Sports Social Networking Entertainment Flexible security policy based on multiple categories Accurate policy enforcement from accurate URL description Requires you to pick a category that best describes a site Multiple one-off policies required to manage various use scenario 8

GRANULAR APPLICATION CONTROL Apps are no longer limited to single primary feature ON-OFF approach at app-level cannot support high productivity Granular operation control required to safeguard continuing use of Apps Post Message Upload Pictures Upload Videos Send Message Download Attachment Upload Attachment Login Manage Profile Upload Files 9

GROWING APPLICATION TYPES Seamless policy enforcement across ALL types of applications Robust Category and Operation Architecture m.facebook.com Web Applications Mobile Browser App Native Mobile Apps Consistent Policy Enforcement Consistent Operation Control 10

UNIVERSAL POLICY Corporate HQ Branch Office Remote Workers Mobile Devices WebFilter ProxySG ProxyAV SWG Virtual Appliance Web Security Service Mobile Device Security Service Corporate HQ & Branch Policy Allow YouTube Education Videos for Engineering; Block Entertainment Read Only Facebook & Facebook Mobile App Log All Data Remote worker Policy Log Data When Accessing Corporate Assets Block Uploads on Facebook Contextual Use of Dropbox Allow Box.com BYOD Or Corporate Mobile device Policy Location aware: Apply Corporate Policies on Corporate Network Log Data when Accessing Corporate Assets 11

WEBPULSE: GLOBAL INTELLIGENCE NETWORK WebPulse cloud datacenters Blocks 3.3 million threats per day 12

BLUE COAT CLOUD SERVICE 13

BLUE COAT CLOUD SERVICE GLOBAL COVERAGE Seattle Toronto Chicago New York Santa Clara Virginia Dallas Miami Mexico City London Frankfurt Paris Zurich Milan Madrid Finland Stockholm Israel 30+ Datacenters Coverage across 6 continents Fully meshed/redundant network 99.999% SLA India Hong Kong Seoul Tokyo Singapore Sao Paulo Buenos Aires Johannesburg Sydney Auckland Datacenter deployments as of 1H FY2014 (Oct 2013) 14

DEPLOYMENT OPTIONS IPSec VPN 15

CONSISTENT ENFORCEMENT ACROSS THE GLOBE Policy updates applied to all datacenters Consistent enforcement to all users across all connectivity methods Administrator in any location can update policies Administrator 16

MOBILE DEVICE SECURITY SERVICE 17

MOBILE DEVICE SECURITY SERVICE BENEFITS Security of Blue Coat Cloud Service Route all traffic to Blue Coat Cloud Supports all connection methods including 3G/4G Benefit of WebPulse and 2-stage AV scanning Cloud-based Security Analytics All analysis performed in the cloud Leverage built-in ios VPN profile Android Client App Transparent User Experience No additional login or configuration needed VPN connection established automatically 18

MOBILE DEVICE SECURITY SERVICE SUMMARY Device iphone and ipad ios v5, v6 & v7 Android Devices Android 4.0+ Connection to BC cloud Encrypted IPSec App Controls Web Application Mobile Browser App Native App Operation Control Security WebPulse Negative-Day Defense URL Filtering Real-time Analytics 2-stage AV Reporting Cloud-based On-premise Policy Management Policy Sync 19

MDS HOW IT WORK IPSEC ios/android device establishes IPSec VPN connection All traffic are routed through VPN tunnel IPSec tunnel is supported for all connection types Cellular 3G/4G Home WiFi Hotspot Corp WiFi Mobile device is connected to one of 30+ data centers around the globe Fully meshed cloud service with 99.999% SLA All traffic analyzed by WebPulse Negative-Day Defense Malnet-Awareness Real-time analytics 2-stage AV scanning 20

TRANSPARENT MDS USER EXPERIENCE Transparent experience with no manual user intervention required VPN icon indicates connection to BC Cloud Service 21

CORP-ISSUED MOBILE DEVICE 22

CUSTOMER S VIEW OF MOBILE SECURITY What type of Mobile Security do you use? 54,9% 49,0% 43,1% 33,3% 23,5% 11,8% 2,0% MDM Password Encryption Virtual Desktop VPN Network MDM Other MDM identified as the most common solution to mobile security Reaction to most common concern lost/stolen device Lack of focus on enabling secure use of mobile devices Nemertes Survey: Mobile Security Challenge Emerges 23

VALUE OF MDM AND MOBILE SECURITY Enterprise Mobile Security Requirements Mobile Device Management Loss or theft of device Remote lock/wipe - Enforce user & access control User Authentication - Mobile Device Security Segment/Isolate enterprise app and data Secure Container - Password enforcement Device Profile - Control which Apps are installed Device Profile - Control which Apps can be used - Application Control Control which App operations are enabled - Application Control Protect against malicious links - Real-time Malware Protection Protect against malicious/virus attachments and downloads - Real-time Malware Protection AV Scanning Acceptable Use Policy - URL Filtering 24

SECURITY IMPLICATIONS OF WHITELISTED APPS Top 10 Whitelisted Apps Security Risks Security Solution Malicious URL Virus-embedded image AV scanning Application control Search engine poisoning Unrestricted mobile web apps Malware detection/url filtering Mobile web app control Malware or virus downloads Application control User/group-based app control AV scanning 25

ANDROID MOBILE AGENT Intelligent VPN Client Automatically connect to the nearest datacenter Transparent User Experience Simplicity of an App Designed as an App from the ground up Downloadable from Google Playstore Simple deployment by Mobile Device Management Solution 26

IOS MOBILE AGENT No Client Leverage ios VPN-OnDemand capability Automatically establish VPN connection to nearest data center on demand VPN Profile ios VPN Profile configured to connect to Blue Coat cloud infrastructure Only comprehensive security solution available for ios devices 27

CHALLENGES IN IOS DEVICE SECURITY MDM AND MOBILE SECURITY Comprehensive Mobile Security Leverage built-in IPSec VPN profile Route all mobile traffic to cloud for security analysis Inspect traffic for all use scenarios Leverage ios MDM profile Leading MDM Solution Leverage configuration profile with ios MDM Management from Apple Services including easy enrollment, integration, container, etc Leverage ios MDM profile Only 1 MDM profile can be active at any given time Mobile Security and MDM solutions cannot both be active* * Applies to mobile security solution based on the on-demand IPSec VPN feature 28

No Integration Seamless Integration Ease of MDM Integration IOS MOBILE SECURITY SOLUTION OPTIONS Mobile Security in an App Mobile Security as an App Deploy secure browser app Leverage MDM capability to push Apps Do not address most common use case - use of Apps Easily circumvented Add basic MDM capabilities to Mobile Security offering Sub-par MDM capabilities Cannot support tier-1 MDM solutions Integrate with Bestof-Breed MDM Solution Add MDM features to Mobile Security MDM solution can push mobile security VPN profile to device Leverage full capabilities of tier-1 MDM solution Leverage full mobile security capabilities across all use cases Comprehensive Mobile Security Secure limited use cases Secure all use cases 29

BLUE COAT AND AIRWATCH INTEGRATION MDM & MDS FOR IOS DEVICES First integration of its kind between tier 1 MDM and Web Security vendor Joint engineering effort to develop and design around APIs Best-of-Breed MDM and Mobile Security capabilities Seamless experience from Administrator to end-user 30

SCREEN SHOT - MDM SUPPORT ON MDS Simple pull-down menu to add MDM vendor support to MDS accounts List of supported MDMs to grow with future integration 31

SCREEN SHOT ADDING BLUE COAT MDS TO AIRWATCH ACCOUNT MDS VPN profile available on AirWatch administration page Simple VPN configuration of users/groups to route all traffic to Blue Coat Cloud Service 32

33