Académique Documents
Professionnel Documents
Culture Documents
Empowers
Business
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL
such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps are commonplace. Even email
applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps.
Its clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need
the ability to preserve complete network and web histories from encrypted network and web traffic for compliance,
regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
This lack of visibility into SSL can make it difficult or impossible for
network administrators to enforce corporate acceptable use policies
and to ensure that threats like viruses, spam and malware are stopped
before they reach individual users. The inability to examine the contents
of SSL communications also makes it possible for information to be
accidentally leaked out of the enterprise or worse, stolen.
Regulatory compliance requirements, including the identification of
accidental or intentional leakage of confidential information, are also
virtually impossible to meet because of SSL encryption. In many
instances, enterprises face conflicting requirements to encrypt and
examine data. In typical installations, these seemingly incompatible
requirements cannot be met with acceptable performance. This SSL
conundrum has wreaked havoc on organizations subject to industry
and government compliance mandates, such as HIPAA and SarbanesOxley (SOX), which require that only authorized individuals have access
to hardware and software resources within the network infrastructure.
Other compliance mandates require organizations with publicly
accessible networks to be able to provide law enforcement agencies
with documentation of network activity which requires that all traffic be
unencrypted.
SOLUTION BRIEF
SOLUTION BRIEF
Security
Empowers
Business
SOLUTION BRIEF
SSL traffic; deployments that feed passive security appliances are better
suited for logging and visibility requirements.
Security
Empowers
Business
The decrypted content from the SSL Visibility Appliance is designed for
application preservation. Intercepted plaintext is delivered to security
appliances as a generated TCP stream that contains the packet headers
as they were received. This allows applications and appliances used for
IDS, IPS, forensics, data loss prevention, and other measures to expand
their scope to SSL-encrypted traffic.
The SSL Visibility Appliance also supports input aggregation and output
mirroring. Input aggregation allows aggregation of traffic from multiple
network taps onto a single passive-tap segment for inspection. Output
mirroring allows the Appliance to feed traffic to one or two attached
passive security appliances in addition to the primary active security
appliance.
SSL Visibility Appliances are designed for high availability with
integrated fail-to-open hardware and configurable link state monitoring
and mirroring for guaranteed network availability and network security.
For those deployments where security certification is a requirement,
Blue Coats SSL Visibility Appliances are in the process of receiving
FIPS 140-2 Level 2 certification.
ProxyAV, DLP, etc.
Security Solution
CERTIFICATE
CERTIFICATE
CERTIFICATE
CN: Gmail
CA: ProxySG Cert
CN: Gmail
CA: ProxySG Cert
CN: Gmail
CA: Verisign
SSL interception and filtering is not a new feature for the Blue Coat
ProxySG. SSL Proxy has been an integral part of it for well over five
years. It includes the ability to selectively inspect attachments for
malware, and content for data leakage prevention, through the use of
policy. It also enables third-party integration of anti-malware and DLP
offerings over ICAP (Internet Content Adaptation Protocol). SSL Proxy
terminates and re-establishes SSL connections and allows the ProxySG
to securely send attachments and content for inspection services.
Encrypted Tap builds on the SSL Proxy and allows all or selected SSLencrypted web traffic to be decrypted and its content streamed to a
third-party system for additional analysis, archiving, and forensics.
Encrypted Tap is available for the SG600, SG900 and SG9000 series
Blue Coat ProxySG appliances. These appliances already include SSL
hardware assist and SSL licenses, and would need only the additional
Encrypted TAP license to deliver SSL visibility.
The ProxySG with SSL Proxy and Encrypted Tap allows organizations
to eliminate the SSL blind spot with visibility and control over SSLencrypted traffic. They can stop rogue applications from using SSL to
subvert enterprise controls and security measures, and they can scan
SSL-encrypted traffic for viruses, worms, and Trojans, and stop them at
the gateway.
The solution can also help prevent spyware from installing or
communicating over SSL; halt secured phishing and pharming attacks
that use SSL to hide from IT controls or to increase the appearance of
authenticity; and accelerate approved and safe SSL-encrypted traffic.
ProxySG
SSL Visibility
Appliance
Encrypted Traffic
Decrypted Traffic
Encrypted Tap
Blue Coat Encrypted Tap is a new optional feature for ProxySG
appliances that works with the SSL proxy to provide complete visibility
into SSL traffic. Encrypted Tap sends a stream of decrypted traffic
to third-party logging systems for analysis, archiving, and forensics.
By providing this SSL visibility and control, Blue Coat now offers a
complete SSL web security solution with its ProxySG family of secure
proxy appliances.
SOLUTION BRIEF
Security
Empowers
Business
Conclusion
Blue Coat offers more than the industrys most advanced and
sophisticated security technology. We offer a whole new outlook
on how security technology provides business value. Its called
Business Assurance Technology. And its delivered by our Centers,
a comprehensive array of technologies, products, services, and
capabilities that give you total protection and help you see
and exploit new opportunities. With the products, services, and
technologies within Resolution Center, you get the intelligence
you need to understand all of the traffic on your network even
encrypted SSL traffic so you can make informed decisions. Blue
Coat offers two options for SSL Visibility, a key component in our
Resolution Center.
Learn more about our Centers at
www.bluecoat.com/business-assurance-technology
2013 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter, CacheEOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, Mach5, Packetwise, Policycenter, ProxyAV, ProxyClient,
SGOs, WebPulse, Solera Networks, the Solera Networks logos, DeepSee, See Everything. Know Everything., Security Empowers Business, and BlueTouch are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain
other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties
are the property of their respective owners. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. Blue Coat products, technical services, and any other technical data
referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and
acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you. v.SB-SSL-VISIBILITY-EN-v1c-0813