Web content and applications
have become strategic business
tools. They require the same
level of support, manageability
and performance that organizations
have come to expect for traditional
mission critical applications.
Security administrators and
network operators need to integrate
protection and control functions
for Internet and intranet traffic
without sacrificing the performance
needed to maintain employee
productivity.
Convergence around Web protocols
and their related security threats
has made organizations understand
the business consequences of
an inadequate security infrastructure.
Many of these organizations
are rethinking existing Internet
connectivity and security services
that have evolved rapidly without
the benefit of coherent architecture,
resulting in complex infrastructures
that were difficult to scale
and manage and in constant need
of updates to plug overlooked
security holes.
The Solution
Award wining Blue
Coat System Security Gateway
is the industry's first security
appliance designed to provide
added security for web protocols,
control enterprise security
and usage policies, and increase
the performance and manageability
of enterprise security infrastructure.
Based on a high-performance,
secure operating system, the
Blue Coat System Security Gateway
is the ideal choice for optimizing
multiple web security functions
including authorization management,
virus scanning, content security,
web usage monitoring, content
filtering, and network protection.
Acting in
concert with existing routers,
firewalls and servers, Blue Coat
System's Security Gateways reduce
the complexity, management and
processing overhead needed for
comprehensive web security.
Figure
1: Blue Coat System Security
Gateways serve as a point of
integration for multiple enterprise
security applications, providing
the protection, control and
acceleration enterprises need
to maximize investments in web
technology.
Blue Coat
System Security Gateways combine
patent-pending software with robust
hardware configurations to deliver
unmatched performance, manageability
and scalability. The ability to
outperform conventional security
products, it's easy to understand
why Blue Coat System products
have won numerous industry awards
and accolades.
Control your Network
Policy
Framework - Powerful
policy engine and flexible Blue
Coat System policy language (CPL)
enable implementation of sophisticated
policies based on individual users,
groups of users, time of day,
location, protocol, user agent,
and content type.
Powerful
Visual Policy Manager
- Blue Coat System's Virtual Policy
Manger software with an intuitive
graphical user interface for defining
and managing policy on Blue Coat
System appliances. With Blue Coat
System Visual Policy Manager,
security and network administrators
can quickly create policy rules
that leverage the flexible policy
architecture of Blue Coat System
Security Gateways. Administrators
can set policies based on user
or group information, content
type, URL categorization, time
of day, location, subnet, user
domain and other factors.
Directory-based
Authentication - Blue
Coat System's Security Gateway
provides a powerful authentication,
authorization, and accounting
system for web protection and
control. Security Gateway supports
cross-organizational authentication
to multiple security databases
or directories. This overlay system
can determine identify in many
ways.
Blue Coat System Security gateway
support for proxied and transparent
user authentication to multiple,
simultaneous back-end authentication
directories. Directory support
includes RADIUS, LDAP and NTLM.
Network-based
Authentication - Identify
users based on an IP address,
subnet or other network identifier.
Transparent Authentication - transparent
deployment allows organizations
to authenticate users without
the need to touch every desktop
browser or media player.
URL Filtering
- Allows organizations to implement
Internet policies to manage, restrict
and log access to web content
by user, group, time of day, bandwidth
,subnet and other factors through
integrated, subscription-based
solutions from Secure Computing.
Content
Transformation - Limit,
or strip and replace what information
is available in certain content
headers so that information about
the corporate network isn't available
on the Internet.
Multimedia
Content Services -
Certified support of major streaming
media formats provides improved
viewing and listening quality
for both live and on-demand streaming
content. Multimedia support includes
Real Networks, Microsoft Windows
Media, Apple QuickTime, MP3 and
Flash.
Streaming
Bandwidth Control -
Allows organizations to define
limits for the total amount of
network capacity available for
streaming as well as the maximum
streaming bandwidth individual
users can request.
Easy to Managed
Configuration
Management - Choice
of graphical user interface and
command line interface for managing,
configuring, monitoring and upgrading
a Blue Coat System appliance remotely.
Real-time
Logging and Event Notification
- Enables the logging of system
events, and allows administrators
to specify events to be logged,
size of event log, and email alerts
for occurring events.
cIQ Director
Integration - Separate
management appliance enables configuration
management, policy management,
content distribution management,
and user request management for
a network of Blue Coat System
Security Gateways.
Figure
2: Blue Coat System Report provides
powerful reporting tool to IT
manager
Identity-Based
Monitoring and Reporting
Blue Coat System Reporter provides
identity-based user and network
reporting that helps evaluate
web security policies and resource
management. Ideal for the complex
web traffic patterns an enterprise
generates, Blue Coat System Reporter
transforms raw data into meaningful,
easy-to-use reports on your users
and network.
Blue Coat
System Reporter enables administrators
to:
Identify possible security
holes
Track potentially dangerous
user activity
Report on blocked traffic
by category and URL
Conserve network bandwidth
resources by identifying abuse
patterns
Report on web usage by user,
group, location, URL, and
other factors
Determine violators of corporate
web access policies
Blue Coat
System Reporter provides identity-based
user and network reporting for
evaluating web security policies
and resource management.
Protect
security threats
Virus
Scanning - Support
for ICAP (Internet Content Adaptation
Protocol) allows for easy deployment
of leading virus-scanning solutions.
Denial
of Service Attack Resilience
- Distinguishes between valid
and malicious connections servicing
legitimate users while resisting
that attack.
MIME/FILE
Type Filtering - Allows
organizations to implement Internet
policies for both uploaded and
downloaded content by MIME or
FILE type.
Active
Content Stripping -
Provides a mechanism for identifying
potentially dangerous mobile or
active content and scripts and
stripping them out of a response.
Allot
NetEnforcer policy
enforcement devices let
you link your business policies
to specific network actions
that improve and control
users' productivity and
satisfaction. On Corporate
Networks, the NetEnforcer
enables you to control expensive
network resources. For Service
Provider, the NetEnforcer
allows service providers
to maximize ROI by effectively
managing bandwidth and Offering
Service Level Agreements
(SLAs).