SlideShare a Scribd company logo
1 of 15
1© Blue Coat Systems, Inc. 2011
PRESENTACIÓN DE
SOLUCIONES
JUNIO 27, 2013
Juan Carlos Peña
Territory Account Manager Spain
Juancarlos.pena@bluecoat.com
676995506
2Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
THREE ANNOUNCEMENTS
•Acquisition of Solera Networks
The Solera DeepSee platform will add industry-leading security
analytics and forensic capabilities to the Blue Coat product
portfolio.
3Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
Advanced Persistent
Security™ that easily
tells users what to
look for—and at
Blue Coat DeepSee®
4Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
Big Data
Analytics
DeepSee Big Data Security Analytics
Partner IntegrationDeepSee® Applications
Reports, GeoIP, Reconstruction,
Packet Analysis
Reputation, Threat Feeds,
and File Analysis
Threat
Intelligence
Sensors
BLUE COAT DEEPSEE PLATFORM
Use Cases
Incident
Response
Situational
Awareness
Policy
Compliance
Continuous
Monitoring
Data Loss
Monitoring & Analysis
Cyber Threat
Detection
5Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
THREE ANNOUNCEMENTS
•Acquisition of Solera Networks
The Solera DeepSee platform will add industry-leading security
analytics and forensic capabilities to the Blue Coat product
portfolio.
•Acquired Appliance from Netronome.
Blue Coat SSL Visibility Appliance, Intercepts SSL traffic
independent of application protocol.
6Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
BLUE COAT SSL VISIBILITY APPLIANCE
7Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
THREE ANNOUNCEMENTS
•Acquisition of Solera Networks
The Solera DeepSee platform will add industry-leading security
analytics and forensic capabilities to the Blue Coat product
portfolio.
•Acquired Appliance from Netronome.
Blue Coat SSL Visibility Appliance, Intercepts SSL traffic
independent of application protocol.
•Acquired Crossbeam Systems, Inc
Blue Coat X-Series Solution, X-Series provides unprecedented
consolidation and scalability in a single chassis.
8Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
BLUE COAT VALUE SOLUTIONS
BLUE COAT
CLOUD SERVICE
Wan
OptimizationWeb Security
CacheFlow
Visibility
9Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
KEY CUSTOMER INITIATIVES
BYOD Mobility
Guest Wi-Fi Web Threat Protection Application control
Web app/social media initiatives
10Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
BLUE COAT WEB SECURITY - UNIFIED
SECURITY SOLUTIONS
Negative Day Defense for Blocking
Future Attacks
Real-time Analysis of Encrypted and
Unencrypted Content for Immediate Protection
Layered Defense for Comprehensive
Protection
Proactively Protect All Users in Any Location
Universal
Policy
Global Threat
Defense
Unified
Reporting
11Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
Remote MobileHQ Branch Office
UNIVERSAL POLICY
UniversalPolicy
Security
Compliance & Logging
Productivity
Acceptable Use
12Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
Drill-down Analysis for Closed Loop Policy
Actions & Infected Desktop Remediation
Role-based Access & Data Anonymity to Meet
Compliance Requirements
Customizable Dashboards for Quick Access to
Relevant Information
BLUE COAT VALUE: UNIFIED REPORTING
Granular Insight into All Web & User Activity
Universal
Policy
Global Threat
Defense
Unified
Reporting
Blue Coat Unified Security Solutions
13Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
WAN
INTERNET
CONTROL DE TRÁFICO DE VÍDEO
DATA CENTER
Branch Office
HTML5
HTML5HTML5
Optimización de Vídeo Blue Coat
 Multiprotocolo: Flash, HTML5, Silverlight, WM
 Live Stream-splitting
 Video-on-Demand Caching
 Optimización asimétrica
Aplicaciones de Vídeo en
crecimiento
 Televisiones en Internet
 WebCast corporativas
 E-learning
 Campañas de Comunicación internas
14Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
INTERNET
APLICACIONES EN NUBE
PUBLIC CLOUD/SaaS
WAN
Branch
Office
Blue Coat’s Cloud Caching Engine
Acerca los contenidos de la nube
15Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential
Gracias
Juan Carlos Peña
Territory Account Manager Spain
Juancarlos.pena@bluecoat.com
676995506

More Related Content

What's hot

What's hot (20)

Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Demisto Webinar - When Shrinkage is Good
Demisto Webinar - When Shrinkage is GoodDemisto Webinar - When Shrinkage is Good
Demisto Webinar - When Shrinkage is Good
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Decision criteria and analysis for hardware-based encryption
Decision criteria and analysis for hardware-based encryptionDecision criteria and analysis for hardware-based encryption
Decision criteria and analysis for hardware-based encryption
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?
 
Security Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information ProtectionSecurity Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information Protection
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Forrester zero trust_dna
 Forrester zero trust_dna Forrester zero trust_dna
Forrester zero trust_dna
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
 

Viewers also liked

02 orlando arancibia_turn off the ligth without moving
02 orlando arancibia_turn off the ligth without moving02 orlando arancibia_turn off the ligth without moving
02 orlando arancibia_turn off the ligth without moving
InnovacionSistematica
 
HOW MUCH INCOME DO YOU NEED
HOW MUCH INCOME DO YOU NEEDHOW MUCH INCOME DO YOU NEED
HOW MUCH INCOME DO YOU NEED
SUSAN HARVEY
 
Vesten forstår ikke rusland
Vesten forstår ikke ruslandVesten forstår ikke rusland
Vesten forstår ikke rusland
Morten Munk
 
10 REASONS TO BUY A HOME
10 REASONS TO BUY A HOME10 REASONS TO BUY A HOME
10 REASONS TO BUY A HOME
SUSAN HARVEY
 
Psp performance
Psp performancePsp performance
Psp performance
paulthom
 
Save The Date
Save The  DateSave The  Date
Save The Date
Royanna
 
Resum del Tercer trimestre del curs 2010-2011
Resum del Tercer trimestre del curs 2010-2011Resum del Tercer trimestre del curs 2010-2011
Resum del Tercer trimestre del curs 2010-2011
Oliverasqv
 
Fresh Business Thinking Social Media Event - Louise Findlay Wilson
Fresh Business Thinking Social Media Event - Louise Findlay WilsonFresh Business Thinking Social Media Event - Louise Findlay Wilson
Fresh Business Thinking Social Media Event - Louise Findlay Wilson
fbtslides
 

Viewers also liked (20)

BUYING A HOME
BUYING A HOMEBUYING A HOME
BUYING A HOME
 
Disciplinar
DisciplinarDisciplinar
Disciplinar
 
Ukraine - et marked på grænsen til EU
Ukraine - et marked på grænsen til EUUkraine - et marked på grænsen til EU
Ukraine - et marked på grænsen til EU
 
02 orlando arancibia_turn off the ligth without moving
02 orlando arancibia_turn off the ligth without moving02 orlando arancibia_turn off the ligth without moving
02 orlando arancibia_turn off the ligth without moving
 
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloud
 
HOW MUCH INCOME DO YOU NEED
HOW MUCH INCOME DO YOU NEEDHOW MUCH INCOME DO YOU NEED
HOW MUCH INCOME DO YOU NEED
 
Vesten forstår ikke rusland
Vesten forstår ikke ruslandVesten forstår ikke rusland
Vesten forstår ikke rusland
 
10 REASONS TO BUY A HOME
10 REASONS TO BUY A HOME10 REASONS TO BUY A HOME
10 REASONS TO BUY A HOME
 
FIRST TIME HOME BUYERS
FIRST TIME HOME BUYERSFIRST TIME HOME BUYERS
FIRST TIME HOME BUYERS
 
Psp performance
Psp performancePsp performance
Psp performance
 
Save The Date
Save The  DateSave The  Date
Save The Date
 
Resum del Tercer trimestre del curs 2010-2011
Resum del Tercer trimestre del curs 2010-2011Resum del Tercer trimestre del curs 2010-2011
Resum del Tercer trimestre del curs 2010-2011
 
Segunda a
Segunda aSegunda a
Segunda a
 
Case-Based ECG
Case-Based ECGCase-Based ECG
Case-Based ECG
 
InZonaTa
InZonaTaInZonaTa
InZonaTa
 
What is J1939 software stack? Learn about the Diagnostic Trouble Codes(DTC)
What is J1939 software stack? Learn about the Diagnostic Trouble Codes(DTC)What is J1939 software stack? Learn about the Diagnostic Trouble Codes(DTC)
What is J1939 software stack? Learn about the Diagnostic Trouble Codes(DTC)
 
Fresh Business Thinking Social Media Event - Louise Findlay Wilson
Fresh Business Thinking Social Media Event - Louise Findlay WilsonFresh Business Thinking Social Media Event - Louise Findlay Wilson
Fresh Business Thinking Social Media Event - Louise Findlay Wilson
 
OBD II Stack Solutions And Services
OBD II Stack Solutions And ServicesOBD II Stack Solutions And Services
OBD II Stack Solutions And Services
 
Book entes 2015
Book entes 2015Book entes 2015
Book entes 2015
 
Working With Interpreters in Palliative Care.
Working With Interpreters in Palliative Care.Working With Interpreters in Palliative Care.
Working With Interpreters in Palliative Care.
 

Similar to Segurity Empower Business

vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
Nicholas Chia
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
stefanjung
 

Similar to Segurity Empower Business (20)

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Keyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupaKeyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupa
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 

More from Nextel S.A.

Red hat transforme su negocio mediante una estrategia de virtualización abierta
Red hat transforme su negocio mediante una estrategia de virtualización abierta Red hat transforme su negocio mediante una estrategia de virtualización abierta
Red hat transforme su negocio mediante una estrategia de virtualización abierta
Nextel S.A.
 

More from Nextel S.A. (20)

Transformación de la organización TI
Transformación de la organización TITransformación de la organización TI
Transformación de la organización TI
 
Relación entre Tecnología y Negocio
Relación entre Tecnología y NegocioRelación entre Tecnología y Negocio
Relación entre Tecnología y Negocio
 
Visión práctica sobre catálogo de servicios y gestión de costes TIC
Visión práctica sobre catálogo de servicios y gestión de costes TICVisión práctica sobre catálogo de servicios y gestión de costes TIC
Visión práctica sobre catálogo de servicios y gestión de costes TIC
 
Nuevo modelo de gestión avanzada
Nuevo modelo de gestión avanzadaNuevo modelo de gestión avanzada
Nuevo modelo de gestión avanzada
 
La gestión de una empresa pública TI
La gestión de una empresa pública TILa gestión de una empresa pública TI
La gestión de una empresa pública TI
 
Futuro y Tendencias TI - Preparación de profesionales en la Universidad
Futuro y Tendencias TI - Preparación de profesionales en la UniversidadFuturo y Tendencias TI - Preparación de profesionales en la Universidad
Futuro y Tendencias TI - Preparación de profesionales en la Universidad
 
Presentacion de Nextel S.A.
Presentacion de Nextel S.A.Presentacion de Nextel S.A.
Presentacion de Nextel S.A.
 
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
¡Tsunami! ¿Vas a quedarte mirando la ola?: Panorama Actual de Ciberseguridad ...
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
 
Linked data: mayor granularidad, mayor control de acceso
Linked data: mayor granularidad, mayor control de accesoLinked data: mayor granularidad, mayor control de acceso
Linked data: mayor granularidad, mayor control de acceso
 
El Negocio del Riesgo
El Negocio del RiesgoEl Negocio del Riesgo
El Negocio del Riesgo
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
Ahorrar invirtiendo, los beneficios de una buena gestión TIC
Ahorrar invirtiendo, los beneficios de una buena gestión TICAhorrar invirtiendo, los beneficios de una buena gestión TIC
Ahorrar invirtiendo, los beneficios de una buena gestión TIC
 
redBorder: Open or die
redBorder: Open or dieredBorder: Open or die
redBorder: Open or die
 
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidadesLa Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
 
Gestión automatizada de la Continuidad de Negocio con GlobalContinuity
Gestión automatizada de la Continuidad de Negocio con GlobalContinuityGestión automatizada de la Continuidad de Negocio con GlobalContinuity
Gestión automatizada de la Continuidad de Negocio con GlobalContinuity
 
Caso práctico: Implementación de GlobalSuite en un entorno heterogéneo de gra...
Caso práctico: Implementación de GlobalSuite en un entorno heterogéneo de gra...Caso práctico: Implementación de GlobalSuite en un entorno heterogéneo de gra...
Caso práctico: Implementación de GlobalSuite en un entorno heterogéneo de gra...
 
El Reto de la Continuidad de Negocio
El Reto de la Continuidad de NegocioEl Reto de la Continuidad de Negocio
El Reto de la Continuidad de Negocio
 
Red hat transforme su negocio mediante una estrategia de virtualización abierta
Red hat transforme su negocio mediante una estrategia de virtualización abierta Red hat transforme su negocio mediante una estrategia de virtualización abierta
Red hat transforme su negocio mediante una estrategia de virtualización abierta
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Segurity Empower Business

  • 1. 1© Blue Coat Systems, Inc. 2011 PRESENTACIÓN DE SOLUCIONES JUNIO 27, 2013 Juan Carlos Peña Territory Account Manager Spain Juancarlos.pena@bluecoat.com 676995506
  • 2. 2Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. THREE ANNOUNCEMENTS •Acquisition of Solera Networks The Solera DeepSee platform will add industry-leading security analytics and forensic capabilities to the Blue Coat product portfolio.
  • 3. 3Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential Advanced Persistent Security™ that easily tells users what to look for—and at Blue Coat DeepSee®
  • 4. 4Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential Big Data Analytics DeepSee Big Data Security Analytics Partner IntegrationDeepSee® Applications Reports, GeoIP, Reconstruction, Packet Analysis Reputation, Threat Feeds, and File Analysis Threat Intelligence Sensors BLUE COAT DEEPSEE PLATFORM Use Cases Incident Response Situational Awareness Policy Compliance Continuous Monitoring Data Loss Monitoring & Analysis Cyber Threat Detection
  • 5. 5Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. THREE ANNOUNCEMENTS •Acquisition of Solera Networks The Solera DeepSee platform will add industry-leading security analytics and forensic capabilities to the Blue Coat product portfolio. •Acquired Appliance from Netronome. Blue Coat SSL Visibility Appliance, Intercepts SSL traffic independent of application protocol.
  • 6. 6Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential BLUE COAT SSL VISIBILITY APPLIANCE
  • 7. 7Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. THREE ANNOUNCEMENTS •Acquisition of Solera Networks The Solera DeepSee platform will add industry-leading security analytics and forensic capabilities to the Blue Coat product portfolio. •Acquired Appliance from Netronome. Blue Coat SSL Visibility Appliance, Intercepts SSL traffic independent of application protocol. •Acquired Crossbeam Systems, Inc Blue Coat X-Series Solution, X-Series provides unprecedented consolidation and scalability in a single chassis.
  • 8. 8Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential BLUE COAT VALUE SOLUTIONS BLUE COAT CLOUD SERVICE Wan OptimizationWeb Security CacheFlow Visibility
  • 9. 9Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential KEY CUSTOMER INITIATIVES BYOD Mobility Guest Wi-Fi Web Threat Protection Application control Web app/social media initiatives
  • 10. 10Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential BLUE COAT WEB SECURITY - UNIFIED SECURITY SOLUTIONS Negative Day Defense for Blocking Future Attacks Real-time Analysis of Encrypted and Unencrypted Content for Immediate Protection Layered Defense for Comprehensive Protection Proactively Protect All Users in Any Location Universal Policy Global Threat Defense Unified Reporting
  • 11. 11Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential Remote MobileHQ Branch Office UNIVERSAL POLICY UniversalPolicy Security Compliance & Logging Productivity Acceptable Use
  • 12. 12Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential Drill-down Analysis for Closed Loop Policy Actions & Infected Desktop Remediation Role-based Access & Data Anonymity to Meet Compliance Requirements Customizable Dashboards for Quick Access to Relevant Information BLUE COAT VALUE: UNIFIED REPORTING Granular Insight into All Web & User Activity Universal Policy Global Threat Defense Unified Reporting Blue Coat Unified Security Solutions
  • 13. 13Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential WAN INTERNET CONTROL DE TRÁFICO DE VÍDEO DATA CENTER Branch Office HTML5 HTML5HTML5 Optimización de Vídeo Blue Coat  Multiprotocolo: Flash, HTML5, Silverlight, WM  Live Stream-splitting  Video-on-Demand Caching  Optimización asimétrica Aplicaciones de Vídeo en crecimiento  Televisiones en Internet  WebCast corporativas  E-learning  Campañas de Comunicación internas
  • 14. 14Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential INTERNET APLICACIONES EN NUBE PUBLIC CLOUD/SaaS WAN Branch Office Blue Coat’s Cloud Caching Engine Acerca los contenidos de la nube
  • 15. 15Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential Gracias Juan Carlos Peña Territory Account Manager Spain Juancarlos.pena@bluecoat.com 676995506