Академический Документы
Профессиональный Документы
Культура Документы
FOR PARTNER SE
CONTENT ANALYSIS
SYSTEM
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 1
CONTENT ANALYSIS SYSTEM - AGENDA
1 Introduction
2 Key Features
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 2
INTRODUCTION
What is Malware ?
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 4
TAKING A NETWORK-CENTRIC APPROACH
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 6
REAL WORLD RESULTS:
BENEFIT OF ADDING NETWORK BASED
ANTIMALWARE TO SECURE WEB GATEWAY
Enterprise
Network
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 9
BLUE COAT CONTENT ANALYSIS SYSTEM
(CONT.)
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 10
WHILE LIST DATABASE
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 11
USES CASES OF WL
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 12
CONTENT ANALYSIS SYSTEM
HOW IT WORKS
ProxySG
Content Analysis System
Encrypted &
Unencrypted Malware Signature
Traffic
Databases
Threat Data To
WebPulse:
- File HASH
- URL
- Time Stamp
- File Name
• Based on hash (SHA-1)
Global Intelligence • DB hosted in WebPulse
Network • Over 1 billion records update daily
• Feeds from softw are vendors
• Whitelist is a 1-10 score
• Critical w hen enable sandboxing
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 13
SANDBOXING INTEGRATION
ProxySG
Content Analysis System
Encrypted &
Unencrypted Malware Signature
Traffic
Databases
Non-BlueCoat
Sandbox
Blue Coat
Malware Analysis
Malware Analysis Appliance
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 14
INTELLIGENT DEFENSE IN DEPTH
Analyze
Unknown Threats Discover new threats and then update
Malware Analysis you gateways
Appliance
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 15
WHAT’S NEEDED
ADVANCED THREAT PROTECTION
LIFECYCLE DEFENSE
ProxySG
Incident Ongoing
Resolution Operations
Investigate & Detect & Protect
Rem ediate Breach Block All
Threat Profiling Know n Threats
& Eradication
GLOBAL
Security Analytics INTELLIGENCE
NETWORK
Content Analysis
System
Incident
Containment
Analyze & Mitigate
Novel Threat
Interpretation
INTERNET
GLOBAL INTELLIGENCE
NETWORK
MALWARE ANALYSIS
PROXY SG
SWITCH
CONTENT ANALAYSIS
USERS
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 17
PRODUCT LINE, SIZING AND LICENSING
CAS APPLIANCE
Analysis
CAS Appliance CAS Appliance CAS Appliance CAS Appliance CAS Appliance
System 50 Mbps 100Mbps 250 Mbps 500 Mbps 1000 Mbps
CAS SW LICENSE
LICENSE A LICENSE B
Single AV + Whitelist or Dual AV + Whitelist
license (by user) license (by user)
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 19
CAS - SIZING GUIDE
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 20
CAS -LICENSING
Appliance license - A
• Whiltelist + Single AV
• One license per user subscription (1, 3, 5) or per box
Appliance license - B
• Whiltelist + Dual AV
• One license per user subscription (1, 3, 5) or per box
Virtual
• Secure Web Gateway and Content Analysis System base license
• Subscription license for 1 or 3 years
• One license per user
• WebFilter license already included
• Add license-A or license-B
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 21
QUALIFICATION
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 22
CONTENT ANALYSIS SYSTEM:
PARTNER RESOURCES
https://partners.bluecoat.com/products/content-analysis-
system-spe
Support Assets
Datasheets
Solution Briefs
Whitepapers
Copy right © 2015 Blue Coat Sy stems Inc. All Rights Reserv ed. 23