- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
5
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Cloud Service – Web Security Overview
Internet-delivered service is easy, flexible to deploy
Integrates with existing infrastructure Single policy framework for all users, all locations
Blue Coat Cloud Service – Web Security Module
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Remote / Roaming User Protection
Lightweight desktop agent Seamless web threat protection and control for remote users No end user intervention required Virtually impossible to circumvent Automatically goes “dormant” when protected behind a gateway
Granular Social Media Controls
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Flexible for Organizations of Any Size
IPSec VPN (Site to Site)
• Firewall traffic is forwarded to service transparently • Authentication agent on AD domain manager
Social Media Controls
Facebook, MySpace, Twitter, Flickr, YouTube, LinkedIn IM/Apps/Postings/Media transfer controls Keyword blocking
9
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Monkif A
Clickbot
How it spreads
Social Network Facebook Twitter Social Network Social Network
Search Results USA TODAY Research - March 2010
Search Results
infected PCs
Enforce acceptable Web use policies Customize Allow and Block lists for overrides Protect users with real-time threat updates Scan for malware and viruses in real-time Extend seamless protection and policy to remote users
More employees working outside the enterprise WAN perimeter
IT managers asked to better align IT budget with the “Business”
2
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
• 18 languages supported for
dynamic rating
Testing suspicious code Scanners and Heuristics
Human Raters
Sandboxes
Two in-path AV engines, 8+ engines in the background
Multiple AV engines identify malware locations
Classification of authenticated personalized content
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Granular Social Media Controls
Safe Search
Major Engines supported Media Search engines as well Keyword Searches
Web Mail
Major services (Yahoo, MSN, AOL…) Send/receive mail Send/receive attachments
3
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Malware: Loves Social Networking
Malware Peak number of active bots Zeus 1,070,000 Koobface B Koobface D 812,000 599,000 506,000 375,000
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
The Enterprise Network is Changing
PC infections are increasing despite firewalls & desktop AV
The Web and related apps are missioncritical to business
One Answer: Web Security-as-a-Service
Cost effective
Usage-based pricing Shared infrastructure Opex vs. Capex
Superior protection
Quick to adapt More reliable
Proxy Chaining
• Forward from existing ProxySG, Squid or ISA • Authentication based on proxy
ProxySG (or Squid /ISA)
Internet
Client Connector
• Lightweight desktop agent forwards to service transparently • Authentication based on system credentials
Virtually unlimited scalability
Enterprise-class protection
Real-time content inspection, malware protection Web policy enforcement Best-in-class Web 2.0 app controls
Malware: Sophisticated
Hard to keep up with malicious threats
Web is the key threat vector Web 2.0 is important for all businesses Huge volume, dynamic links, short-lived lures and traps
Prevent known, suspect, and potential malware requests Block malicious EXE’s and “drive-by” installers Block malware from "phoning home” and identify
Cloud Service – Web Security Module
<<Name>> <<Title>>
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service names are the property of their respective owners.
Search Results
24% of enterprises report that they have been compromised through social networking sites.
4
© Blue Coat Systems, Inc. 2010. All Rights RHale Waihona Puke Baiduserved.
Lowers cost – eliminates need for additional appliance at small offices (<5 users)
Remote User
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Small/Medium Organization Deployment
Small/Medium Office
Internet
Remote User
Remote User
Blue Coat Cloud Service – Web Security Module
Remote User
13
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
7
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Built on Proven WebPulse Architecture
Enhanced for the Cloud Dynamic classification and malware detection
Web traffic is cleaned before even entering the network
Allows IT resources to focus on strategic initiatives
Enterprises and SMBs alike are embracing Web security as a service.
Dedicated malware and categorization teams
DRTR
Dynamic Real Time Rating analyzes requested content
Hunters & Seekers
AV Engines
Diverse community of 70+ million users for continuous feedback
Visibility on all web usage and trends
Intuitive, dynamic reporting dashboards, drill-downs
6
© Blue Coat Systems, Inc. 2010. All Rights Reserved.
Best Web Threat Protection
Hard to keep up-to-date with defenses
Can’t manage and deploy multiple products
Educating users does not scale
Every user is remote at some point Vigorous underground economy