A Division of Broadcom

Product Overview
Feed their need for a more satisfying experience. More users. More devices. More apps. More content. It all leads to more and more demand for network and application performance.
Businesses are turning to Performance Center to get visibility into performance, decide how best to allocate bandwidth, and optimize performance via caching.
Our customers are using Performance Center technologies to:
Anticipate shopper needs: Retailers are turning to Performance Center products to engage customers while they shop in stores—through personalized tips, information, or coupons delivered instantly to their smartphones.
Understand bandwidth usage: Performance Center gives customers visibility into how devices are being used, so they can better decisions about how to allocate and/or purchase bandwidth in the BYOD era.
Control performance based on business priorities: Apps use a huge amount of the company’s bandwidth—but they’re not always used for business. With Performance Center customers can slow down recreational apps during business hours, and speed up business apps such as SAP, Salesforce.com, and videoconferencing.
Optimize performance without increasing costs: Buying more bandwidth isn’t the only way to speed up apps. With Performance Center, customers are taking advantage of caching, stream-splitting, and other technologies to boost the performance of media-rich apps—and saving money.
Move Beyond Prevention. Consider New Possibilities. There’s more to security than locking down, tightening up, and saying no. The right security technology, implemented the right way, can open up new opportunities. Boost efficiency. Accelerate innovation. And improve the user experience.
Blue Coat Security and Policy Enforcement Center brings together the industry’s most sophisticated technologies for mitigating risks and creating business advantages. These products will protect you against web and network-based threats, prevent data loss, and give you flexible business policy control across enterprise, web, social and mobile networks. But more than that, they’ll allow you to see new possibilities and create new business advantages.
Our customers are using Security and Policy Enforcement Center products to:
- Extend the security zone to more users, apps, and devices: Customers can scale the secure zone of their networks through a cloud-based model, extending security coverage to remote users, roaming users, and branch offices.
- Control policies intelligently: Security and Policy Enforcement Center provides granular controls for Web, native mobile and mobile browser applications for Unified Policy Management and more.Build a stellar reputation: Security and Policy Enforcement Center makes it possible to detect and block potential data leaks quickly and accurately, so customers can achieve regulatory compliance and meet risk mitigation objectives.
- Scale up network security performance: The Security and Policy Enforcement Center helps solve “security sprawl”; and lets you adapt security performance and scaling to match business needs.
- Cut costs via the cloud: With Security and Policy Enforcement Center offerings you can eliminate the need to purchase on-premise hardware or software, and you can manage your policies more effectively, pay only for the resources you actually use, and scale your security on demand.
- Transform fear into productivity: Security and Policy Enforcement Center products protect against the full spectrum of web threats, including Advanced Persistent Threats (APTs), phishing, malware, botnet traffic from infected end-user systems, and more. So your business and your workforce can do more, in less time, with greater confidence.
- MACH5
- ProxySG
- Secure Web Gateway
- DLP
- Content & Malware Analysis
- SSL Visibility Appliance
- Web Security Service
- Security Analytics Platform
More business than ever is done in branch offices and remote sites, but fewer and fewer IT resources (applications, personnel, servers, etc.) are hosted there. Applications are being consolidated (sometimes centralized, sometimes outsourced) – cost is a driver, but compliance is the catalyst.
In many cases, a consolidated application translates to a poorly performing application. Long distances between users and applications, skinny/latency-prone network pipes, and applications and protocols stretched beyond their design limits mean poor application performance at remote sites. These issues are exacerbated by the introduction of additional bandwidth-hungry, latency-sensitive applications such as voice-over-IP (VoIP) and video.
The industry response is predictable – accelerate the traffic. While appropriate at a high level, the rush to a solution has left out some important questions – e.g., should everything be accelerated? If not, which applications are key? How are they evolving? What about encryption? How are networks evolving? Does MPLS or going directly to the Internet from remote sites change things? Given the significant deployment efforts associated with rolling out acceleration technology, these questions merit consideration.
Any solution under consideration to accelerate applications should be considered with the answers to the above questions in mind. Acceleration technologies range from compression to caching, to bandwidth management and protocol optimization. All of these techniques have benefits, but for a given application, some improve performance more than others.
Each user and application combination has an ideal set of acceleration techniques – apply the wrong techniques and performance benefits can be nullified. Enterprises (both private and public sector) need all of the techniques mentioned above for the array of applications deemed important to the business (file services, e-mail, web, secure web, video) – but what about the countless “applications” that run on the enterprise network that are not business-related, or worse – harmful to the business?
Given that ~30% of enterprise network bandwidth is consumed by unauthorized applications (web advertisements, inappropriate web surfing, P2P, Skype, spyware, etc.), removing the undesirable can be as important as accelerating the desirable.
Blue Coat’s MACH5 is a patent-pending framework of technologies designed to bring all of the appropriate acceleration techniques (bandwidth management, compression, protocol optimization, byte caching, and object caching) to all of an enterprise’s key applications – including web, secure web, file services, email, and video. MACH5 is delivered in Blue Coat appliances, which means that it enables organizations to manage all of their user/application interactions – to stop undesirable applications, throttle less-important applications, differentiate users and groups, and accelerate critical applications – even when encrypted.
click here to visit vendor product page>>
Get world-class threat protection backed by Blue Coat’s real-time WebPulse Collaborative Defense, including the industry’s only Negative Day Defense, and more than 75 million users globally.
ProxySG appliances are part of the Unified Security solution, and provide complete control over all your web traffic—with robust features that include user authentication, web filtering, data loss prevention, inspection, and visibility of SSL-encrypted traffic (including the ability to stream decrypted content to an external server with an Encrypted Tap license), content caching, bandwidth management, stream-splitting and more.
Encrypted Tap is a licensable feature for the ProxySG that gives you complete visibility into HTTPS or SSL-encrypted web traffic. This extension can selectively decrypt SSL traffic according to your policies, and hand-off that decrypted network traffic to third-party logging systems for analysis, archiving, and forensics.
The Encrypted Tap solution is an integral component to any encrypted management strategy, and offers essential visibility into encrypted web traffic and its hidden potential threats without requiring the re-architecting of the network infrastructure. The solution lets you easily add SSL inspection capabilities to your existing secure web gateway and close the security visibility loophole created by encrypted traffic.
click here to visit vendor product page>>
Blue Coat expands its unified security portfolio of enterprise appliances and cloud service to include a virtual appliance for branch offices. The Blue Coat Secure Web Gateway Virtual Appliance (SWG VA) combines the market-leading security capabilities of Blue Coat ProxySG with the flexibility of virtualization to provide a cost-effective enterprise branch office solution. With the new Blue Coat Secure Web Gateway Virtual Appliance, businesses can support Web security and other critical remote office infrastructure on a common platform, reducing costs and IT resource requirements.
SWG Virtual Appliance extends the same depth of protection and control delivered by the Blue Coat ProxySG appliances to small branch office locations with space limitations and limited IT resources. The SWG VA is backed by the WebPulse Collaborative Defense of more than 75 million users which delivers a Negative Day Defense through blocking of malnets.
In addition, SWG VA offers all the Blue Coat security capabilities enterprise customers expect, including a wide selection of user authentication, granular and accurate web filtering with multi-dimensional categories and high-performing inspection of SSL traffic. These combined capabilities deliver unbeatable efficiency to help enterprises optimize IT resources and reduce physical footprint.
click here to visit vendor product page>>
DLP gives you complete visibility and control over your information - wherever it lives and travels – and prevents insiders from exfiltrating sensitive data such as customer records and product designs.
- Monitors for policy violations and risky user behavior across control points at all times.
- Prevents and deters end users from leaking data with real-time blocking, quarantining and alerts.
- Allows you to respond quickly and efficiently when critical data loss happens with automated incident remediation workflows and one-click SmartResponses.
- Gives you flexibility to fine-tune policies to balance security and end-user productivity.
Symantec Content Analysis automatically escalates and brokers zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs.
- Block all known threats identified through Global Intelligence Network
- Deploy multi-step analysis to inspect only suspicious files, including threats targeting mobile devices.
- Analyze unknown content delivered by Symantec ProxySG,Security Analytics,messaging gateways, and other solutions
- Send IOCs to endpoint detection technologies
- Integrate with Symantec Endpoint Protection Manager
You need to address this dilemma and establish a comprehensive encrypted traffic management strategy, that addresses acceptable-use policies for inbound and outbound encrypted traffic, while considering an extensible architecture that will scale and protect the business while also adhering to compliance demands.
The Blue Coat SSL Visibility Appliance is an integral component to any encrypted management strategy, and offers complete visibility into encrypted traffic without requiring the re-architecting of the network infrastructure. The appliance lets you add SSL inspection capabilities to your network security architecture and close the security visibility loophole created by encrypted traffic.
It enables products like next-generation firewall (NGFW) and intrusion prevention systems (NGIPS) with complete visibility into both SSL and non-SSL network traffic—and increases their applications’ effectiveness and performance.
You get the following benefits with the SSL Visibility Appliance:
- A powerful, purpose-built encrypted traffic management platform that offers more than 10 times the performance of competitors and scales to meet the most demanding enterprise needs. Non-SSL/TLS traffic flows through at high speed and low latency to minimize delay for business applications like VoIP.
- An easy-to-use policy-enforcement point for controlling SSL/TLS traffic going in and out of the enterprise. These policies can be customized per organizational needs – for example, “do not encrypt all financial or banking traffic going out of the business” – and utilize Blue Coat’s market-leading Global Intelligence Network to exchange and update threat and malware knowledge in real-time across the globe.
- An adaptable security solution that enhances DLP solutions with visibility into previously hidden communications to better expose data leaks and exfiltration. This helps the SSL Visibility Appliance support regulatory compliance by providing company-wide visibility into all networked traffic and data – encrypted and otherwise.
click here to visit vendor product page>>
Detailed, customizable reporting provides visibility into web traffic and granular web application and operation controls. IT administrators have actionable intelligence to instantly create and apply new policies to all users, including roaming workers on external networks. This security service leverages Blue Coat’s proven security technology and WebPulse collaborative defense of over 75 million users to provide comprehensive protection against web-based threats for all users regardless of location.
Just as important, the Blue Coat Cloud Service identifies and categorizes new web content in real time with 99+% accuracy. And rest assured, knowing that the Blue Coat Cloud Service is backed by our guaranteed 99.999% uptime agreement.
click here to visit vendor product page>>
Today’s sophisticated malware and zero-day attacks take only seconds or minutes to compromise a target, but can take weeks, months or longer to discover. Like a security camera, the Blue Coat Security Analytics Platform and Blue Coat ThreatBLADES reduce corporate risk by delivering full network security visibility, advanced network forensics, and real-time threat detection for all network activity. This enables enterprises to identify and detect advanced malware crossing the network and analyze and contain zero-day attacks and APTs—while allowing comprehensive forensic investigations and incident response to swiftly resolve security breaches.
The Security Analytics Platform is easily deployed anywhere within your network—either as a pre-configured appliance, a virtual appliance, or software on your own hardware. The platform delivers high-performance analytics via 2-10 Gbps lossless packet capture and indexing rates; massive scalability and add-on capacity; and centralized management, so you have full 360 degree visibility into thousands of network segments from a single pane of glass. Your existing security tools gain the much-needed context and content needed to empower your team to identify and address security issues quickly and thoroughly.
An integral part Blue Coat’s Advanced Threat Protection Lifecycle Defense, the Security Analytics Platform helps you protect your workforce and business-critical systems and constantly improve your security processes.
Security Incident Response and Advanced Forensics
Quickly identify, analyze, contain and resolve cyber attacks and breaches. Enable your security and incident response teams to easily understand attacker’s methods and activities and quickly uncover the full source and scope of attacks and security events so they can swiftly resolve incidents and mitigate further risk. The Security Analytics Platform:- Provides detailed forensic information and real-time alerts on newly identified malicious Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs)
- Reduces mean-time-to-resolution and answers the who? what? when? where? and why? of any security incident through root cause exploration, deep packet inspection, integrated reputation services, visual insight and advanced context-based reporting on malicious activity
- Delivers full security visibility across thousands of applications, dozens of file-transports, all flows and all packets—including encrypted traffic—through tight integration with the Blue Coat SSL Visibility Appliance
- Improves the effectiveness of existing security technologies by integrating with leading NGFW, IPS, SIEM, endpoint, and sandboxing solutions to gain actionable intelligence with detailed forensic evidence of exactly what happened before, during and after a security incident
- Automatically detects, extracts, classifies and brokers suspicious or unknown files in real-time to the Blue Coat Malware Analysis Appliance or 3rd party systems for malware detonation and scoring
- WebThreat BLADE
- MailThreat BLADE
- FileThreat BLADE
click here to visit vendor product page>>
MACH5 ProxySG Secure Web Gateway DLP Content & Malware Analysis SSL Visibility Appliance Web Security Service Security Analytics Platform
Target Industries
Government
Telecoms
Oil & Gas
Hospitality
Financial
Education
Symantec Distribution Team
If you are interested in Symantec products and solutions, or would like to find out more, contact our Symantec distribution team