Hybrid cloud networks extend network security beyond the scope of onsite appliances — to wherever workers are located. Furthermore, hybrid cloud security protection isn’t restricted to app safeguards or mobile security or network function safety checks that exist in the cloud. The security solutions in the cloud could just as easily be protecting on-premises functions.
2. Let’s say you’re CIO at an enterprise recently cash injected by
venture capital backers looking to speed your latest innovations
toward a projected destination in to the marketplace.
Like always decisions will be a question of
priorities. Like everyone else in that situation the
first goal is to strike a balance between rapid
business deployment and network security.
Old enterprise, new paradigm...
You will face some choices.
3. $$
$
Today’s CIO wants to match core needs of keeping up with
comfort factor of robustly supported network security.
(That’s the allure of proprietary)
Guided by those interests, VC backers introduce more than just
new cash resources, but also an influx of management, guidance,
and performance expectations.
Runners
and gunners
Venture capital backing comes with a drive to run and
gun in the marketplace following two main priorities.
Overhead costs
reduction
Net value
increase
4. Under those circumstances, many enterprises choose to
encapsulate their network in a secure bubble of onsite,
proprietary hardware.
Proprietary
Allure
It’s a fast choice that takes a long time to implement,
as opposed to thoughtful choice that can be
implemented fast.
Proprietary architecture is expensive: New hardware
requires space to house it, software to operate it, and
IT personnel to maintain it.
Meanwhile, while you’re stacking servers in the janitor’s closet, the
market keeps moving and shaking …
WHAT’S WRONG WITH THAT CHOICE?
5. Secure
Operational
Agility:
CRITICAL CHOICES
Opt for rapid deployment in the cloud:
invoking major security concerns for
about 75% of enterprises.
Allocate funds for more hardware,
software, and space for data centers:
raising cost concerns from VC.
or...
Source: http://research.microsoft.com/en-us/people/sriram/raghu-cloudcomputing.pdf
More like a biker gang.
Less like a Disney
World tour bus.
6. are supplementing
on-premises web, data, and
network security deployments,
with cloud-based solutions.
Three out of four
enterprise companies
OPEN HYBRID CLOUD
7. Want BYOD? We say bring it on.
Hybrid cloud networks extend network security
beyond the scope of onsite appliances — to wherever
workers are located.
Not only that, hybrid cloud security protection isn’t
restricted to app safeguards, or mobile security, or
network function safety checks that exist in the cloud.
The security solutions in the cloud could just as
easily be protecting on-premises functions.
8. 010101
010101 Sophisticated zero-footprint, no-compromise,
cloud-based content security.
Expertise of the trusted leader that protects
and empowers 15,000 customers worldwide.
Blue Coat Cloud Service
9. Leverages real-time intelligence from
the Global Intelligence Network, which
harnesses data from more than
to provide the industry’s only
Negative-Day Defense.
BLUE COAT CLOUD SERVICE SECURES ENTERPRISES
FROM ATTACKS BEFORE THEY OCCUR:
75 million users worldwide
10. Blue Coat Cloud
Service Includes:
• URL Filtering
• Real Time Advanced Threat
Protection
• Application Controls
• Universal Policy and Reporting
• Mobile Security
• Secure use of laptops, tablets,
and smartphones
• MDM Profile integration with
AirWatch
• Transparent and seamless user
experience across all
connectivity options including
• 3G/4G
• Always-On Global Coverage