1 / 49

Um dia de trabalho na vida de Edvaldo

vian
Download Presentation

Um dia de trabalho na vida de Edvaldo

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Um dia de trabalho na vida de “Edvaldo” Visibilidade e Controle Hi everybody, I’m [NAME} from Blue Coat Systems. Today, we’re going to talk about how to keep “good” employees from doing “bad” things on the Internet. And how you can gain Total visibility and control over all Web communications in your organization. So, Lets get started… Hi everybody, I’m [NAME} from Blue Coat Systems. Today, we’re going to talk about how to keep “good” employees from doing “bad” things on the Internet. And how you can gain Total visibility and control over all Web communications in your organization. So, Lets get started…

    2. Hoje em dia tudo é encontrado na internet Web browser has become the universal interface into critical business applications. This offers many advantages to your organization, Web-based applications and protocols are well known, relatively inexpensive and easy to deploy and manage. But they also create more opportunities for inappropriate use, decreased network availability, and back doors for viruses and malicious code. Traditional network security solutions are “on or off”, they either allow or deny access to content. Granular control is a new option, providing the benefits of a new technology to remove the risks. (explain control vs block, use IM and content filtering as examples;, blocking or simple “allow” and “deny” doesn’t scale and often doesn’t meet the needs of the business) For example…next slide Web browser has become the universal interface into critical business applications. This offers many advantages to your organization, Web-based applications and protocols are well known, relatively inexpensive and easy to deploy and manage. But they also create more opportunities for inappropriate use, decreased network availability, and back doors for viruses and malicious code. Traditional network security solutions are “on or off”, they either allow or deny access to content. Granular control is a new option, providing the benefits of a new technology to remove the risks. (explain control vs block, use IM and content filtering as examples;, blocking or simple “allow” and “deny” doesn’t scale and often doesn’t meet the needs of the business) For example…next slide

    3. Riscos aos negócios na internet The first story is worth reading…a clean example of file sharing affecting network availability from a field consultant. The 2nd & 3rd stories highlight issues with pornography where security defenses were active. The remaining articles highlight Instant Messaging (IM) use issues, however the productivity gain with IM for businesses is large…to block it would be analogous to blocking SMTP email in the early days of the Internet for internal use only. The Web does impact business, the goal is to “keep the good guys good” and focused on work while at the office. The first story is worth reading…a clean example of file sharing affecting network availability from a field consultant. The 2nd & 3rd stories highlight issues with pornography where security defenses were active. The remaining articles highlight Instant Messaging (IM) use issues, however the productivity gain with IM for businesses is large…to block it would be analogous to blocking SMTP email in the early days of the Internet for internal use only. The Web does impact business, the goal is to “keep the good guys good” and focused on work while at the office.

    4. Blue Coat ProxySG ProxySG is our flagship product that gives organizations total visibility and control of all Web communications. 1. Custom built OS, SGOS 2. Designed for object handling, the fundamental element of all Internet content 3. Ability to apply policy in real-time due to patent pending technologies, enabling wire-speed performance 4. Optimized performance by delivering approved, scanned content from an integrated cache ISCA certification means our solution has passed security analysis, vulnerability and intrusion tests, and provides secure administrative options with read-only logs. Because it’s an appliance, it installs easily and requires little on going maintenance or patching. ProxySG is our flagship product that gives organizations total visibility and control of all Web communications. 1. Custom built OS, SGOS 2. Designed for object handling, the fundamental element of all Internet content 3. Ability to apply policy in real-time due to patent pending technologies, enabling wire-speed performance 4. Optimized performance by delivering approved, scanned content from an integrated cache ISCA certification means our solution has passed security analysis, vulnerability and intrusion tests, and provides secure administrative options with read-only logs. Because it’s an appliance, it installs easily and requires little on going maintenance or patching.

    5. Now, we’re going to introduce you to “Bob Kent” and talk about how to keep “good” employees from doing “bad” things on the Internet. Now, we’re going to introduce you to “Bob Kent” and talk about how to keep “good” employees from doing “bad” things on the Internet.

    6. Apresentando Edvaldo Edvaldo trabalha na GDN consultores. Edvaldo é um bom empregado, porém infelizmente gosta de fazer coisas ruins na internet. Vamos ver o que acontece agora que a GDN instalou um Blue Coat proxy appliances … At Blue Coat, we focus on the security threat from within: your employees. Your users. Some of which are like bob Kent who works for “edge corporation” They are actually considered good employees, but some times do bad things – intentionally or unintentionally - on the Internet. At Edge Corporation, where bob works, the IT manager recently installed a Blue Coat proxySG over the weekend. (The #1 proxy appliance and the proxy product of choice according to Gartner). Lets now join Bob, a typical employee not too unlike you and me, and see how his Internet experience has changed when he comes to the office on Monday morning….At Blue Coat, we focus on the security threat from within: your employees. Your users. Some of which are like bob Kent who works for “edge corporation” They are actually considered good employees, but some times do bad things – intentionally or unintentionally - on the Internet. At Edge Corporation, where bob works, the IT manager recently installed a Blue Coat proxySG over the weekend. (The #1 proxy appliance and the proxy product of choice according to Gartner). Lets now join Bob, a typical employee not too unlike you and me, and see how his Internet experience has changed when he comes to the office on Monday morning….

    8. Notice Bob likes to personalize his work environment (this is a picture of the sunset from his backyard)……and not surprisingly, he likes to do a lot of personal activities while at work. Like many users, the first stop after logging on is the Internet… Bob doesn’t waste any time and fires up his browser….Notice Bob likes to personalize his work environment (this is a picture of the sunset from his backyard)……and not surprisingly, he likes to do a lot of personal activities while at work. Like many users, the first stop after logging on is the Internet… Bob doesn’t waste any time and fires up his browser….

    9. Bob visits Yahoo as his default home page…but before delivering the Yahoo page, bob notices something new…[MOUSE CLICK]Bob visits Yahoo as his default home page…but before delivering the Yahoo page, bob notices something new…[MOUSE CLICK]

    10. A company sponsored splash screen. One of the capabilities in ProxySG is to create custom splash pages for HTTP , here Bob is welcomed, provided News of the Day and is provided a chance to review Edge Corp’s Acceptable Use Policy (AUP) and to accept it to access the Internet. Acceptance of an AUP may be a compliance benefit for your industry or organization. [MOUSE CLICK] Like most employees, Bob doesn’t like to read through everything though. He’s a busy guy. So, he bypasses the opportunity to review the AUP and simply accepts the terms so he can get on about his business [MOUSE CLICK] Bob also knows that somebody is watching him. Now he is on Yahoo A company sponsored splash screen. One of the capabilities in ProxySG is to create custom splash pages for HTTP , here Bob is welcomed, provided News of the Day and is provided a chance to review Edge Corp’s Acceptable Use Policy (AUP) and to accept it to access the Internet. Acceptance of an AUP may be a compliance benefit for your industry or organization. [MOUSE CLICK] Like most employees, Bob doesn’t like to read through everything though. He’s a busy guy. So, he bypasses the opportunity to review the AUP and simply accepts the terms so he can get on about his business [MOUSE CLICK] Bob also knows that somebody is watching him. Now he is on Yahoo

    11. [MOUSE CLICK] After looking through his default home page, Bob is off to visit KatysFriends.com. He visited the site last Friday and wants to see if any new postings or images are on the site…[MOUSE CLICK][MOUSE CLICK] After looking through his default home page, Bob is off to visit KatysFriends.com. He visited the site last Friday and wants to see if any new postings or images are on the site…[MOUSE CLICK]

    12. His access is denied. Thanks to on-box Content and URL Filtering on ProxySG which enforces corporate policy on inappropriate sites and blocks Bob’s access to the ADULT CONTENT site he wanted to visit. Blue Coat partners with WBSN, SCUR and SurfControl to deliver “on-box” high-performance content filtering on an optimized appliance. Organizations such as CompUSA and the US Air Force have standardized on Blue Coat for content filtering. Another option here, would be to advise Bob that adult content is not allowed in the work environment, however if required for some reason he could be given an option to click on a “CONTINUE “ well knowing his actions are being monitored. Fortunately for Bob, he has other interests. [MOUSE CLICK] Since he can’t visit his adult friends web site, he decides it’s probably a good time to check on yesterday’s sports scores and last night’s game results at SportsPages.com His access is denied. Thanks to on-box Content and URL Filtering on ProxySG which enforces corporate policy on inappropriate sites and blocks Bob’s access to the ADULT CONTENT site he wanted to visit. Blue Coat partners with WBSN, SCUR and SurfControl to deliver “on-box” high-performance content filtering on an optimized appliance. Organizations such as CompUSA and the US Air Force have standardized on Blue Coat for content filtering. Another option here, would be to advise Bob that adult content is not allowed in the work environment, however if required for some reason he could be given an option to click on a “CONTINUE “ well knowing his actions are being monitored. Fortunately for Bob, he has other interests. [MOUSE CLICK] Since he can’t visit his adult friends web site, he decides it’s probably a good time to check on yesterday’s sports scores and last night’s game results at SportsPages.com

    13. Here Bob is coached on the appropriate times to visit recreational sites like SPORTS, Notice that the time on Bob’s PC reads 11;01. It’s company policy to only allow access to leisure sites like sports, gambling, and other entertainmnet before and after normal working hours, or during lunch. , now is not the time to view sports… Slowly, Bob is learning the AUP for his company – something that he has avoided reading, Again, this is an example of advising and coaching. This is not a complete block. It’s an example of a layered policy consisting of time of day and “user” and the site “category” requested. Blue Coat ProxySG can combine over 40 different triggers to create a specific policy “action”. Given the SPORTS site is currently off limits until lunch or after work hours, [MOUSE CLICK] Bob decides to visit Amazon.com to check on a new book he is interested in reading… [MOUSE CLICK] Here Bob is coached on the appropriate times to visit recreational sites like SPORTS, Notice that the time on Bob’s PC reads 11;01. It’s company policy to only allow access to leisure sites like sports, gambling, and other entertainmnet before and after normal working hours, or during lunch. , now is not the time to view sports… Slowly, Bob is learning the AUP for his company – something that he has avoided reading, Again, this is an example of advising and coaching. This is not a complete block. It’s an example of a layered policy consisting of time of day and “user” and the site “category” requested. Blue Coat ProxySG can combine over 40 different triggers to create a specific policy “action”. Given the SPORTS site is currently off limits until lunch or after work hours, [MOUSE CLICK] Bob decides to visit Amazon.com to check on a new book he is interested in reading… [MOUSE CLICK]

    14. Bob is advised via a Pop-up that shopping sites are monitored …a reminder to avoid watching eBay auctions and doing too much shopping while at work. Bob is nearly done with his donut and a cup of coffee and [MOUSE CLICK] decides to visit CNN as shopping is off limits.…surely a news site is a good place to visit. [MOUSE CLICK] Bob is advised via a Pop-up that shopping sites are monitored …a reminder to avoid watching eBay auctions and doing too much shopping while at work. Bob is nearly done with his donut and a cup of coffee and [MOUSE CLICK] decides to visit CNN as shopping is off limits.…surely a news site is a good place to visit. [MOUSE CLICK]

    15. Bob is advised by a Pop-Up that he can visit news sites for only 15 minutes per day. Blue Coat ProxySG allows administrators to set time based quotas on specific users, specific sites and more. Even Bob is starting to get the idea now that work should be his focus…however he is frustrated by his company’s new control over his Internet use…[MOUSE CLICK] and decides to visit Edge Corp’s main competitor Cisco to look for a job. [MOUSE CLICK]Bob is advised by a Pop-Up that he can visit news sites for only 15 minutes per day. Blue Coat ProxySG allows administrators to set time based quotas on specific users, specific sites and more. Even Bob is starting to get the idea now that work should be his focus…however he is frustrated by his company’s new control over his Internet use…[MOUSE CLICK] and decides to visit Edge Corp’s main competitor Cisco to look for a job. [MOUSE CLICK]

    16. Edge Corp does not want its employees visiting competitor’s job listings, so Bob is denied yet again and is given the opportunity to meet with Human Resources to discuss his role. Internet policy often involves cross functional organizations in defining policy and reporting. Here, at Edge corp, Lucy Smith has complete reoporting from ProxySG and, in addition to the IT staff, gets analysis on who is doing what on the Internet. With ProxySG, it’s also easy to create exceptions to any rule, in this case, allowing Lucy Smith, the HR manager to have access to job sites so she can keep tabs on hiring practices and employee benefits at competing companies. Bob can’t even go find another job. Edge Corp does not want its employees visiting competitor’s job listings, so Bob is denied yet again and is given the opportunity to meet with Human Resources to discuss his role. Internet policy often involves cross functional organizations in defining policy and reporting. Here, at Edge corp, Lucy Smith has complete reoporting from ProxySG and, in addition to the IT staff, gets analysis on who is doing what on the Internet. With ProxySG, it’s also easy to create exceptions to any rule, in this case, allowing Lucy Smith, the HR manager to have access to job sites so she can keep tabs on hiring practices and employee benefits at competing companies. Bob can’t even go find another job.

    17. It’s lunch time and Bob visits the Yahoo Finance pages for his favorite stock – Ford (F). [MOUSE CLICK] Bob clicks on the option to post a message…[MOUSE CLICK] It’s lunch time and Bob visits the Yahoo Finance pages for his favorite stock – Ford (F). [MOUSE CLICK] Bob clicks on the option to post a message…[MOUSE CLICK]

    18. Public message boards and instant messaging communications are often open doors in organizations to leak confidential information. Right now though, Bob is not looking to leak information. He’s looking to do a little day trading to supplement his income from Edge Corp. [MOUSE CLICK] So,we see him here going to Ford Motor CO. Bob tries to post a message to the Ford stock bulletin board from his office system…spreading rumors hoping to influence the stock price. [MOUSE CLICK] however ProxySG enforces Edge Corp’s AUP by stopping the action and updates Bob on acceptable use. Proxy SG uses method level controls – to identify bob doing a post within HTTP. So, here is another example of layered policy, where ProxySG controls the HTTP post to a specific URL by a specific user “Bob Kent”. The IT Manager at Edge Corp couldn’t just block all HTTP posts. They have several other employees who use “posts” to fill out web forms, register for seminars, etc – activities that are appropriate. Public message boards and instant messaging communications are often open doors in organizations to leak confidential information. Right now though, Bob is not looking to leak information. He’s looking to do a little day trading to supplement his income from Edge Corp. [MOUSE CLICK] So,we see him here going to Ford Motor CO. Bob tries to post a message to the Ford stock bulletin board from his office system…spreading rumors hoping to influence the stock price. [MOUSE CLICK] however ProxySG enforces Edge Corp’s AUP by stopping the action and updates Bob on acceptable use. Proxy SG uses method level controls – to identify bob doing a post within HTTP. So, here is another example of layered policy, where ProxySG controls the HTTP post to a specific URL by a specific user “Bob Kent”. The IT Manager at Edge Corp couldn’t just block all HTTP posts. They have several other employees who use “posts” to fill out web forms, register for seminars, etc – activities that are appropriate.

    19. Well, with so many of Bob’s normal activities now off limits, Bob decides to visit his personal web-mail account…HotMail on MSN. Now, most of you probably have some sort of Web virus scanning on your corporate (SMTP based) email, but what about personal Web (HTTP) mail? People like Bob use services like Hotmail, Yahoo Mail and others specifically to circumvent SMTP virus scanning – and he accesses these services during the workday using Edge Corp resources. An integrated solution from Blue Coat and our partners Symantec and Trend provides the performance Edge Corp needs for real-time virus scanning of HTTP content. Today though, Bob is not going to download a virus via web mail. [MOUSE CLICK] Instead, he uses personal Web mail to send a message and a confidential file to a friend of his. [MOUSE CLICK] Well, with so many of Bob’s normal activities now off limits, Bob decides to visit his personal web-mail account…HotMail on MSN. Now, most of you probably have some sort of Web virus scanning on your corporate (SMTP based) email, but what about personal Web (HTTP) mail? People like Bob use services like Hotmail, Yahoo Mail and others specifically to circumvent SMTP virus scanning – and he accesses these services during the workday using Edge Corp resources. An integrated solution from Blue Coat and our partners Symantec and Trend provides the performance Edge Corp needs for real-time virus scanning of HTTP content. Today though, Bob is not going to download a virus via web mail. [MOUSE CLICK] Instead, he uses personal Web mail to send a message and a confidential file to a friend of his. [MOUSE CLICK]

    20. As he writes a quick email he thinks …perhaps this is not monitored and it sure provides a nice backdoor for information to be sent outside of the company. [MOUSE CLICK] He attaches the “Edge Corp XLS” file [ MOUSE CLICK]As he writes a quick email he thinks …perhaps this is not monitored and it sure provides a nice backdoor for information to be sent outside of the company. [MOUSE CLICK] He attaches the “Edge Corp XLS” file [ MOUSE CLICK]

    21. As Bob selects the file attachment and clicks on OK, he is advised that the AUP does not allow file attachments being sent with web-mail accounts, the action is blocked, and he learns that unlimited access to web-mail sites is not allowed. As Bob selects the file attachment and clicks on OK, he is advised that the AUP does not allow file attachments being sent with web-mail accounts, the action is blocked, and he learns that unlimited access to web-mail sites is not allowed.

    24. Bob hasn’t had much success doing what he wants to do with his browser or IM client. So, Bob decides to watch a little streaming media entertainmentBob hasn’t had much success doing what he wants to do with his browser or IM client. So, Bob decides to watch a little streaming media entertainment

    25. But again, Edge corp has enforced policy around streaming media use due to it’s capability of hogging bandwidth – often causing performance problems for legitimate business applications. With ProxySG, Edge Corp can invoke specific policies for streaming media based on the origin site or user, and limit how much bandwidth can be used for streaming media.But again, Edge corp has enforced policy around streaming media use due to it’s capability of hogging bandwidth – often causing performance problems for legitimate business applications. With ProxySG, Edge Corp can invoke specific policies for streaming media based on the origin site or user, and limit how much bandwidth can be used for streaming media.

    26. Bob is new to P2P file sharing, and he’s anxious to build up his personal library of music. If he can’t stream his favorite music,why not just download the file to his computer? He’d rather use Edge Corp’s “unlimited” bandwidth and storage resources than his own resources at home. He loaded the KaZaa P2P software on his desktop last week….so he clicks on the Kazaa application in his task bar…Bob is new to P2P file sharing, and he’s anxious to build up his personal library of music. If he can’t stream his favorite music,why not just download the file to his computer? He’d rather use Edge Corp’s “unlimited” bandwidth and storage resources than his own resources at home. He loaded the KaZaa P2P software on his desktop last week….so he clicks on the Kazaa application in his task bar…

    27. But again, Edge Corp has invoked comprehensive policies that control users like Bob Kent who already have the P2P software on their computers. With this slpash screen, Edge Corp communicates company policy on P2P to Bob, and warns him to uninstall the P2P client from his computer. ProxySG also stops additional users from being able to access and download P2P software sites, and gives Edge corp the added control of blocking all P2P file transfers except those file transfers from internal sites. P2P can hog network bandwidth, impact user productivity and create legal liability risk.But again, Edge Corp has invoked comprehensive policies that control users like Bob Kent who already have the P2P software on their computers. With this slpash screen, Edge Corp communicates company policy on P2P to Bob, and warns him to uninstall the P2P client from his computer. ProxySG also stops additional users from being able to access and download P2P software sites, and gives Edge corp the added control of blocking all P2P file transfers except those file transfers from internal sites. P2P can hog network bandwidth, impact user productivity and create legal liability risk.

    28. Back to his desktop.. Bob decides what to “work on” next. [Click]Back to his desktop.. Bob decides what to “work on” next. [Click]

    29. It’s been awhile since he’s checked his personal Web email box. [Note: It’s useful in a larger crowd to ask the sidebar question: “How many of you have personal Web email accounts with Hotmail or Yahoo! Mail ? Several will raise their hands. Then respond with the matter-of-fact statement: “and all of you likely access that email box once or twice a day from the office.”] Well, Bob is no different. He goes to Hotmail …..It’s been awhile since he’s checked his personal Web email box. [Note: It’s useful in a larger crowd to ask the sidebar question: “How many of you have personal Web email accounts with Hotmail or Yahoo! Mail ? Several will raise their hands. Then respond with the matter-of-fact statement: “and all of you likely access that email box once or twice a day from the office.”] Well, Bob is no different. He goes to Hotmail …..

    30. ….and is told that he is allowed to access personal Web mail accounts, but that all attachments are scanned and infected files deleted. He acknowledges the policy and “clicks to continue”….and is told that he is allowed to access personal Web mail accounts, but that all attachments are scanned and infected files deleted. He acknowledges the policy and “clicks to continue”

    31. Bob glances through his inbox. He sees an interesting email….”Win a Trip to Hawaii”. Bob feels he is due for a vacation for all the hard work he’s been doing lately at Edge Corp. He clicks on the email…Bob glances through his inbox. He sees an interesting email….”Win a Trip to Hawaii”. Bob feels he is due for a vacation for all the hard work he’s been doing lately at Edge Corp. He clicks on the email…

    32. Sure enough… Bob thinks he as won a trip. Blindly following the instructions in the email, Bob goes to download the attachment from the unknown source.Sure enough… Bob thinks he as won a trip. Blindly following the instructions in the email, Bob goes to download the attachment from the unknown source.

    33. Sure, Windows gives the standard warning that some files may be harmful. But Bob disregards the message and selects “open”. Fortunately, Blue Coat solutions scan Web content such as attachments that come in through personal Web mail accounts which bypass existing email virus scanning infrastructures (SMTP-based email). Sure, Windows gives the standard warning that some files may be harmful. But Bob disregards the message and selects “open”. Fortunately, Blue Coat solutions scan Web content such as attachments that come in through personal Web mail accounts which bypass existing email virus scanning infrastructures (SMTP-based email).

    34. Bob decides to visit Google. He really enjoys the Google image library. Lots of pictures – many of them inappropriate for the workplace. [mouse click] Bob selects the “Advanced Image Search” button which allows him to set his own personal preferences for the images he will access via google. [mouse Click] He selects “no filtering” and types in the word “breast”. Bob decides to visit Google. He really enjoys the Google image library. Lots of pictures – many of them inappropriate for the workplace. [mouse click] Bob selects the “Advanced Image Search” button which allows him to set his own personal preferences for the images he will access via google. [mouse Click] He selects “no filtering” and types in the word “breast”.

    35. Bob is surprised at the results. Not what he was expecting. Notice that Edge Corp uses ProxySG to allow safe searching in Google, Yahoo and other search engines. Edge Corp is able to rewrite the URL to include a safe search preference which always overrides the preferences set by Bob.Bob is surprised at the results. Not what he was expecting. Notice that Edge Corp uses ProxySG to allow safe searching in Google, Yahoo and other search engines. Edge Corp is able to rewrite the URL to include a safe search preference which always overrides the preferences set by Bob.

    37. Bob attempts to get back to his email. But finds more distractions. Edge Corp anti spam and email AV don’t stop access to embedded URLs within Bob’s email that pull objects – including inappropriate content - from the Web. Here Bob is reviewing his email in Outlook and quickly finds that graphic files are stripped when active content controls use HTTP to retrieve web based images in Outlook. An acceptable use for this technology is company stationary or URL links for company logos in email that are dynamically loaded upon preview or viewing mode. However the inverse is true with today’s SPAM messages taking advantage of the preview window in Outlook to load web content just like a browser…one reason a child should not openly view email without filtering…as well as Bob at work looking for adult content. Bob attempts to get back to his email. But finds more distractions. Edge Corp anti spam and email AV don’t stop access to embedded URLs within Bob’s email that pull objects – including inappropriate content - from the Web. Here Bob is reviewing his email in Outlook and quickly finds that graphic files are stripped when active content controls use HTTP to retrieve web based images in Outlook. An acceptable use for this technology is company stationary or URL links for company logos in email that are dynamically loaded upon preview or viewing mode. However the inverse is true with today’s SPAM messages taking advantage of the preview window in Outlook to load web content just like a browser…one reason a child should not openly view email without filtering…as well as Bob at work looking for adult content.

    38. Resumo das experiências do usuário Edvaldo é considerado um bom rapaz no escritório: Cada click do browser tem um efeito na sua produtividade Reduzir as possibilidades destas ações do Edvaldo é a função do Bluecoat O Bluecoat tem habilidade para: Alertar o Edvaldo sobre as políticas permitidas Avisar o Edvaldo sobre as melhores opções e horários Proibir toda a prática não permitida nas políticas da empresa We showed several examples of how you can keep “good” employees from doing “bad” things on the Internet. Whether you want to use ProxySG just to monitor and gain visibility into what your users are doing over your Internet connection, or you want to completely lock it down like Edge Corp does, it’s your decision. Many of you help define and enforce the Internet AUP that is right for your organization - we provide you the solution to do what is right for your organization. Three important actions from ProxySG should be noted from this user experience…they are the value of advising, coaching and enforcing your AUP everyday on your network.. Keeping the good guys good is the challenge as Internet content grows and new capabilities like IM and P2P expand the opportunity for your business. The threats, liabilities and productivity losses associated with the Internet are significant - they require you to be able to granularly control them, allowing the productive aspects of the Internet to contribute to your company’s bottom line. We showed several examples of how you can keep “good” employees from doing “bad” things on the Internet. Whether you want to use ProxySG just to monitor and gain visibility into what your users are doing over your Internet connection, or you want to completely lock it down like Edge Corp does, it’s your decision. Many of you help define and enforce the Internet AUP that is right for your organization - we provide you the solution to do what is right for your organization. Three important actions from ProxySG should be noted from this user experience…they are the value of advising, coaching and enforcing your AUP everyday on your network.. Keeping the good guys good is the challenge as Internet content grows and new capabilities like IM and P2P expand the opportunity for your business. The threats, liabilities and productivity losses associated with the Internet are significant - they require you to be able to granularly control them, allowing the productive aspects of the Internet to contribute to your company’s bottom line.

    39. Linha Bluecoat de Equipamentos Blue Coat provides you a range of proxy appliances to support smaller branch offices on up to the largest enterprise implementations. Each is based on our custom operating system, SGOS, meaning the same comprehensive set of functionality for controlling Web communications is provided in each platform. And, each enables the granular policy enforcement demonstrated today along with wire speed performance with very little maintenance and virtually no patching. Name drop: The entire country of Saudi Arabia is granted Internet access through our proxy appliances. [NOTE: Use Other customers that you are familiar with eg, CompUSA, US Air Force, etc] Blue Coat provides you a range of proxy appliances to support smaller branch offices on up to the largest enterprise implementations. Each is based on our custom operating system, SGOS, meaning the same comprehensive set of functionality for controlling Web communications is provided in each platform. And, each enables the granular policy enforcement demonstrated today along with wire speed performance with very little maintenance and virtually no patching. Name drop: The entire country of Saudi Arabia is granted Internet access through our proxy appliances. [NOTE: Use Other customers that you are familiar with eg, CompUSA, US Air Force, etc]

    40. Controle Total com Blue Coat Previne que bons empregados façam coisas ruins na Internett Todo acesso Web pode ser um risco se não for controlado Blue Coat é #1 na venda de appliances proxy no mundo (IDC) summarize summarize

    41. Obrigado

    42. Exclusividade na área de serviços A GDN Tecnologia é a única empresa nacional, certificada para prestar serviços profissionais, na solução Bluecoat de segurança Web.

    43. Sobre à Blue Coat Lider Mundial em solução de “proxy appliances” (IDC) Localizada em Sunnyvale, California Escritórios e operação em todos os continentes Mais de 30.000 proxys vendidos Opera com Parceiros, Distribuidores e Revendas NASDAQ: BCSI Next slide provides more details on IDC leadership. Focus on analyst quotes and encourage customers that subscribe to these analyst firms to contact them for more details.Next slide provides more details on IDC leadership. Focus on analyst quotes and encourage customers that subscribe to these analyst firms to contact them for more details.

    44. Posicionamento da Solução “Proxy” When users are typing away at their computers the opportunities and threats are woven together in an Internet fabric. Users sound busy, however many actions on the Internet are social time sinks, reduce network availability and pose legal liabilities. In the User Experience part of this presentation, many of these example come to life…it is quite entertaining and puts a face on the issues. When users are typing away at their computers the opportunities and threats are woven together in an Internet fabric. Users sound busy, however many actions on the Internet are social time sinks, reduce network availability and pose legal liabilities. In the User Experience part of this presentation, many of these example come to life…it is quite entertaining and puts a face on the issues.

    45. Soluções de segurança Blue Coat Our solution is focused on SG 800s, deployed in edge locations throughout an enterprise’s network. The Director appliance provides a central point of control, management, and distribution for policies and management functions within the enterprise, while Visual Policy Manager makes it easy to create and edit policies and Reporter makes it simple to get comprehensive information about network usage. 3rd parties we interface with include Secure and Websense for URL management and content filtering, Real and Microsoft for on-box streaming support, and Symantec and Trend for virus scanning.Our solution is focused on SG 800s, deployed in edge locations throughout an enterprise’s network. The Director appliance provides a central point of control, management, and distribution for policies and management functions within the enterprise, while Visual Policy Manager makes it easy to create and edit policies and Reporter makes it simple to get comprehensive information about network usage. 3rd parties we interface with include Secure and Websense for URL management and content filtering, Real and Microsoft for on-box streaming support, and Symantec and Trend for virus scanning.

    46. Pontos que fazem a diferença Economia de banda do tráfego Web ( 30%) Performance, pois através das funções de cache o conteúdo é servido em velocidade de LAN aos usuários Segurança, pois não possui sistema operacional aberto. Integração de todo o ambiente Seguro Web, filtro de URLs, Antivirus Web, Proxy, Autenticação. Gerenciamento e Monitoração avançada via Web.

    47. Estudo de Caso Mundial Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – www.bluecoat.com – for more details. Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – www.bluecoat.com – for more details.

    48. Estudo de Caso Brasil Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – www.bluecoat.com – for more details. Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – www.bluecoat.com – for more details.

    49. Estudo de Caso Brasil Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – www.bluecoat.com – for more details. Blue Coat is an enterprise grade solution with a background in large scale ISP data centers. Some of the largest and most successful enterprises deploy Blue Coat to control Internet communications. Case studies and customer press releases are located on the Blue Coat website – www.bluecoat.com – for more details.

    50. Produtos Datasheets provide HW upgrade options per appliance model on the Blue Coat web site. Demo versions provide all options for 60-day use…such as IM Control, etc. Web Traffic Assessments provides a ONE WEEK use of an appliance with a detailed analysis report (more on this later…)Datasheets provide HW upgrade options per appliance model on the Blue Coat web site. Demo versions provide all options for 60-day use…such as IM Control, etc. Web Traffic Assessments provides a ONE WEEK use of an appliance with a detailed analysis report (more on this later…)

More Related