DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1
AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2
WEBPULSE 3
GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE First layer of defense Malnet tracking and blocking Dynamic rating, heuristics, sandboxing, exploit analysis Blocking inbound and outbound (call home) threats DEFENSE IN DEPTH Web protection Malware protection SSL inspection Advanced Threat Protection Rich data analytics Advanced correlation GLOBAL INTELLIGENCE NETWORK 75 million enterprise and consumer users Intelligence from 1 billion requests/day Real time updates on new defenses and results to ALL users Blocks 3.3 million threats/day 4
NEGATIVE DAY DEFENSE WITH WEBPULSE ProxyAV Content Analysis System Proxy AV SWG Virtual Appliance K9 PacketShaper Web Security Service Cache Flow Mobile Device Security Service Third Party AWARE INTELLIGENT PROACTIVE 5
MAPPING MALNETS SEARCH ENGINE POISONING MALVERTISING PORN MOBILE PHISHING Content Zero-day Attack and encryption type exploits doesn t don t doesn t matter. matter. Device type doesn t matter. 6
BLOCKING A ZERO-DAY JAVA EXPLOIT New exploit site named ok.aa24.net becomes active New C&C site comes online ok.aa24.net actively distributes malicious executable that uses zero-day Java exploit Infected systems begin communicating with command and control domain 2012 Jan -225 Days April -120 Days Aug 26 0 Day Aug 26 0 Day WebPulse rates as malware source & begins blocking WebPulse rates IP address as suspicious and begins blocking WebPulse automatically blocks all requests to site WebPulse automatically blocks all requests to domain 7
MULTI DIMENSION CATEGORY Blue Coat supports up to 4 categories for a given site Traditional security relies on only 1 category for a given site Society / Living Shopping Entertainment Sports Gambling Adult Content Intimate Apparel Economy Objectionable Economy Sports Social Networking Entertainment Flexible security policy based on multiple categories Accurate policy enforcement from accurate URL description Requires you to pick a category that best describes a site Multiple one-off policies required to manage various use scenario 8
GRANULAR APPLICATION CONTROL Apps are no longer limited to single primary feature ON-OFF approach at app-level cannot support high productivity Granular operation control required to safeguard continuing use of Apps Post Message Upload Pictures Upload Videos Send Message Download Attachment Upload Attachment Login Manage Profile Upload Files 9
GROWING APPLICATION TYPES Seamless policy enforcement across ALL types of applications Robust Category and Operation Architecture m.facebook.com Web Applications Mobile Browser App Native Mobile Apps Consistent Policy Enforcement Consistent Operation Control 10
UNIVERSAL POLICY Corporate HQ Branch Office Remote Workers Mobile Devices WebFilter ProxySG ProxyAV SWG Virtual Appliance Web Security Service Mobile Device Security Service Corporate HQ & Branch Policy Allow YouTube Education Videos for Engineering; Block Entertainment Read Only Facebook & Facebook Mobile App Log All Data Remote worker Policy Log Data When Accessing Corporate Assets Block Uploads on Facebook Contextual Use of Dropbox Allow Box.com BYOD Or Corporate Mobile device Policy Location aware: Apply Corporate Policies on Corporate Network Log Data when Accessing Corporate Assets 11
WEBPULSE: GLOBAL INTELLIGENCE NETWORK WebPulse cloud datacenters Blocks 3.3 million threats per day 12
BLUE COAT CLOUD SERVICE 13
BLUE COAT CLOUD SERVICE GLOBAL COVERAGE Seattle Toronto Chicago New York Santa Clara Virginia Dallas Miami Mexico City London Frankfurt Paris Zurich Milan Madrid Finland Stockholm Israel 30+ Datacenters Coverage across 6 continents Fully meshed/redundant network 99.999% SLA India Hong Kong Seoul Tokyo Singapore Sao Paulo Buenos Aires Johannesburg Sydney Auckland Datacenter deployments as of 1H FY2014 (Oct 2013) 14
DEPLOYMENT OPTIONS IPSec VPN 15
CONSISTENT ENFORCEMENT ACROSS THE GLOBE Policy updates applied to all datacenters Consistent enforcement to all users across all connectivity methods Administrator in any location can update policies Administrator 16
MOBILE DEVICE SECURITY SERVICE 17
MOBILE DEVICE SECURITY SERVICE BENEFITS Security of Blue Coat Cloud Service Route all traffic to Blue Coat Cloud Supports all connection methods including 3G/4G Benefit of WebPulse and 2-stage AV scanning Cloud-based Security Analytics All analysis performed in the cloud Leverage built-in ios VPN profile Android Client App Transparent User Experience No additional login or configuration needed VPN connection established automatically 18
MOBILE DEVICE SECURITY SERVICE SUMMARY Device iphone and ipad ios v5, v6 & v7 Android Devices Android 4.0+ Connection to BC cloud Encrypted IPSec App Controls Web Application Mobile Browser App Native App Operation Control Security WebPulse Negative-Day Defense URL Filtering Real-time Analytics 2-stage AV Reporting Cloud-based On-premise Policy Management Policy Sync 19
MDS HOW IT WORK IPSEC ios/android device establishes IPSec VPN connection All traffic are routed through VPN tunnel IPSec tunnel is supported for all connection types Cellular 3G/4G Home WiFi Hotspot Corp WiFi Mobile device is connected to one of 30+ data centers around the globe Fully meshed cloud service with 99.999% SLA All traffic analyzed by WebPulse Negative-Day Defense Malnet-Awareness Real-time analytics 2-stage AV scanning 20
TRANSPARENT MDS USER EXPERIENCE Transparent experience with no manual user intervention required VPN icon indicates connection to BC Cloud Service 21
CORP-ISSUED MOBILE DEVICE 22
CUSTOMER S VIEW OF MOBILE SECURITY What type of Mobile Security do you use? 54,9% 49,0% 43,1% 33,3% 23,5% 11,8% 2,0% MDM Password Encryption Virtual Desktop VPN Network MDM Other MDM identified as the most common solution to mobile security Reaction to most common concern lost/stolen device Lack of focus on enabling secure use of mobile devices Nemertes Survey: Mobile Security Challenge Emerges 23
VALUE OF MDM AND MOBILE SECURITY Enterprise Mobile Security Requirements Mobile Device Management Loss or theft of device Remote lock/wipe - Enforce user & access control User Authentication - Mobile Device Security Segment/Isolate enterprise app and data Secure Container - Password enforcement Device Profile - Control which Apps are installed Device Profile - Control which Apps can be used - Application Control Control which App operations are enabled - Application Control Protect against malicious links - Real-time Malware Protection Protect against malicious/virus attachments and downloads - Real-time Malware Protection AV Scanning Acceptable Use Policy - URL Filtering 24
SECURITY IMPLICATIONS OF WHITELISTED APPS Top 10 Whitelisted Apps Security Risks Security Solution Malicious URL Virus-embedded image AV scanning Application control Search engine poisoning Unrestricted mobile web apps Malware detection/url filtering Mobile web app control Malware or virus downloads Application control User/group-based app control AV scanning 25
ANDROID MOBILE AGENT Intelligent VPN Client Automatically connect to the nearest datacenter Transparent User Experience Simplicity of an App Designed as an App from the ground up Downloadable from Google Playstore Simple deployment by Mobile Device Management Solution 26
IOS MOBILE AGENT No Client Leverage ios VPN-OnDemand capability Automatically establish VPN connection to nearest data center on demand VPN Profile ios VPN Profile configured to connect to Blue Coat cloud infrastructure Only comprehensive security solution available for ios devices 27
CHALLENGES IN IOS DEVICE SECURITY MDM AND MOBILE SECURITY Comprehensive Mobile Security Leverage built-in IPSec VPN profile Route all mobile traffic to cloud for security analysis Inspect traffic for all use scenarios Leverage ios MDM profile Leading MDM Solution Leverage configuration profile with ios MDM Management from Apple Services including easy enrollment, integration, container, etc Leverage ios MDM profile Only 1 MDM profile can be active at any given time Mobile Security and MDM solutions cannot both be active* * Applies to mobile security solution based on the on-demand IPSec VPN feature 28
No Integration Seamless Integration Ease of MDM Integration IOS MOBILE SECURITY SOLUTION OPTIONS Mobile Security in an App Mobile Security as an App Deploy secure browser app Leverage MDM capability to push Apps Do not address most common use case - use of Apps Easily circumvented Add basic MDM capabilities to Mobile Security offering Sub-par MDM capabilities Cannot support tier-1 MDM solutions Integrate with Bestof-Breed MDM Solution Add MDM features to Mobile Security MDM solution can push mobile security VPN profile to device Leverage full capabilities of tier-1 MDM solution Leverage full mobile security capabilities across all use cases Comprehensive Mobile Security Secure limited use cases Secure all use cases 29
BLUE COAT AND AIRWATCH INTEGRATION MDM & MDS FOR IOS DEVICES First integration of its kind between tier 1 MDM and Web Security vendor Joint engineering effort to develop and design around APIs Best-of-Breed MDM and Mobile Security capabilities Seamless experience from Administrator to end-user 30
SCREEN SHOT - MDM SUPPORT ON MDS Simple pull-down menu to add MDM vendor support to MDS accounts List of supported MDMs to grow with future integration 31
SCREEN SHOT ADDING BLUE COAT MDS TO AIRWATCH ACCOUNT MDS VPN profile available on AirWatch administration page Simple VPN configuration of users/groups to route all traffic to Blue Coat Cloud Service 32
33