Products & Services. Security Empowers Business SHIFT FORWARD. Security powers business acceleration.

Similar documents
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Blue Coat Security First Steps. Solution for HTTP Object Caching

SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES

Decrypt Inbound SSL Traffic for Passive Security Device (D-H)

Security Empowers Business

BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

Threat Containment for Facebook

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cisco Cloud Web Security

Blue Coat ICS PROTECTION Scanner Station Version

Blue Coat Security First Steps Transparent Proxy Deployments

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Secure Web Gateways Buyer s Guide >

The Cloud App Visibility Blindspot

Content Security: Protect Your Network with Five Must-Haves

Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015

Blue Coat Security First Steps Solution for Streaming Media

Blue Coat WebFilter >

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

DUBEX CUSTOMER MEETING

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

Web Application Classification Feature

Blue Coat Security First Steps Solution for Controlling Web Applications

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

TERRE ACTIVE / BLUECOAT ROLAND MARTY WOHIN GEHT DIE REISE. Territory Sales Manager Switzerland. Septembre 2013

EXPLORING ADVANCED THREATS

Introducing IBM s Advanced Threat Protection Platform

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Increase insight. Reduce risk. Feel confident.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Reverse Proxy for Trusted Web Environments > White Paper

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management

ALERT LOGIC FOR HIPAA COMPLIANCE

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Readiness Assessments: Vital to Secure Mobility

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Reverse Proxy with SSL - ProxySG Technical Brief

The Value of Managed Security Services > White Paper

WEBSENSE TRITON SOLUTIONS

Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity

How To Buy Nitro Security

INTRODUCING isheriff CLOUD SECURITY

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

ENABLING FAST RESPONSES THREAT MONITORING

TRITON APX. Websense TRITON APX

ForeScout MDM Enterprise

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

The ForeScout Difference

Application Visibility and Monitoring >

How To Create An Insight Analysis For Cyber Security

Achieve Deeper Network Security and Application Control

Preemptive security solutions for healthcare

Next-Generation Firewalls: Critical to SMB Network Security

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Websense Web Security Solutions

Requirements When Considering a Next- Generation Firewall

Extreme Networks Security Analytics G2 Vulnerability Manager

Top 10 Reasons Enterprises are Moving Security to the Cloud

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

IBM Security QRadar Vulnerability Manager

The Cloud App Visibility Blind Spot

Finding Security in the Cloud

Securing the Borderless Enterprise

Stay ahead of insiderthreats with predictive,intelligent security

Comprehensive real-time protection against Advanced Threats and data theft

Symantec Protection Suite Add-On for Hosted and Web Security

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Securing the Internet of Things

Cisco Cloud Web Security Datasheet

Proven LANDesk Solutions

Protect Your Business and Customers from Online Fraud

IBM Security IBM Corporation IBM Corporation

Web Protection for Your Business, Customers and Data

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

How To Protect Your Mobile Device From Attack

A HELPING HAND TO PROTECT YOUR REPUTATION

Putting Web Threat Protection and Content Filtering in the Cloud

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

INFORMATION PROTECTED

Putting Operators at the Centre of

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Endpoint protection for physical and virtual desktops

Uncover security risks on your enterprise network

CA Enterprise Mobility Management MSO

Transcription:

Products & Services Security Empowers Business SHIFT FORWARD Security powers business acceleration.

Security & Policy Enforcement Center Old-school security is all about protection. Avoiding the unthinkable. It s about prohibiting, blocking, forbidding, constraining, and reining people in to avert disaster. Security & Policy Enforcement ity & Policy rcement Center urity & Policy forcement Security & Policy Enforcement Mobility Mobility Mobility Mobility Center Center : Lifecycle Defense Center Mobility But look harder at what else security can buy you. Because security can free your company to do more. To collaborate with confidence. To accelerate innovation. To enhance the brand. To boost productivity. Buying security buys productivity Blue Coat has introduced the radical notion that security empowers business. Now let us introduce you to the cornerstones of our holistic, solution-focused approach: the Business Assurance Technology centers. Read on and discover the capabilities each center offers and experience its business value through examples from the world of financial services.

Security & Policy Enforcement This suite of products is the centerpiece of an effective risk mitigation strategy. The Security and Policy Enforcement Center protects against web and network-based threats, expands your security footprint, prevents data loss, controls access and usage of your networks, and gives you flexible business policy control across enterprise, web, social, and mobile networks. The portfolio includes: ProxySG The industry s leading secure gateway. ProxySG appliances Mobility provide complete control over all your web traffic through user authentication, web filtering, data loss prevention, inspection, visibility of SSL-encrypted traffic, content caching, bandwidth management, stream-splitting, and more. Security & Policy Enforcement Center Secure Web Gateway Virtual Appliance Brings the benefits of virtualization to the branch. The SWGVA merges the market-leading security of ProxySG with the flexibility of virtualization to provide a cost-effective enterprise branch office solution. Now you can deploy web security and other critical remote office infrastructure on a common platform, reducing costs and IT resource requirements. Web Security Service Web security on demand. This cloud-based service gives you 20/20 visibility into web traffic, along with granular control of web applications. IT administrators get the intelligence they need to create and apply new policies to all users, including roaming workers on external networks. And the service identifies and categorizes new web content in real time with 99+% accuracy. Content Analysis System that adapts and expands. The threat environment is evolving faster than many companies can change their security infrastructure. But the Content Analysis System makes it possible to protect yourself against current and future targeted threats by making it easy to add best-of-breed security products and technologies. Now you can quickly adapt to changes in the threat landscape, the network, and your business requirements. Malware Analysis Appliance The Malware Analysis Appliance gives you comprehensive, cost-effective protection against unknown and advanced malware, malicious files, and zero-day threats. It delivers enhanced accuracy for malware detection, as well as faster, more complete security for your workforce and your business. SSL Visibility Appliance Slams the door shut on SSL threats. This appliance protects your workforce against security exploits hidden in encrypted SSL traffic. It lets you add SSL inspection to your network security architecture and closes the encrypted data loophole. It also allows network appliance manufacturers to give their security applications complete visibility into both SSL and non-ssl network traffic and boost application performance. WebFilter Smarter policies, more effective enforcement. WebFilter categorizes billions of web pages into 85 useful categories, providing the intelligence needed to create and update corporate security policies and execute granular control over access to web applications and other network resources. This helps your company mitigate the risk of under-blocking or over-blocking content while giving IT admins greater policy flexibility. 5

DLP Safeguards your most sensitive data. Data Loss Prevention (DLP) enables you to detect and block data leaks quickly while achieving regulatory compliance. With DLP you can prevent sensitive, unsecured data from traveling across the network and winding up in the wrong hands. It s a highly scalable, single appliance solution, and it makes it easy to create policies that analyze the data source, content, destination and more. 7 Director Multi-appliance management from a single location. With Director you have the power, control, and visibility you need to configure and manage all your ProxySG appliances, wherever they reside on your network. You can also deploy, monitor and enforce security and acceleration policies on hundreds of appliances deployed worldwide. Security & Policy Enforcement X-Series Platform Blazing-fast Mobility processing for best-in-class security applications The X-Series is a family of network security platforms that delivers virtualized security infrastructure in a box so you can consolidate equipment and free up precious data center floor tiles. It runs world-class security applications from McAfee, CheckPoint, Sourcefire, and Imperva in any combination, and allows you to scale up and adapt performance to match your business priorities. Compliance without compromise, constraint, or complaint. Compliance requirements for financial services keep growing. How can traders stay productive while meeting the newest mandates? How can firms protect their networks and their clients privacy at the same time? Security and Policy Enforcement Center makes it possible. ProxySG appliances enable firms to enforce appropriate use of the internet by traders for example, specific social web apps can be blocked from usage, protecting the trader from inadvertently violating SEC mandates. Secure Web Gateway makes it possible for financial services clients to take advantage of guest Wi-Fi by providing user authentication and a guest mode, so clients can safely access personal information online while meeting with financial advisors. Data Loss Prevention (DLP) enables firms to detect and block potential data leaks quickly without compromising industry and regulatory compliance. Content Analysis System provides a complete, multi-layered defense against today s advanced, targeted malware threats, protecting traders and clients from both known and unknown threats.

With Mobility Center technologies you can secure all of the devices and applications used for business regardless of who owns and uses them or where and how they connect to your network. So you can untether your workforce and let people choose among the best devices and apps the world has to offer and embrace BYOD rather than fight it. Products and services include: Mobile Device Management Integration with Mobile Device Management (MDM) partners, such as AirWatch, enables IT to remotely control employee and corporate-liable devices. So that IT can easily provision, whitelist, and blacklist apps. Remote-wipe a device if it s lost or stolen. And separate corporate and personal data on a device, ensuring that corporate resources are secure while maintaining employee privacy. 9 Mobility Mobile Device Security Service Enterprise-grade security for mobile devices. The Mobile Device Security (MDS) service lets you extend the security of your corporate perimeter network to any device. It allows you to deliver the access users want while assuring the security businesses need. The result is a much more flexible, low-touch approach to securing mobile devices. Mobility Center Empowering market makers on the move Traders, brokers, financial advisors, and market researchers want to work from anywhere. So do their clients. How can they do more on the go without risking a security breach? Consider the possibilities: The Mobile Device Security Service applies the firm s policies regardless of the device used or where it is located so a financial advisor could craft a client s retirement portfolio presentation from home without compromising the firm s network security. The advisor could also connect to the Internet to conduct market research, using a company-issued tablet, and still be protected from malware and hackers. Mobile Device Management partner applications control employee devices, so firms can provision, whitelist, and blacklist Security apps as they see & fit. Policy Mobility

This portfolio of products empowers your business to take control of applification the explosion of business apps, web apps, and consumer apps, so users can take advantage of the world s best applications wherever they reside. Now you can see, understand, and control the entire app landscape according to your business policies and priorities, and you can protect both trusted and untrusted web environments. The portfolio includes: Center Web Application Reverse Proxy (WARP) Secure and accelerate web apps. Protect your network. With WARP you can protect your web infrastructure and accelerate app performance at the same time. It analyzes and scans inbound executables and files for malware, and it accelerates delivery of web applications and content through integrated caching, stream splitting, bandwidth controls, and more. Imperva for X-Series Extends the security capabilities of Imperva. The X-Series platform, combined with Imperva, gives you comprehensive database, file, and web app security, and superior network processing for consolidation, adaptability, availability, and operational efficiency. 11 Capitalizing on opportunities by tightening control. With Application Center products, financial service firms can protect accessed apps and services from viruses, malware, and hackers, opening the door to new capabilities and higher productivity. For example: Web Application Reverse Proxy (WARP) makes it possible for firms to allow prospective employees to post their resumes on the company s web site without introducing security risks to the firm or the applicant. It secures inbound connections, authenticates users, and keeps the firm in full compliance with all regulations and policies. Web and Mobile App Controls leverage both machine learning and automated processes to quickly categorize content, enabling firms to implement extremely granular application access controls for web and mobile apps. For example, they can allow traders to access social network sites like LinkedIn, but limit bandwidth to games like FarmVille.

If you re looking for better visibility into web and application performance, look to Center. It gives you 20/20 visibility into network traffic so you can decide how best to allocate bandwidth and optimize performance. With the Center suite of products, you can control performance based on your business priorities slowing down recreational apps during business hours, for example and you can optimize performance without necessarily having to buy more bandwidth. The Center portfolio includes: Center PacketShaper Take control of your web-integrated WAN. PacketShaper gives you x-ray vision into your network traffic so you can assert total control of your WAN. Its unique integration of application and web content allows you to monitor and analyze traffic generated by business and recreational apps, prioritize important applications, and enforce your rules with priority, partition, and rate control technologies. CacheFlow Faster performance, half the bandwidth. The CacheFlow appliance is a high-performance web caching solution that allows you to save significantly on bandwidth and accelerate the delivery of rich Web 2.0 content, including video. Using CacheFlow, you can dramatically cut infrastructure costs and bandwidth costs while delivering a more responsive web experience. MACH5 Accelerate all your critical applications. Traditional WAN optimization products focus only on data-driven applications. With MACH5 appliances, you can accelerate data, video, cloud and web applications even in IPv4, IPv6, or mixed environments. MACH5 speeds up applications such as file access, email, web, storage replication and backup and even accelerates SaaS application access with no impact to your cloud infrastructure. 13 Streaming the video without clogging the network. Banks know that lobby-based, online video can be extremely effective at helping clients understand complex products. It can also work to cross-sell those products. But banks also know that video can bog down the network. Center products make it possible to optimize network performance, so clients can watch streamed video using the bank s web connection without slowing down the firm s other apps and services. All with total security.

A complete security solution must provide both prevention and preparedness. Center harnesses Big Data to deliver a faster, more effective way to recognize and resolve attacks that do occur, and a way to learn from those attacks. Simply put, it gives you full visibility into the how, what, where, when, and why of advanced attacks, so that the risks and the damage of future attacks are mitigated. Center products include: Security Analytics Platform A DVR for your network. The Security Analytics Platform delivers clear, actionable intelligence about advanced security threats to apps, files, and web content. With this retrospective look at traffic on the network, you can quickly identify the advanced and targeted attacks that slip past traditional prevention-based security tools, and take action to resolve issues and prevent future occurrences. Reporter The ultimate visibility in ProxySG installations. The Reporter dashboard offers detailed views of user activity, web usage patterns, application access, video usage, blocked sites, sites accessed by category, time of day, length of time, and so on so you can troubleshoot threats, track dangerous user activities, conserve bandwidth by identifying abuse patterns, and report on web usage by user, group, location, URL, and more. Hosted Reporting Service Consolidated reporting from any browser, anywhere. The Hosted Reporting Service is a cloud-based offering that delivers detailed information critical for incident remediation. It provides pre-defined reports with easy drill-downs, and makes it simple to create custom reports that highlight web activity, including malware, phishing, and other web threats; video usage; and web, native mobile, and mobile browser application usage. 15 Center Intelligence Center Detailed application performance monitoring for PacketShaper deployments. Intelligence Center allows you to verify the performance of business-critical applications by site and across your enterprise, discover unauthorized applications, and identify the causes of performance problems. Keeping the brand polished and the clients happy. More than 90 percent of financial services firms have experienced a security breach in the past 12 months. But not all firms have suffered a tarnished reputation. The difference? Blue Coat Center makes it possible to improve services while improving preparedness. For example: The Security Analytics Platform empowers firms to detect and analyze breaches quickly so they can minimize the impact of a breach, learn from threat intelligence gleaned from a worldwide network of users, and ward off future breaches. Reporter makes it easy and safe to take loyalty programs to the next level, further enhancing the brand. It provides full visibility into web activity, so firms can tailor rewards to the consumer s demonstrated preferences.

Cyberattacks are becoming more sophisticated, more targeted, and more persistent. A technology layer that spans all of the Blue Coat Centers, : Lifecycle Defense products and services let you see and block advanced threats as they happen, as well as continuously monitor your network for hidden threats that bypass your existing security defenses. Together, these innovative products empower you to create an adaptive, context-aware, advanced threat defense. : LIFECYCLE DEFENSE Security Analytics Platform A DVR for your network. The Security Analytics Platform delivers clear, actionable intelligence about advanced security threats to apps, files, and web content. With this retrospective look at traffic on the network, you can quickly identify the advanced and targeted attacks that slip past traditional prevention-based security tools, and take action to resolve issues and prevent future occurrences. WebThreat BLADE Control without constraint. Now you can protect your workforce from the full range of vulnerabilities so prevalent on the web today without unnecessarily constraining their activities or their productivity. An extension of the Security Analytics Platform, the WebThreat BLADE provides real-time, comprehensive protection against web-based threats, so you can empower your workforce to access and use the resources they choose, whenever they like, with confidence. 17 Content Analysis System Advanced threat protection that adapts and expands. The threat environment is evolving faster than many companies can change their security infrastructure. But the Content Analysis System part of the Security & Policy Enforcement Center makes it possible to protect yourself against current and future targeted threats by making it easy to add best-of-breed security products and technologies. Now you can quickly adapt to changes in the threat landscape, the network, and your business requirements. FileThreat BLADE Guard against viruses and malware embedded in files. Also an extension of the Security Analytics Platform, the FileThreat BLADE uses industry-leading file and software reputation intelligence to guard against viruses and malware embedded in virtually any file type, so you can protect users against advanced threats while empowering them to use the apps of their choice. Malware Analysis Appliance Your key to malware eradication. The Malware Analysis Appliance gives you comprehensive, cost-effective protection against unknown and advanced malware, malicious files, and zero-day threats. It delivers enhanced accuracy for malware detection, as well as faster, more complete security for your workforce and your business.

Custom Security Analytics Security intelligence tailored to your business. Custom Security Analytics provides a flexible, extensible intelligence solution that s specific to your unique industry and environment, including operations, industry regulations, compliance, and business needs. It provides a personalized architecture to target specific threats, attacks, and indicators of compromise on your enterprise network, so you get faster and more accurate identification, response, remediation, and resolution of advanced threats and attacks. 19 SSL Decryption Fills the SSL security gap. The use of SSL in enterprise traffic is gaining momentum and so is the use of SSL for hiding attacks. Blue Coat provides policy-based visibility into encrypted traffic to solve the SSL dilemma through the following products: SSL Visibility Appliance: Decrypts SSL flows on the enterprise network and provides content to existing security appliances used for intrusion detection and prevention, forensics, compliance, and data loss. Encrypted Tap for the ProxySG Appliance: Selectively decrypts web-based SSL traffic according to your policies, and hands off that decrypted traffic to third-party logging systems for analysis, archiving, and forensics. Putting the secure back in securities. Cybercriminals might think financial services firms are especially attractive targets for their advanced exploits. Thanks to Blue Coat : Lifecycle Defense, they d be dead wrong. Armed with these innovative products, firms can implement a lifecycle defense that eradicates both known and unknown vulnerabilities, defends their own systems and networks against advanced attacks, and protects the mobile devices of traders, financial advisors, and clients alike. For example, the Security Analytics Platform acts as a DVR for network traffic. Say an attempted attack is detected on the firm s guest Wi-Fi network. Security professionals can see what s happening live, in real time or hit the rewind button and review what happened just before the breach. They can apply sophisticated analytics to transform that information into insights about why the breach occurred and determine how to prevent similar attacks from succeeding in the future. So future hackers are thwarted, and the system learns and adapts.

Security Empowers Business Blue Coat Systems Inc. www.bluecoat.com Corporate Headquarters Sunnyvale, CA +1.408.220.2200 EMEA Headquarters Hampshire, UK +44.1252.554600 APAC Headquarters Singapore +65.6826.7000 2013 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter, CacheEOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, Mach5, Packetwise, Policycenter, ProxyAV, ProxyClient, SGOS, WebPulse, Solera Networks, the Solera Networks logos, DeepSee, See Everything. Know Everything., Security Empowers Business, and BlueTouch are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. Blue Coat products, technical services, and any other technical data referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you.