Home
Security Solutions
Firewall & VPN Solution
Security Gateway
Solution
Firewall Load Balance Solution
 
< Back
About us Products and Solutions Services Press Room WIT News Jobs Contact us
  Home > Products and Solutions > Security > Gateway
  Security Gateway Solution
 
 
 
 
 
 
 
September 21, 1999
 
 
 
 






Introduction


Web content and applications have become strategic business tools. They require the same level of support, manageability and performance that organizations have come to expect for traditional mission critical applications. Security administrators and network operators need to integrate protection and control functions for Internet and intranet traffic without sacrificing the performance needed to maintain employee productivity.

Convergence around Web protocols and their related security threats has made organizations understand the business consequences of an inadequate security infrastructure. Many of these organizations are rethinking existing Internet connectivity and security services that have evolved rapidly without the benefit of coherent architecture, resulting in complex infrastructures that were difficult to scale and manage and in constant need of updates to plug overlooked security holes.


The Solution


Award wining Blue Coat System Security Gateway is the industry's first security appliance designed to provide added security for web protocols, control enterprise security and usage policies, and increase the performance and manageability of enterprise security infrastructure. Based on a high-performance, secure operating system, the Blue Coat System Security Gateway is the ideal choice for optimizing multiple web security functions including authorization management, virus scanning, content security, web usage monitoring, content filtering, and network protection.

 
 
Acting in concert with existing routers, firewalls and servers, Blue Coat System's Security Gateways reduce the complexity, management and processing overhead needed for comprehensive web security.
 
Click to see .pdf file

Figure 1: Blue Coat System Security Gateways serve as a point of integration for multiple enterprise security applications, providing the protection, control and acceleration enterprises need to maximize investments in web technology.

 
Blue Coat System Security Gateways combine patent-pending software with robust hardware configurations to deliver unmatched performance, manageability and scalability. The ability to outperform conventional security products, it's easy to understand why Blue Coat System products have won numerous industry awards and accolades.


Control your Network


Policy Framework - Powerful policy engine and flexible Blue Coat System policy language (CPL) enable implementation of sophisticated policies based on individual users, groups of users, time of day, location, protocol, user agent, and content type.

Powerful Visual Policy Manager - Blue Coat System's Virtual Policy Manger software with an intuitive graphical user interface for defining and managing policy on Blue Coat System appliances. With Blue Coat System Visual Policy Manager, security and network administrators can quickly create policy rules that leverage the flexible policy architecture of Blue Coat System Security Gateways. Administrators can set policies based on user or group information, content type, URL categorization, time of day, location, subnet, user domain and other factors.

Directory-based Authentication - Blue Coat System's Security Gateway provides a powerful authentication, authorization, and accounting system for web protection and control. Security Gateway supports cross-organizational authentication to multiple security databases or directories. This overlay system can determine identify in many ways.
Blue Coat System Security gateway support for proxied and transparent user authentication to multiple, simultaneous back-end authentication directories. Directory support includes RADIUS, LDAP and NTLM.

Network-based Authentication - Identify users based on an IP address, subnet or other network identifier.
Transparent Authentication - transparent deployment allows organizations to authenticate users without the need to touch every desktop browser or media player.

URL Filtering - Allows organizations to implement Internet policies to manage, restrict and log access to web content by user, group, time of day, bandwidth ,subnet and other factors through integrated, subscription-based solutions from Secure Computing.

Content Transformation - Limit, or strip and replace what information is available in certain content headers so that information about the corporate network isn't available on the Internet.

Multimedia Content Services
- Certified support of major streaming media formats provides improved viewing and listening quality for both live and on-demand streaming content. Multimedia support includes Real Networks, Microsoft Windows Media, Apple QuickTime, MP3 and Flash.

Streaming Bandwidth Control - Allows organizations to define limits for the total amount of network capacity available for streaming as well as the maximum streaming bandwidth individual users can request.


Easy to Managed


Configuration Management - Choice of graphical user interface and command line interface for managing, configuring, monitoring and upgrading a Blue Coat System appliance remotely.

Real-time Logging and Event Notification - Enables the logging of system events, and allows administrators to specify events to be logged, size of event log, and email alerts for occurring events.

cIQ Director Integration - Separate management appliance enables configuration management, policy management, content distribution management, and user request management for a network of Blue Coat System Security Gateways.
 
Figure 2: Blue Coat System Report provides powerful reporting tool to IT manager
 
Identity-Based Monitoring and Reporting

Blue Coat System Reporter provides identity-based user and network reporting that helps evaluate web security policies and resource management. Ideal for the complex web traffic patterns an enterprise generates, Blue Coat System Reporter transforms raw data into meaningful, easy-to-use reports on your users and network.

Blue Coat System Reporter enables administrators to:
  • Identify possible security holes
  • Track potentially dangerous user activity
  • Report on blocked traffic by category and URL
  • Conserve network bandwidth resources by identifying abuse patterns
  • Report on web usage by user, group, location, URL, and other factors
  • Determine violators of corporate web access policies
Blue Coat System Reporter provides identity-based user and network reporting for evaluating web security policies and resource management.
 
 
Protect security threats

Virus Scanning - Support for ICAP (Internet Content Adaptation Protocol) allows for easy deployment of leading virus-scanning solutions.

Denial of Service Attack Resilience - Distinguishes between valid and malicious connections servicing legitimate users while resisting that attack.

MIME/FILE Type Filtering - Allows organizations to implement Internet policies for both uploaded and downloaded content by MIME or FILE type.

Active Content Stripping - Provides a mechanism for identifying potentially dangerous mobile or active content and scripts and stripping them out of a response.
 
 
For more information, you can download :
  Product Brochure / Datasheet
  Technology White Paper
 

Security Gateway 800
188kb

Client Accelerator 6000
203kb

Server Accelerator 700/7000
179kb

Blue Coat System Director
227kb
 

Blue Coat System Reporter
87.9kb

Security Gateway Technology
White Paper

212kb

Web Security
White Paper

377kb
^ Top ^
 
Search by Product
 
Allot NetEnforcer™ policy enforcement devices let you link your business policies to specific network actions that improve and control users' productivity and satisfaction. On Corporate Networks, the NetEnforcer enables you to control expensive network resources. For Service Provider, the NetEnforcer allows service providers to maximize ROI by effectively managing bandwidth and Offering Service Level Agreements (SLAs).
 
 
Copyright © 2002 World Information Technology Co., Ltd. All rights reserved.
Home