bluecoat 700x150

完整代理版 ProxySG 300/600

采用全球领先的代理设备

Blue Coat 完整代理版的 ProxySG 设备系列是 Blue Coat Security and Policy Enforcement Center 的组件,为您的业务提供全面的 Web 安全性和广域网优化。ProxySG 采用可扩展的代理平台架构来保障 Web 通信安全和加快业务应用程序的交付。ProxySG 支持对内容、用户、应用程序、Web 应用程序和协议的灵活的、高颗粒度的策略控制。受到超过 86% 的《财富》全球 500 强企业的青睐。

阅读全文

Advanced Secure Gateway S200/S400/S500

Delivering Advanced Security for the Web in a Single, Powerful Solution

The Advanced Secure Gateway enables you to control and secure your web traffic to support safe, productive web experiences. The Advanced Secure Gateway delivers:

  • Complete Protection and Control
  • Layered Defenses
  • Unmatched Performance and Reliability
  • Lower TCO

阅读全文

SSL Visibility Appliances SV800/SV1800/SV2800/SV3800/SV3800B-20

Remove the Security Blind Spots Created by Encrypted Traffic

Provides Unmatched Visibility into Encrypted Traffic to Protect Against Advanced Threats

  • Automatically identifies all SSL/TLS traffic regardless of port number or application
  • Uncovers hidden threats that use SSL to bypass detection, such as the Dyre and Zeus trojans, Upatre Command and Control (C&C), VMZeus C&C, etc.

Supports Privacy and Compliance Initiatives

  • Selectively decrypts traffic to meet data privacy and compliance requirements
  • Enforces acceptable use policies for encrypted traffic

Integrates Seamlessly with the Existing Security Infrastructure

  • Preserves and extends the ROI of the infrastructure
  • Supports multiple network segments and can feed active and passive security appliances simultaneously

Simplifies Management and Administration

  • Delivers detailed logs and alerts to easily spot trends and potential issues with SSL use
  • Utilizes Management Center for configuration backup, scheduling and synchronization

阅读全文

Malware Analysis S400/S500

Respond To Malicious Threats That Elude Traditional Defenses

Description

Detects and analyzes unknown, advanced, and targeted malware using a unique, dualdetection approach that safely detonates suspicious files and URLs, reveals malicious behavior, and exposes zero-day threats.

Capabilities

  • Comprehensive, enterprise-class malware detonation in highly realistic sandbox environments
  • Combines dynamic, static, and reputational analysis techniques for more thorough exposure of malware
  • Scalable and customizable solution
  • Detailed forensics and shared threat intelligence
  • Seamless integration with Blue Coat Content Analysis, Blue Coat Mail Threat Defense or Blue Coat Security Analytics

Key Benefits

  • Transforms malware exposure into continuous security improvement
  • Superior detection, more accurate and relevant analysis
  • Exceptional performance even on high-volume networks
  • Helps prioritize and accelerate incident response

阅读全文

MACH5 S200/S400/S500

Blazing Performance: Every Workload, Every User, Everywhere

Great performance shouldn’t be limited to certain applications, or certain users, or certain times of the day. That is why Blue Coat MACH5 goes beyond traditional WAN optimization solutions and dramatically improves the performance of virtually all applications and workflows – from file transfers to backups, email, databases, video, and cloud applications.

阅读全文

Mobile App Controls

移动性和 BYOD 如何推动移动应用程序控制的发展

随着平板电脑和智能手机的流行,BYOD(携带自己的设备)在工作环境中已变得司空见惯。员工经常将其个人设备连接到企业网络。移动应用程序越来越广泛用于促进动态关系和信息共享,以供企业保持竞争力。

阅读全文

Web 应用反向代理

用于不受信任的 Web 环境

几乎在业务运营的各个方面都在实施基于 Web 的解决方案,但是它们在公共 Web 访问或不受信任的环境中正越来越多地受到攻击。因此,与日俱增的安全问题、低迷的性能以及不断增加的复杂性使现有的 Web 服务器基础设施不堪重负。Web 服务器也越来越多地成为恶意软件传递网络的主要源头,托管恶意软件并且使用户、资源和声誉面临危险。不断扩大的隐私担忧正在增加 SSL 的使用、用户身份识别或者完全身份验证,为Web 基础设施带来了新的需求。为了保护和加速不受信任环境中的公共 Web 应用,企业组织可以采用 Symantec 的 Web 应用反向代理保护。

阅读全文

Mail Threat Defense S400

Secure Email Against Targeted Phishing Attacks

Defeats Targeted Attacks

  • Ability to identify attacks in embedded file attachments and URL links
  • Delivers screened and sanitized email messages to end users

Eliminates Known Attacks

  • Uses sophisticated techniques to quickly identify both known bad and good files and URLs
  • Leverages the Global Intelligence Network to stay up-to-date on the latest threats

Uncovers New Attacks

  • Uses precise detonation chambers to uncover new, zero-day attacks. Understands the risk level of new attacks with targeted malicious risk scoring

Provides Configurable Security Policies

  • Supports the unique security enforcement need of the organization
  • Balances message delivery speed, user autonomy desires and business needs

阅读全文

  • 1
  • 2

有复杂的需求或需要多方面的考虑?