Blue Coat WebFilter >



Similar documents
Secure Web Gateways Buyer s Guide >

Downloading and Configuring WebFilter

Check Point submitted the SWG Secure Web Gateway for

Threat Containment for Facebook

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Lab Testing Summary Report

Balancing Social Networking with Network Security Objectives >

DUBEX CUSTOMER MEETING

ProxySG TechBrief Downloading & Configuring Web Filter

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

WAN Optimization for Microsoft SharePoint BPOS >

BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES

ProxySG TechBrief Implementing a Reverse Proxy

Application Visibility and Monitoring >

REVOLUTIONIZING ADVANCED THREAT PROTECTION

The Value of Managed Security Services > White Paper

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

Blue Coat WebPulse TM >

Masters Project Proxy SG

THE WEBPULSE COLLABORATIVE DEFENSE

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Introducing IBM s Advanced Threat Protection Platform

Reverse Proxy for Trusted Web Environments > White Paper

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

Is Your Network Ready for VoIP? > White Paper

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Protecting Your Network Against Risky SSL Traffic ABSTRACT

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

INTRODUCING isheriff CLOUD SECURITY

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Symantec RuleSpace Data Sheet

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Web Application Classification Feature

Cascadia Labs URL Filtering and Web Security

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Blue Coat Security First Steps Solution for Controlling Web Applications

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

February Considerations When Choosing a Secure Web Gateway

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

Enterprise Buyer Guide

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Top 10 Reasons Enterprises are Moving Security to the Cloud

Intelligent, Scalable Web Security

C YMPH O N IX NET W O R K C OMPO SER. Reveal. Optimize. Protect.

Comprehensive real-time protection against Advanced Threats and data theft

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments

Reverse Proxy with SSL - ProxySG Technical Brief

Using PacketShaper to Control Bring Your Own Device Traffic

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Emerging Trends in Fighting Spam

Protecting the Infrastructure: Symantec Web Gateway

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Next-Generation Firewalls: Critical to SMB Network Security

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Web Application Firewall for Untrusted Web Environments > White Paper

APERTURE. Safely enable your SaaS applications.

ASSURING THE PERFORMANCE OF CLOUD-BASED APPLICATIONS

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015

Application Layer vs. TCP Layer WAN Optimization > White Paper

WEBSENSE TRITON SOLUTIONS

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Blue Coat Security First Steps Solution for Streaming Media

FOUR STEPS TO HIGH PERFORMANCE WAN AND INTERNET

How to Gain Visibility and Control of Encrypted SSL Web Sessions >

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

The Value of Managed Application Services > White Paper

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Cisco Cloud Web Security

Transcription:

White Paper Blue Coat WebFilter > Delivering the web access your users want with the control you need

Why Dynamic Content Filtering has Become Essential Two billion videos per day are watched on YouTube. Twenty million videos are uploaded to Facebook every month. Numbers like these make it clear that businesses of every kind need to control website access and activities that involve web content and applications. Today s users expect Internet access to any site, including YouTube video sites and social networking sites with multiple applications. This challenges organizations to ensure that best-in-class web security practices are in place. And they need to implement acceptable use policies to protect the business from legal risks, ensure employee productivity, and manage bandwidth consumption. Content filtering plays a new and important role beyond dynamically inspecting content for malware. It is now an essential for balancing user productivity, compliance requirements and bandwidth costs while giving users the level of web access they expect. As social networking and other interactive web communications rapidly replace email and other conventional communications, businesses need more than ever robust, granular ways to achieve Internet access control that satisfies policy requirements. URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection. But content filtering databases have another key role to play: control of Internet use. What You Need to Control Web Access and Use of Content To effectively control access to the web and the usage of web content you need several key capabilities: Granular categorization Granular categorization of web content is critical for elevating your URL filtering results to a new level. This is because web content is now so multidimensional that simply categorizing Facebook, and the Farmville game in Facebook, as social networking is not only ineffective but can lead to undesired consequences. Web sites are dynamically connected to many other sites and applications that contain content that is userdriven in real time. The rise of web chatting, blogging, and email within social media applications drives the need for content-filtering solutions that accurately identify specific content but also identify the multiple dimensions of any URL by applying more than one category. Farmville, for example, must be accurately categorized as Games as well as Social Networking. Selective content control or delivery With dynamic web pages now hosting a myriad of content types, IT administrators need to provide access to required content while blocking restricted content according to their acceptable internet use policy. (For example: enable access to www.wallstreet.com but deny access to the sub-link on job hunting.) With the prevalence of social networking, businesses need to be able to access sections of social networking sites for legitimate business activity while controlling the use of the many other attractions on these sites. Mafiawars, for example, has over seven million active users making it clear that companies need to categorize games within Facebook, using multidimensional URL categorization, to exclude games from social network access as their use policy dictates. 1 < >

Rich media control The meteoric rise of YouTube, along with embedded video content and advertisements, has had a direct impact on bandwidth consumption. Internet video has expanded to phenomenal proportions: people watch up to two billion videos every day on YouTube, which is surpassed only by Facebook. YouTube is now a mainstay for keeping current with world news events (Examples: Hurricane Irene, civil war in Libya), celebrity news (Michael Jackson s death, the latest Lady Gaga antics) and for product information, how-to videos and other presentations. This makes it mandatory for businesses to identify and categorize video content and control access to avoid costly bandwidth outages or upgrades. Comprehensive policy control This is where granular categorization meets business needs. Web access and control today are no longer black and white; you have to manage shades of grey to control legal risks, manage recreational Internet use, and avoid costly bandwidth usage. Simple block-and-allow based on categories is inadequate both for meeting these business needs and to accurately represent any given URL today. The policy needs of businesses today are centered on enabling users to access needed information while managing recreational and objectionable content. Policy control enables you to leverage category information from content filtering solutions and apply controls to each situation. Examples include controlling time-of-day usage of recreational Internet content, or per-user access to job-related web content, and preventing users from job hunting while at work. 20 million Facebook apps are available each day Granular reporting on all web usage You can t control what you can t see. You need visibility into what your users are doing on the web. Strong web filtering with a good categorization engine must be supported by strong reporting on user-based web traffic. By combining accurate, granular web information with user information, you can get a comprehensive view of web trends or user behavior, or correlate data to identify the needs of different groups of users. For example: some businesses may employ an open policy, but discover from reports that video consumption of YouTube is higher than expected. Alternatively, social media usage from the engineering group may become a visible trend, causing you to think about productivity concerns, or possibly about controlling posting activity to avoid unintentional data loss. URL-filtering database coverage and classification accuracy are the most important factors in enforcing use policy, securing Web content and providing granular reports of web usage. If one of these is lacking, web access policies simply won t work. You will not be able to provide the access users want with the control that businesses need. 2 < >

Blue Coat WebFilter for Policy Control WebFilter, powered by the WebPulse collaborative defense, is available both on proxy appliances and a web security SaaS. It enables businesses to protect their users and networks from web-based malware including APTs, spyware, phishing, P2P, streaming traffic, and other attacks. WebFilter includes the following important features and characteristics, which we will describe in detail in the following sections: -> Granular categorization engine -> Selective content delivery -> Rich media control -> Comprehensive policy controls -> Granular real time reporting of web usage WebFilter also provides deep, dynamic categorization that can be used to implement granular policy controls for acceptable Internet use and detailed reporting on all web usage. URL filtering database depth and scope WebFilter, powered by WebPulse, provides over 4.5 billion ratings per week for over 75 million users worldwide, ranging from enterprises to service providers to consumers. This is the largest and most diverse user community associated with any web security vendor, and it creates the strongest user-driven web defense on the market. The enormous flow of user inputs allows WebFilter to base ratings and categories on current and relevant user activities. The WebFilter database contains millions of website ratings, covering more than 50 languages, with ratings categorized into more than 84 relevant categories. Granular URL categorization engine User inputs from WebFilter produce dynamic URL categorization. These real-time inputs from a diverse global user base allow Blue Coat to be aware of new content faster than any other solution. The multiple technologies that drive the WebPulse collaborative defense dynamically analyze and categorize new content, and deliver the results in real time to the user through the on-proxy-appliance database of Blue Coat ProxySG or directly via the SaaS-based Blue Coat Cloud Service Web Security Module. In addition, granular or multi-dimensional URL categorization is delivered by WebFilter working with ProxySG appliances or the Web Security Module. This required capability allows businesses to apply up to four category assignments to a given URL. Multi-dimensional URL categorization is pivotal to accurate web access control, given the complex nature of websites and web-based applications today. An example of this is www.covers.com/sportsbetting, which is both a sports/recreation site and a gambling site. An accurate, granular web filter would recognize this and classify the site into both these categories, because many enterprises may allow access to sports sites, but block access to gambling sites altogether. Because WebFilter can include up to four categories per web page it reflects content much more accurately, and allows for thousands of granular sub-category combinations that make policy enforcement more flexible and powerful. 3 < >

Blue Coat leverages its comprehensive URL filtering with its unique policy engine through ProxySG appliances and the Web Security Module to provide strong web security. Blue Coat s policy engine has more than 500 trigger-action combinations that enable the most granular and powerful proxy policy. By combining information from WebFilter with optimized proxy policy, Blue Coat delivers a much stronger level of web security than any competing technology. Rich Media Control Video access and usage in businesses today is commonplace for both personal and business use. But uncontrolled video usage can overwhelm a network and affect employee productivity. Popular sporting and media events, such as World Cup Soccer or the upcoming 2012 Olympic Games, are common engines of recreational video use. From a business perspective, podcasts are showing up in 50 different web site categories, showing that even appropriate business video content can hobble a network. An essential benefit that Blue Coat uniquely provides is a reduction in bandwidth consumed by video through stream-splitting and multi-casting techniques that allow web-based video to be accessed once and served many times to multiple users in real time. In addition, Blue Coat s caching technology for web and video content dramatically reduces bandwidth consumption and perceptibly improves web performance. Blue Coat provides application-aware bandwidth management capabilities to control recreational web use by combining the depth of WebFilter categorization with the strength of Blue Coat s comprehensive policy engine. For required web access control, the policy engine uses granular filtering database information to identify video content from any source and block or control that video usage based on user, category, time of day, and other usage types. As one example, throttling video content can allow online movie clips to receive limited bandwidth while CEO podcasts can be prioritized. Conclusion The emergence of social media as the mainstream communications environment has driven business and personal usage of many web 2.0 applications including video, email, chatting, and blogging. This creates a business imperative to allow, but control, web 2.0 applications most significantly social media usage. In the current complex and dynamic web environment, achieving the required control of web access starts with an accurate, dynamic and granular content filtering database. Blue Coat WebFilter content filtering, powered by WebPulse, delivers the most accurate real-time URL ratings in the industry. The multidimensional URL categorization supported by WebFilter works with the powerful policy engine in ProxySG appliances and the Web Security Module to deliver the most comprehensive and user relevant policy and web application controls available. With Blue Coat s comprehensive web filtering capabilities, together with the powerful proxy engine on ProxySG appliances and in the Web Security Module SaaS, you can deliver the web access users want with the control you need. 4 < >

Blue Coat Systems, Inc. 1.866.30.BCOAT +1.408.220.2200 Direct +1.408.220.2250 Fax www.bluecoat.com Copyright 2011 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter and BlueTouch are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.wp-bcwf-v1-0911