SlideShare uma empresa Scribd logo
1 de 15
PRESENTACIÓN DE
SOLUCIONES

JUNIO 27, 2013
Juan Carlos Peña

© Blue Coat Systems, Inc. 2011

1
THREE ANNOUNCEMENTS

•Acquisition of Solera Networks

The Solera DeepSee platform will add industry-leading security
analytics and forensic capabilities to the Blue Coat product
portfolio.

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

2
Blue Coat DeepSee

®

Advanced Persistent
Security™ that easily
tells users what to
look for—and at

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

3
BLUE COAT DEEPSEE PLATFORM

Use Cases
Situational
Awareness

Continuous
Monitoring

DeepSee® Applications

Threat
Intelligence

Big Data
Analytics

Reports, GeoIP, Reconstruction,
Packet Analysis

Cyber Threat
Detection

Incident
Response

Partner Integration

Data Loss
Monitoring & Analysis

Policy
Compliance

Reputation, Threat Feeds,
and File Analysis

DeepSee Big Data Security Analytics

Sensors

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

4
THREE ANNOUNCEMENTS

•Acquisition of Solera Networks

The Solera DeepSee platform will add industry-leading security
analytics and forensic capabilities to the Blue Coat product
portfolio.
•Acquired Appliance from Netronome.
Blue Coat SSL Visibility Appliance, Intercepts SSL traffic
independent of application protocol.

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

5
BLUE COAT SSL VISIBILITY APPLIANCE

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

6
THREE ANNOUNCEMENTS

•Acquisition of Solera Networks

The Solera DeepSee platform will add industry-leading security
analytics and forensic capabilities to the Blue Coat product
portfolio.
•Acquired Appliance from Netronome.
Blue Coat SSL Visibility Appliance, Intercepts SSL traffic
independent of application protocol.
•Acquired Crossbeam Systems, Inc
Blue Coat X-Series Solution, X-Series provides unprecedented
consolidation and scalability in a single chassis.

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

7
BLUE COAT VALUE SOLUTIONS

Web Security

Wan
Optimization

Visibility

BLUE COAT
CLOUD SERVICE

CacheFlow

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

8
KEY CUSTOMER INITIATIVES

BYOD

Guest Wi-Fi

Mobility

Web Threat Protection

Application control
Web app/social media initiatives

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

9
BLUE COAT WEB SECURITY - UNIFIED
SECURITY SOLUTIONS

Negative Day Defense for Blocking
Future Attacks

Real-time Analysis of Encrypted and
Unencrypted Content for Immediate Protection

Global Threat
Defense

Layered Defense for Comprehensive
Universal
Unified
Protection

Policy

Reporting

Proactively Protect All Users in Any Location
Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

10
UNIVERSAL POLICY

Universal Policy

HQ

Branch Office

Remote

Mobile

Security
Acceptable Use
Compliance & Logging
Productivity

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

11
Blue Coat Unified Security Solutions
BLUE COAT VALUE: UNIFIED REPORTING
Drill-down Analysis for Closed Loop Policy
Actions & Infected Desktop Remediation

Role-based Access & Data Anonymity to Meet
Compliance Requirements

Global Threat
Defense

Customizable Dashboards for Quick Access to
Relevant Information
Universal

Policy

Unified
Reporting

Granular Insight into All Web & User Activity
Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

12
CONTROL DE TRÁFICO DE VÍDEO

INTERNET
HTML5
HTML5
HTML5

Branch Office

DATA CENTER

WAN

Aplicaciones de Vídeo en
crecimiento





Optimización de Vídeo Blue Coat

Televisiones en Internet
WebCast corporativas
E-learning
Campañas de Comunicación internas

 Multiprotocolo: Flash, HTML5, Silverlight, WM

Blue Coat Confidential

 Live Stream-splitting
 Video-on-Demand Caching
 Optimización asimétrica

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

13
APLICACIONES EN NUBE

PUBLIC CLOUD/SaaS

INTERNET
Branch
Office

WAN

Blue Coat’s Cloud Caching Engine
Acerca los contenidos de la nube
Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

14
Gracias
Juan Carlos Peña

Blue Coat Confidential

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

15

Mais conteúdo relacionado

Mais procurados

Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DevicePriyanka Aash
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZscaler
 
Security Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information ProtectionSecurity Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information ProtectionSeclore
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the CloudSymantec
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking NetworkCollaborators
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
Ict conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalDejan Jeremic
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 

Mais procurados (20)

Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Security Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information ProtectionSecurity Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information Protection
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Ict conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 

Destaque

ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...Dogs Trust
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Symc solution overview_rev0.8
Symc solution overview_rev0.8Symc solution overview_rev0.8
Symc solution overview_rev0.8Takayoshi Takaoka
 
NetDialog Value Add Monitoring Software on top of BlueCoat PacketShaper
NetDialog Value Add Monitoring Software on top of BlueCoat PacketShaperNetDialog Value Add Monitoring Software on top of BlueCoat PacketShaper
NetDialog Value Add Monitoring Software on top of BlueCoat PacketShaperNetDialog
 
It security forensic
It security forensicIt security forensic
It security forensicRupesh Verma
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
Bluecoat Packeshaper Presentation
Bluecoat Packeshaper PresentationBluecoat Packeshaper Presentation
Bluecoat Packeshaper PresentationJerry Paul Acosta
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 

Destaque (9)

ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
Symc solution overview_rev0.8
Symc solution overview_rev0.8Symc solution overview_rev0.8
Symc solution overview_rev0.8
 
NetDialog Value Add Monitoring Software on top of BlueCoat PacketShaper
NetDialog Value Add Monitoring Software on top of BlueCoat PacketShaperNetDialog Value Add Monitoring Software on top of BlueCoat PacketShaper
NetDialog Value Add Monitoring Software on top of BlueCoat PacketShaper
 
It security forensic
It security forensicIt security forensic
It security forensic
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Bluecoat Packeshaper Presentation
Bluecoat Packeshaper PresentationBluecoat Packeshaper Presentation
Bluecoat Packeshaper Presentation
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 

Semelhante a Portfolio security, analytics and forensic blue coat

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTechWell
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any AppCipherCloud
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 

Semelhante a Portfolio security, analytics and forensic blue coat (20)

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 

Mais de Ronaldo Cesar Espíndola Ferreira (13)

The ca arcserve hybrid protection mess
The ca arcserve hybrid protection messThe ca arcserve hybrid protection mess
The ca arcserve hybrid protection mess
 
Apresentação ibm software portugues
Apresentação ibm software portuguesApresentação ibm software portugues
Apresentação ibm software portugues
 
Blue coat 4 steps_high_performance_wan_internet-por-br
Blue coat 4 steps_high_performance_wan_internet-por-brBlue coat 4 steps_high_performance_wan_internet-por-br
Blue coat 4 steps_high_performance_wan_internet-por-br
 
O que acontece quando você bebe coca-cola
O que acontece quando você bebe coca-colaO que acontece quando você bebe coca-cola
O que acontece quando você bebe coca-cola
 
Aula sobre refrigerantes
Aula sobre refrigerantesAula sobre refrigerantes
Aula sobre refrigerantes
 
Blue coat systems vs. riverbed
Blue coat systems vs. riverbedBlue coat systems vs. riverbed
Blue coat systems vs. riverbed
 
Ca Converged
Ca ConvergedCa Converged
Ca Converged
 
Finlândia
FinlândiaFinlândia
Finlândia
 
A química do refrigerante
A química do refrigeranteA química do refrigerante
A química do refrigerante
 
Os super herois corporativos
Os super herois corporativosOs super herois corporativos
Os super herois corporativos
 
Levantamento de requisitos de prédios inteligentes
Levantamento de requisitos de prédios inteligentesLevantamento de requisitos de prédios inteligentes
Levantamento de requisitos de prédios inteligentes
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Como se-monta-um-Data-Center
Como se-monta-um-Data-CenterComo se-monta-um-Data-Center
Como se-monta-um-Data-Center
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

Portfolio security, analytics and forensic blue coat

  • 1. PRESENTACIÓN DE SOLUCIONES JUNIO 27, 2013 Juan Carlos Peña © Blue Coat Systems, Inc. 2011 1
  • 2. THREE ANNOUNCEMENTS •Acquisition of Solera Networks The Solera DeepSee platform will add industry-leading security analytics and forensic capabilities to the Blue Coat product portfolio. Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 2
  • 3. Blue Coat DeepSee ® Advanced Persistent Security™ that easily tells users what to look for—and at Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 3
  • 4. BLUE COAT DEEPSEE PLATFORM Use Cases Situational Awareness Continuous Monitoring DeepSee® Applications Threat Intelligence Big Data Analytics Reports, GeoIP, Reconstruction, Packet Analysis Cyber Threat Detection Incident Response Partner Integration Data Loss Monitoring & Analysis Policy Compliance Reputation, Threat Feeds, and File Analysis DeepSee Big Data Security Analytics Sensors Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 4
  • 5. THREE ANNOUNCEMENTS •Acquisition of Solera Networks The Solera DeepSee platform will add industry-leading security analytics and forensic capabilities to the Blue Coat product portfolio. •Acquired Appliance from Netronome. Blue Coat SSL Visibility Appliance, Intercepts SSL traffic independent of application protocol. Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 5
  • 6. BLUE COAT SSL VISIBILITY APPLIANCE Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 6
  • 7. THREE ANNOUNCEMENTS •Acquisition of Solera Networks The Solera DeepSee platform will add industry-leading security analytics and forensic capabilities to the Blue Coat product portfolio. •Acquired Appliance from Netronome. Blue Coat SSL Visibility Appliance, Intercepts SSL traffic independent of application protocol. •Acquired Crossbeam Systems, Inc Blue Coat X-Series Solution, X-Series provides unprecedented consolidation and scalability in a single chassis. Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 7
  • 8. BLUE COAT VALUE SOLUTIONS Web Security Wan Optimization Visibility BLUE COAT CLOUD SERVICE CacheFlow Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 8
  • 9. KEY CUSTOMER INITIATIVES BYOD Guest Wi-Fi Mobility Web Threat Protection Application control Web app/social media initiatives Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 9
  • 10. BLUE COAT WEB SECURITY - UNIFIED SECURITY SOLUTIONS Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Global Threat Defense Layered Defense for Comprehensive Universal Unified Protection Policy Reporting Proactively Protect All Users in Any Location Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 10
  • 11. UNIVERSAL POLICY Universal Policy HQ Branch Office Remote Mobile Security Acceptable Use Compliance & Logging Productivity Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 11
  • 12. Blue Coat Unified Security Solutions BLUE COAT VALUE: UNIFIED REPORTING Drill-down Analysis for Closed Loop Policy Actions & Infected Desktop Remediation Role-based Access & Data Anonymity to Meet Compliance Requirements Global Threat Defense Customizable Dashboards for Quick Access to Relevant Information Universal Policy Unified Reporting Granular Insight into All Web & User Activity Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 12
  • 13. CONTROL DE TRÁFICO DE VÍDEO INTERNET HTML5 HTML5 HTML5 Branch Office DATA CENTER WAN Aplicaciones de Vídeo en crecimiento     Optimización de Vídeo Blue Coat Televisiones en Internet WebCast corporativas E-learning Campañas de Comunicación internas  Multiprotocolo: Flash, HTML5, Silverlight, WM Blue Coat Confidential  Live Stream-splitting  Video-on-Demand Caching  Optimización asimétrica Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 13
  • 14. APLICACIONES EN NUBE PUBLIC CLOUD/SaaS INTERNET Branch Office WAN Blue Coat’s Cloud Caching Engine Acerca los contenidos de la nube Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 14
  • 15. Gracias Juan Carlos Peña Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 15

Notas do Editor

  1. Blue Coat recently released three major announcements (summarize). In today’s webcast, we will focus on the second of these three announcements to give you a better understanding of the Business Assurance Technology.
  2. What do we do?Solera Networks tells users what to look for on their networks, targeting these events in real-time, and giving users both context and content, improving and enhancing the enterprise’s ability to discover, investigate, and respond to Advanced Persistent Threats and Advanced Targeted Attacks. We are the best solution for delivering “Big Data for Information Security”  
  3. The use cases you see here are possible because of the layer of intelligence we provide—a whole host of reports, Geolocation, deep packet analysis, partner integrations, reputation services, threat feed, file analysis and much more. The DeepSee Analytics (the full packet capture, indexing, classification, etc.) enable the intelligence. At the base you have the engine that fuels it all delivered as software, appliances or as a virtual appliance.
  4. Blue Coat recently released three major announcements (summarize). In today’s webcast, we will focus on the second of these three announcements to give you a better understanding of the Business Assurance Technology.
  5. Blue Coat recently released three major announcements (summarize). In today’s webcast, we will focus on the second of these three announcements to give you a better understanding of the Business Assurance Technology.
  6. Blue Coat value propositions are based on two main types of solutions:Web Security - Unified Security SolutionsNetworking and Optimization SolutionsCacheFlow
  7. Customers are increasingly facing the user mandateWith personal devices intersecting with the corporate network and corporate assets, the businesses that are thinking about how to enable these users, are investing in BYOD initiatives. You heard steve talk about examples this morning about corporate mobility initiatives – whether for airline pilots, or sales reps, this initiatives requires the breadth of security and control on a corp network, extended out to mobile devices on any network. The mobility trend naturally drives initiatives around guest access – which presents entry point opportunities into some accounts, but also real revenue opportunities in areas such as health care, hospitality or retail, where secure high performing access for guests/customers is part of their business strategy. Protection and Application controls of course are the heart and sole of our offering – but what we continue to highlight is that ….click
  8. But if we look behind the deployment choices, the customer requirement for the Extended Enterprise are around global threat defense, universal policies and unified reportingThese are foundational to having enterprise grade protection with the policy control and visibility needed for securing all users.
  9. Now if we take a look at the need for a variable policy framework, we can look back at our user across the various locations.If we start with the security posture, the policy implementation should be consistent across all devices and locations. But when we look into Acceptable Use, what may be restricted content at corporate, based on ‘appropriate content’ to protect corporate reputation, is a different requirement when it comes to the users personal device, or perhaps personal time. As an example, viewing activist political content, or planned parenthood information may be prohibited by the company in the office to protect corporate reputation. However, the freedom to access this kind of content is expected by users on personal devices/time, and can be provided with a strong security posture still in place. One example may be access to Silk Roads anonymous marketplace for access certain types of drugs. (pick relevant examples and change the icon above as needed).If we look at another policy variable, we can take compliance as an example. Where in the office, many enterprises are required to log all information associated with a user, that policy may soften as the employee leaves the office or is using a personal device. The remote or mobile compliance policy may be reduced to logging only corporate data that is accessed.Another popular example of course of policy around recreational use – for productivity reasons. Many organisations may allow facebook but block games on corporate devices, however users expect to have recreational freedom on their own devices and on their own time. BYOD initiatives raise these issues as well as users consider these to be personal devices, while IT considers them corporate assets. Companies need a framework to allow for policies specific to devices and users that can follow the user to any location, and provide the access that makes sense, while providing a solid security posture everywhere, and still providing IT the control they need to protect the corporate network.
  10. Reporting is essential to gaining insight into your organisations web and user activiity – and is often the starting point to determining where policy actions can add value. <CLICK>Strong reporting requires first and foremost actionable intelligence, compliance and customisation.Blue Coat Reporting products deliver detailed visibility that allow your organisation to drill down on specific areas to identify required closed loop policy actions. A simple example may be to look at web usage by category, which may reveal that video is in fact very low on the list. However, looking into bandwidth consumption may reveal video to be a top offender, and an opportunity for bandwidth savings. Following up with a look at video applications being used will reveal whether bandwidth is being consumed by YouTube or CEO podcasts, or online video tutorials etc. This insight creates actionable intelligence that allows your business to allow or prioritise CEO podcasts over YouTube and apply additional policies as needed, and then return to reporting to view the impact of these closed loop actions. In addition, reporting works hand in hand with WebPulse technologies in combatting malware. As WebPulse looks at outbound traffic, it blocks call home traffic from infected desktops attempting to call home to their malware hosts. Reporting then follows up in real time to isolate and identify the offending desktop, and allow your IT organisation to take action. <CLICK>Blue Coat’s reporting product does support role based access as well as auditing for administrators. We have also added the ability to generate reports that make user information and selected data anonymous. This is a requirement in many countries to maintain user confidentiality and rights. This new functionality now enables you to leverage the value of reporting and send reports to those that need the intelligence and insight, without compromising any user identities or other confidential information. This is also an important capability to help IT Directors sell the value of this solution internally to HR, or Finance or other management members. <CLICK>Tailoring reports on your users web activity to quickly give you the insight you need is another key requirement for strong reporting.Blue Coat reporting products offer simple and straightforward pre-defined reports as well as the ability to create custom reports.The reporting dashboards are very well organised and can be customised via point and click to create the view you need whether by application or by user etc….all designed to give you intelligence you can use to support efficient and timely decision making.
  11. Video dominates recreational traffic but it’s also being used increasingly in the enterprise for training and communications. Let’s first take the example of a video hosted from YouTube. That video tends to go through the data center then over the private wide area network to be served at the branch office. And if this is something that somebody finds interesting that a second, third or fourth person will watch that video is served across the WAN multiple times and can have a huge impact on the network. <CLICK> So here we have new requirements for really handling this traffic. If it’s live video you need to do stream splitting to lessen the burden on the network of multiple streams. For video on demand, as in the YouTube example, you need caching. If you watch the royal wedding and walk down the hall to tell your girlfriend to do that pretty soon 2 or 3 or 5 people have watched that same YouTube clip. So caching that on-demand content can have an extraordinary impact on bandwidth. And you need to do this for not only things like HTTP but also for other specialized or proprietary protocols like Adobe Flash, Silverlight, Windows Media, RTMP. <CLICK>And so with Blue Coat, we actually provide all those capabilities and deliver a real value of 10, 100 or even 1000 times bandwidth multiplication for video. <CLICK>For external video, like YouTube, Blue Coat caches a copy of the video at the branch office. <CLICK>When a second, third, or fourth person goes to request the same video, it is delivered from the ProxySG in the branch office, not from the Internet. For live streaming video, we actually take a single stream from the Internet and split it at the branch offices to serve multiple employees watching the same feed, significantly reducing the bandwidth being consumed by the video. <CLICK>In the case of internal video, we serve that from the data center and can either cache it at the branch, as in the case with YouTube, or split a live stream as well. Additionally, you can pre-populate video content in the branch office after peak hours to better manage your bandwidth. For bandwidth-intensive training videos, for instance, you can send those to the branch office ProxySG for your employees to access the video the next day. Whether it’s being able to scale internal video for training or communications purposes or whether its reducing the burden of recreational viewing and protecting from that video flood, the technologies fundamentally work for each of those use cases . <CLICK>