Вы находитесь на странице: 1из 9

Reporter Overview

Version 8.3.x
Name
Title

May 2008

Blue Coat ® and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered
in certain jurisdictions. All other product or service names are the property of their respective owners.

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


© Blue Coat Systems, Inc. 2007. All Rights Reserved.
Answering the Key Business Questions…

• Is the Integrity of the Network and Our Information at


Risk? (What’s on my network?)
– Real-time rogue application
discovery (e.g. user-agents, streaming media)
– Risk of data leakage or inbound web threats

• Do I need to Set More Policy Controls on Employee Use


or Enhance Layered Defenses against Malware?
– Where are my users going?
– Which are the top sites?
– Are users bringing in malicious code?

Visibility is Needed for Security and Data Protection

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


2
Reporter Overview "Web
"Web2.0
2.0and
andBusiness
Business2.02.0applications
applications and
and
communities
communitieswill willbecome
becomeaamajor
majorsource
sourceofof
identity
identityfraud,
fraud,privacy
privacyviolations,
violations,and
and
corporate
corporatedata
dataloss.“
loss.“
• Visibility Program
ProgramVice
VicePresident
President
Chris Christiansen
– Identify network usage patterns Chris Christiansen
2008
2008IDC
IDCReport
Report
– Demonstrate bandwidth savings
– Pinpoint non-compliant usage against corporate policies
– Monitor and highlight potential security concerns
– Protect users rights per local privacy laws
• Flexibility
– High-level overviews that drill down to very granular levels
– Usable pre-defined reports for common tasks
– Configurable, on-demand reports for investigations
– Role-based access control for different users/managers
• Scalability
– Performance for any size of organization
– Manage logs from all ProxySG gateways

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


3
Reporter Dashboards & Detailed Reports

 User
activity – time spent at certain sites:
Employee Productivity
 Malware/Spyware blocked; lists of sites denied access:
Data and Network Integrity
 Top
file and application types used and by whom:
Employee Activity & Impact on the Network
 Reports
on attempts to reach domains, time required,
and bandwidth used: WAN Performance
 High solution scalability – Supports up to 100,000 users
 Highprocessing speed – Processes up to 60,000 log
records/second

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


4
Dashboard for an HR Manager

Aggregated reports show employee web activity, top


users and domain categories. HR Managers can see
where their employees spend time online.

Detailed reports can be easily generated as needed to


show individual employee activity, including time spent
at specific sites.
BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY
5
Dashboard for an IT Manager

Drill down reports are


available for any dashboard
view.

Reports show number of TCP Actions Indicate


viruses scanned on any bandwidth required to access
particular day and web usage certain sites.
possibly contributing to WAN
traffic, i.e. site access,
application downloads…

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


6
Myths in the Market…

Reporter Is Slow: Not True. Like all programming


software, as well as competing reporting tools, Reporter
will run as fast or slow as your servers available
processing power allows. In fact, Reporter can run as
fast as 60,000 log records/second.
Reporter Does Not Allow Custom Reports. Not True.
Reporter provides a higher than average # of canned
reports, AND the option to create custom reports as well
as Role based Dashboards.
Reporter Does Not Provide Enough Intuitive Graphical
Displays. Not True. Almost any report generated,
including dashboard content, can be represented
graphically in one of 3 chart formats in color.

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


7
And…Blue Coat Reporter Provides

• Information on Application Use and Delivery, Network


Activity and Malware/Virus Detection Activity from one
solution; several competitors require 3 separate tools.
• Ongoing transaction collection data so that detailed
information is available instantly if needed, no
additional configuration is required.
• 150 canned reports, (substantially more than similar
products) based on a solid understanding of gateway
filtering and caching.
• Support for most major protocols including CIFS,
P2P, IM, HTTP, HTTPS, FTP, TCP, Streaming.

BLUE COAT SYSTEMS CONFIDENTIAL – INTERNAL USE ONLY


8

Вам также может понравиться