SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Bluecoat ProxySG Solution with
Web Filter and Reporter
              VFM Systems & Services (P) Ltd.
URL Filtering & Reporting
The Bluecoat Proxy Hybrid Solution                                            Cloud threat protection

                                                                                 ProxyClient
                                       Cloud Defenses                           Remote Users
      Web Gateway Protection            Real-time web content ratings
       Inline threat analysis w/SSL     Web threat & malware detection
       Web filtering & content controls Reputation ratings
       Media optimization + B/W Mgmt
                                            WebFilter




                                                                   WebPulse
                   Reporter


                 WAN                                                           Web
                                            ProxySG & ProxyAV



               Industry’s leading collaborative cloud defense with 73M users
               Real-time inputs of any new web content and dynamic links
               Web protection, visibility, and reporting in any location


       Architected to Deliver On-Demand Security Intelligence
  2
ProxySG Granular Policy Control

                                            Accelerate       Business
                                                             Web &SaaS


                                 Internet
                                                                  Malware &
                                                   Block
                                                                  Bad Web


                  Group/dept
     Who are
                  you belong
                                  Your                       Good Web
      you?                      location      Control        Content
                      to

                  Category of
    Application                 Keyword
                   web site
                                                  Fully align network &
    Date/Time      Browser      Content
                                                 web use to make IT a
     of day          type        type            Business Value Center

          Customizable Policy Engine
3
One Platform, Multiple Safeguards

                                                High
                                            Performance                  WebPulse
Intranet Web               Granular
                                                           Per User
                          content mgt
    Server                  policies
                                                           Control

                                                                                         Public
                                                                                          Web
                                                                                         Server
               Acceleration &                                         Dynamic URL
                 Bandwidth                                              Filtering
 Internal       Management
 Network                                                                            Internet

                                         ProxySG
                   Spyware
                 blocking and           Web Security                   Anti-Virus
                   reporting                                           Protection




                                Per User                  Peer-to-Peer
                                 Activity                   Control
                                Reporting
Good User experience of Web Media with Lower
Bandwidth utilization

       Stream Splitting
       Object Caching
       Bandwidth Management


            Live
            Media
                                Cache

            Web
            Objects


             Breaking
                          B/W
             News
                                Time

  5
WebPulse™ Cloud Security




                           Multiple Threat Engines
    Web Content                                      Content Ratings
                             Machine Analysis

                               Human Raters
    ProxyAV
             ProxyClient
                Users
       K9 Users


6
How WebPulse Works

                                                                      Web contents
                                   Real time update
         Multiple Threat Engines   It’s Bad
                                   It’s bad
           Machine Analysis

             Human Raters                        Internet                Web contents
                                                                         w/ malware
        WebPulse Datacenter



                                    It’s good
                                    Don’t Know


                                                                           ProxySG

Users           ProxySG
                                                            ProxySG

  7
WebFilter/WebPulse on ProxySG

       80+ categories, 50 languages, over 8B ratings per day
         Analyzes content, form, link and origination URL
         Web reputation rating for suspicious sites
         Cross categorization for blended policy rules
       Supports 4 URL lists, including IWF and regional lists
         Allow/deny lists, plus custom overrides & exceptions
         Header inspection/rewrites for safe search mode
         Advise and coach users with custom alerts
       Real-time web content rating service (DRTR)

              WebFilter          • Objectionable Content
                                 • Image Searches
                                 • Search Engine Caches
                      WebPulse   • Translation Services
                                 • Proxy Avoidance
            ProxySG
                                 • Phishing Detection



  8
Options

       WebPulse Service
         On – Ask cloud
         Off – Update cycle
       Dynamic Categorization
         Real-time (now)
         Passive (background)
         Off (use local URL list)
       Malware Feedback
         Refer input
         User Agent Input
         ProxyAV input




  9
Web 2.0 Content & Threat Filtering




  10
WebFilter Cycles & Inputs

    Web gateways & clients are cloud connected
       No downloads required for protection
       5 Ops Centers, plus 4 Rating Centers
       Analyze over 2B requests per week
    For efficiency, web gateway updates occur:
       5 minute change cycle for Security categories
       6 hour updates for General categories
    Public “site review” service with 1 day resolution process
    User driven from over 70M users
       Coverage of web head and tail with DLA
       No web crawlers or artificial analysis
    Cloud connected with Google for malware feeds
       Plus third party malware and phishing feeds




  11
Blue Coat ProxySG Models



                                  Leader in SWG Web Security
             SG9000 Series
                                  Application & Web Company

             SG900Series          40,000+ Appliances Sold

                                  Over 73M WebFilter Users
             SG600 Series
                                  2B Content Rating Requests/Week

                                  Feature Rich Policy Options
            SG300 Series

                                  Advanced Technical Partnerships

       ProxyClient    Webfilter
  12
Reporter 9 – 100% New Interface




                     REPORTER 9

                     Simplified work flow & options
                     Custom dashboard & reports per user
                     50 Users with Local Directory access
                     ~5X performance improvement
                     Database included, no extra fees

                     Three Versions:
                     - Standard: 50M log lines, 750 users
                     - Enterprise: 2.5B log lines, 35K users
                     - Premium: 10B log lines, 150K users


  13
Flexible, Role-based Dashboard




  14
Flexible, Customizable Dashboard




       Interactive Graphics

       Interactive Lists




  15
Report Options




                 Easily locate
                 reports on
                 • User Behavior
                 • Security
                 • Bandwidth Usage
                 • Recent Reports
                 • Favorite Reports
                 • Archived Reports
                 • Scheduled Reports
                 • etc.




  16
Create and Organize Reports




  17
View Reports Online




18
Download Reports to CSV or PDF




19
Scalable Performance


                            Scale Limits
       Standard Version     50 million log lines
                            500 users, 90 days
       Enterprise Version   2.5 billion log lines
                            35,000 users, 90 days
       Premium Version      10 billion log lines
                            150,000 users, 60 days




         All versions support all Secure Web
                   Gateway solutions
                  (ProxySG, BC Web
  20      Filter, ProxyClient, and ProxyAV)
For your attention and time!
Questions?
Write to solutions@vfmindia.biz Response Guaranteed

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Forti web
Forti webForti web
Forti web
 
Security misconfiguration
Security misconfigurationSecurity misconfiguration
Security misconfiguration
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
 
Mobile Application Penetration Testing
Mobile Application Penetration TestingMobile Application Penetration Testing
Mobile Application Penetration Testing
 
Security Code Review 101
Security Code Review 101Security Code Review 101
Security Code Review 101
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa Workshop
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Assure America Title Company - Closing Process - Flow Chart
Assure America Title Company - Closing Process - Flow ChartAssure America Title Company - Closing Process - Flow Chart
Assure America Title Company - Closing Process - Flow Chart
 
Lightweight static code analysis with semgrep
Lightweight static code analysis with semgrepLightweight static code analysis with semgrep
Lightweight static code analysis with semgrep
 
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidDeveloper Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
 
WAF 101
WAF 101WAF 101
WAF 101
 
Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Application Security
Application SecurityApplication Security
Application Security
 
GTM vs AWS Route 53 with Cisco umbrella
GTM vs AWS Route 53 with Cisco umbrellaGTM vs AWS Route 53 with Cisco umbrella
GTM vs AWS Route 53 with Cisco umbrella
 
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı TespitiMitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
 

Andere mochten auch

Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
ChessBall
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
idsecconf
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
Blue Coat
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
Blue Coat
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
 

Andere mochten auch (12)

Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
 
How to master Blue Coat Proxy SG
How to master Blue Coat Proxy SGHow to master Blue Coat Proxy SG
How to master Blue Coat Proxy SG
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 

Ähnlich wie Vfm bluecoat proxy sg solution with web filter and reporter

50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
Bố Su
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
backfire_88
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
OpenStorageSummit
 
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Fy09 Sask Tel Learn It   Ie7 And Ie8   Joel SemeniukFy09 Sask Tel Learn It   Ie7 And Ie8   Joel Semeniuk
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
sim100
 
Performance Measurement and Monitoring for Salesforce Web & Mobile Apps
Performance Measurement and Monitoring for Salesforce Web & Mobile AppsPerformance Measurement and Monitoring for Salesforce Web & Mobile Apps
Performance Measurement and Monitoring for Salesforce Web & Mobile Apps
Salesforce Developers
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011
IndicThreads
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
Noam Bunder
 

Ähnlich wie Vfm bluecoat proxy sg solution with web filter and reporter (20)

50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
Why Load Testing from the Cloud Doesn't Work
Why Load Testing from the Cloud Doesn't WorkWhy Load Testing from the Cloud Doesn't Work
Why Load Testing from the Cloud Doesn't Work
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
Incapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website SecurityIncapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website Security
 
Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security  Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...
 
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Fy09 Sask Tel Learn It   Ie7 And Ie8   Joel SemeniukFy09 Sask Tel Learn It   Ie7 And Ie8   Joel Semeniuk
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
 
IT Governance Portals
IT Governance   PortalsIT Governance   Portals
IT Governance Portals
 
Performance Measurement and Monitoring for Salesforce Web & Mobile Apps
Performance Measurement and Monitoring for Salesforce Web & Mobile AppsPerformance Measurement and Monitoring for Salesforce Web & Mobile Apps
Performance Measurement and Monitoring for Salesforce Web & Mobile Apps
 
Building tomorrow's web with today's tools
Building tomorrow's web with today's toolsBuilding tomorrow's web with today's tools
Building tomorrow's web with today's tools
 
Azure Services Platform
Azure Services PlatformAzure Services Platform
Azure Services Platform
 
When worlds Collide: HTML5 Meets the Cloud
When worlds Collide: HTML5 Meets the CloudWhen worlds Collide: HTML5 Meets the Cloud
When worlds Collide: HTML5 Meets the Cloud
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
 
OreDev 2008: Software + Services
OreDev 2008: Software + ServicesOreDev 2008: Software + Services
OreDev 2008: Software + Services
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
 
Web Performance Acceleration with Strangeloop AS1000
Web Performance Acceleration with Strangeloop AS1000Web Performance Acceleration with Strangeloop AS1000
Web Performance Acceleration with Strangeloop AS1000
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 

Mehr von vfmindia

Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projects
vfmindia
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
vfmindia
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1
vfmindia
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi framework
vfmindia
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
vfmindia
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
vfmindia
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentation
vfmindia
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
vfmindia
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
vfmindia
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
vfmindia
 

Mehr von vfmindia (10)

Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projects
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi framework
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentation
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 

Vfm bluecoat proxy sg solution with web filter and reporter

  • 1. Bluecoat ProxySG Solution with Web Filter and Reporter VFM Systems & Services (P) Ltd.
  • 2. URL Filtering & Reporting The Bluecoat Proxy Hybrid Solution Cloud threat protection ProxyClient Cloud Defenses Remote Users Web Gateway Protection Real-time web content ratings Inline threat analysis w/SSL Web threat & malware detection Web filtering & content controls Reputation ratings Media optimization + B/W Mgmt WebFilter WebPulse Reporter WAN Web ProxySG & ProxyAV Industry’s leading collaborative cloud defense with 73M users Real-time inputs of any new web content and dynamic links Web protection, visibility, and reporting in any location Architected to Deliver On-Demand Security Intelligence 2
  • 3. ProxySG Granular Policy Control Accelerate Business Web &SaaS Internet Malware & Block Bad Web Group/dept Who are you belong Your Good Web you? location Control Content to Category of Application Keyword web site Fully align network & Date/Time Browser Content web use to make IT a of day type type Business Value Center Customizable Policy Engine 3
  • 4. One Platform, Multiple Safeguards High Performance WebPulse Intranet Web Granular Per User content mgt Server policies Control Public Web Server Acceleration & Dynamic URL Bandwidth Filtering Internal Management Network Internet ProxySG Spyware blocking and Web Security Anti-Virus reporting Protection Per User Peer-to-Peer Activity Control Reporting
  • 5. Good User experience of Web Media with Lower Bandwidth utilization  Stream Splitting  Object Caching  Bandwidth Management Live Media Cache Web Objects Breaking B/W News Time 5
  • 6. WebPulse™ Cloud Security Multiple Threat Engines Web Content Content Ratings Machine Analysis Human Raters ProxyAV ProxyClient Users K9 Users 6
  • 7. How WebPulse Works Web contents Real time update Multiple Threat Engines It’s Bad It’s bad Machine Analysis Human Raters Internet Web contents w/ malware WebPulse Datacenter It’s good Don’t Know ProxySG Users ProxySG ProxySG 7
  • 8. WebFilter/WebPulse on ProxySG  80+ categories, 50 languages, over 8B ratings per day Analyzes content, form, link and origination URL Web reputation rating for suspicious sites Cross categorization for blended policy rules  Supports 4 URL lists, including IWF and regional lists Allow/deny lists, plus custom overrides & exceptions Header inspection/rewrites for safe search mode Advise and coach users with custom alerts  Real-time web content rating service (DRTR) WebFilter • Objectionable Content • Image Searches • Search Engine Caches WebPulse • Translation Services • Proxy Avoidance ProxySG • Phishing Detection 8
  • 9. Options  WebPulse Service On – Ask cloud Off – Update cycle  Dynamic Categorization Real-time (now) Passive (background) Off (use local URL list)  Malware Feedback Refer input User Agent Input ProxyAV input 9
  • 10. Web 2.0 Content & Threat Filtering 10
  • 11. WebFilter Cycles & Inputs  Web gateways & clients are cloud connected No downloads required for protection 5 Ops Centers, plus 4 Rating Centers Analyze over 2B requests per week  For efficiency, web gateway updates occur: 5 minute change cycle for Security categories 6 hour updates for General categories  Public “site review” service with 1 day resolution process  User driven from over 70M users Coverage of web head and tail with DLA No web crawlers or artificial analysis  Cloud connected with Google for malware feeds Plus third party malware and phishing feeds 11
  • 12. Blue Coat ProxySG Models Leader in SWG Web Security SG9000 Series Application & Web Company SG900Series 40,000+ Appliances Sold Over 73M WebFilter Users SG600 Series 2B Content Rating Requests/Week Feature Rich Policy Options SG300 Series Advanced Technical Partnerships ProxyClient Webfilter 12
  • 13. Reporter 9 – 100% New Interface REPORTER 9 Simplified work flow & options Custom dashboard & reports per user 50 Users with Local Directory access ~5X performance improvement Database included, no extra fees Three Versions: - Standard: 50M log lines, 750 users - Enterprise: 2.5B log lines, 35K users - Premium: 10B log lines, 150K users 13
  • 15. Flexible, Customizable Dashboard Interactive Graphics Interactive Lists 15
  • 16. Report Options Easily locate reports on • User Behavior • Security • Bandwidth Usage • Recent Reports • Favorite Reports • Archived Reports • Scheduled Reports • etc. 16
  • 17. Create and Organize Reports 17
  • 19. Download Reports to CSV or PDF 19
  • 20. Scalable Performance Scale Limits Standard Version 50 million log lines 500 users, 90 days Enterprise Version 2.5 billion log lines 35,000 users, 90 days Premium Version 10 billion log lines 150,000 users, 60 days All versions support all Secure Web Gateway solutions (ProxySG, BC Web 20 Filter, ProxyClient, and ProxyAV)
  • 21. For your attention and time! Questions? Write to solutions@vfmindia.biz Response Guaranteed

Hinweis der Redaktion

  1. The ProxySG is feature rich and enables the highest performance Web Gateway on the market today. Let’s review just a few of the benefits a separate proxy appliance can offer for the Enterprise beyond the firewall.<click> Besides performance, per user granular controls extended to the branch and mobile workforce (ProxyClient)<click> Dynamic Next Generation Content filtering support by a robust Cloud Security Service <click> Inline Anti-Virus protection scanning web downloads, encrypted traffic and looking behind user-credentials <click> IM control to block or limit IM usage which can carry malicious code and support Data Leakage <click> Peer to Peer control <click> Rich Reporting tools on a per user or per application basis across the enterprise (including remote workers) <click>Spyware and adware protection <click> Best in Class Wan Optimization Application Acceleration for all types of application – SLL, HTTP, CIFS, MAPI, FTP, Rich Media etc. <click> Granular content management via the Director configuration tool.
  2. So let’s explain how Cloud Security Works in detail <click> First a user goes to access web content. If it’s a good site, ProxySG allows the access to the content. <click><click> So what happens when the user requests for unrated content? <click> The ProxySG running Web Filter then communicates to the cloud to request a rating. <click> The Cloud then uses either or all of the three methods to rate the site, either dynamically using the dynamic rating engine (DRTR) or human raters to return a rating. It then notices that this site has malware hosted on it <click> The rating is then provided in real-time to the ProxySG via WebFilter updates. The malware category is updated immediately. All ProxySGs in the enterprise are updated as well as ALL Blue Coat Customers.We have effectively controlled access to the known malware and pre-empted an infection.