Blue Coat Systems

Displaying 1-33 of 33 results

  • eBooks // Sep 2014

    Blue Coat's Encrypted Traffic Management Interactive E-Guide

    According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to...

    Sponsored By Blue Coat Systems

  • eBooks // Sep 2014

    Stop Attacks Hiding Under the Cover of SSL Encryption

    Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

    Sponsored By Blue Coat Systems

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2014

    Blue Coat SSL Visibiity

    To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

    Sponsored By Blue Coat Systems

  • White Papers // Nov 2013

    From Risk to Results: How Security Technology Improves Business Results

    IDC White Paper shares "How Security Improves Business Results". Learn why organizations should consider security technologies and infrastructures as enabling elements, not burdensome technology shackles and to think about what can be done from a security standpoint to mitigate risk as much as possible without stifling the underlying value of...

    Provided By Blue Coat Systems

  • White Papers // Nov 2013

    Advanced Threat Protection for Dummies

    Cyber attacks are becoming more sophisticated, more targeted, and more persistent. You need a comprehensive defense that can protect against real-time advanced threats and retrospectively process traffic to protect against threats not detected in real-time. Download now and learn how to: - Recognize when your organization has been compromised -...

    Provided By Blue Coat Systems

  • White Papers // Nov 2013

    Advanced Threat Protection Lifecycle Defense

    View the infographic that quantifies the growing problem with advanced threats and presents a three-stage, lifecycle solution for total protection.  

    Provided By Blue Coat Systems

  • White Papers // Oct 2013

    Finding Hidden Threats by Decrypting SSL

    More than one-fourth of all traffic inside any organization is encrypted with SSL/TLS. How do you ensure the encryption is hiding only sensitive data and not malware or exfiltration of your data? What steps should you take to ensure your traffic is appropriately monitored and analyzed when users are connecting...

    Provided By Blue Coat Systems

  • White Papers // Oct 2013

    Freedom of Choice: What Technology Autonomy Means for the Business

    A new report by The Economist Intelligence Unit shows more than 80% of executives now feel that technology autonomy is critical to boosting business performance. In fact, companies with high profit and revenue growth currently provide more freedom of choice than lower-growth companies. Read the Economist report entitled “Freedom...

    Provided By Blue Coat Systems

  • White Papers // Oct 2013

    A Complete Lifecycle Approach to Advanced Threat Protection

    Enabling users to choose their own devices, applications, technologies, services and data enables your organization to achieve key strategic goals. Yet the threat of security breaches is a barrier that can’t be ignored. According to the 2013 Internet Security Threat Report, 5,291 new vulnerabilities were discovered in 2012 alone. Find...

    Provided By Blue Coat Systems

  • White Papers // Jul 2013

    The Economist Intelligence Report: WHAT TECHNOLOGY AUTONOMY MEANS FOR THE BUSINESS

    The report shows a link between greater autonomy and business performance. It also highlights the increasing alignment between IT and the business on the risks and benefits of providing greater technology choice for users. Highlighted findings include: The fastest growing companies in the world believe that greater technology...

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Top 5 Strategies For Assuring SaaS Application Performance

    As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from Blue Coat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Assuring Performance For Cloud-Based Applications

    Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Building A Web Security Architecture

    CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper...

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Emerging Mobile Security Challenges

    All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Business Assurance Technology Infographic

    Do you believe that empowered employees make businesses more profitable? You’re not alone. But how will you empower your company’s workforce to use the devices and apps they want, when they want to, without compromising security? And how will you support the full range of IT initiatives—from advanced threat protection,...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    IDC Security Infographic

    From the Era Before security to this current era of empowerment this infographic from Blue coat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Key Drivers: Why CIOs Believe Empowered Users Set the Agenda for Enterprise Security

    Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Security Empowers Business

    For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and...

    Provided By Blue Coat Systems

  • White Papers // Apr 2013

    Secure Web Gateway Buyers Guide

    More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from...

    Provided By Blue Coat Systems

  • White Papers // Apr 2013

    Virtualized Security: The Next Generation of Consolidation

    Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from...

    Provided By Blue Coat Systems

  • White Papers // Apr 2013

    Virtualized Security: The Next Generation

    Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from...

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Mobile Malware Report: 2013

    Mobile users are transforming the scope and volume of human interactions globally. This transformation is enabled by the ubiquity of mobile devices, unprecedented access to the Internet from virtually any location and a growing wealth of mobile applications. The unfettered growth in mobility has also created an alluring opportunity for...

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Secure Web Gateways Buyer's Guide

    The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the volume, not to mention the increasing sophistication of all these web-based threats?...

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Unified Web Security Solutions. Deliver No-Boundaries Protection To Users That Are Always On

    Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations...

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Unified Web Security Solutions. Deliver No-Boundaries Protection

    Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations...

    Provided By Blue Coat Systems

  • White Papers // Feb 2013

    Ponemon Institute Research Report: The Post Breach Boom

    This groundbreaking study from Ponemon Institute polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-malicious data breaches. Key findings of the report include: Data breaches are on the rise and organizations are unprepared...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    2013 Mobile Malware Report

    While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Top 5 Strategies for Assuring SaaS Application Access and Performance

    As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Assuring the Performance of Cloud-Based Applications

    Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

    CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Top 5 Requirements for Guest Wi-Fi Access

    While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? ...

    Provided By Blue Coat Systems

  • White Papers // Dec 2012

    Mobile Security Challenge Emerges

    All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices...

    Provided By Blue Coat Systems

  • eBooks // Sep 2014

    Blue Coat's Encrypted Traffic Management Interactive E-Guide

    According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to...

    Sponsored By Blue Coat Systems

  • eBooks // Sep 2014

    Stop Attacks Hiding Under the Cover of SSL Encryption

    Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

    Sponsored By Blue Coat Systems

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2014

    Blue Coat SSL Visibiity

    To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

    Sponsored By Blue Coat Systems

  • White Papers // Jul 2013

    The Economist Intelligence Report: WHAT TECHNOLOGY AUTONOMY MEANS FOR THE BUSINESS

    The report shows a link between greater autonomy and business performance. It also highlights the increasing alignment between IT and the business on the risks and benefits of providing greater technology choice for users. Highlighted findings include: The fastest growing companies in the world believe that greater technology...

    Provided By Blue Coat Systems

  • White Papers // Oct 2013

    Finding Hidden Threats by Decrypting SSL

    More than one-fourth of all traffic inside any organization is encrypted with SSL/TLS. How do you ensure the encryption is hiding only sensitive data and not malware or exfiltration of your data? What steps should you take to ensure your traffic is appropriately monitored and analyzed when users are connecting...

    Provided By Blue Coat Systems

  • White Papers // Oct 2013

    Freedom of Choice: What Technology Autonomy Means for the Business

    A new report by The Economist Intelligence Unit shows more than 80% of executives now feel that technology autonomy is critical to boosting business performance. In fact, companies with high profit and revenue growth currently provide more freedom of choice than lower-growth companies. Read the Economist report entitled “Freedom...

    Provided By Blue Coat Systems

  • White Papers // Nov 2013

    From Risk to Results: How Security Technology Improves Business Results

    IDC White Paper shares "How Security Improves Business Results". Learn why organizations should consider security technologies and infrastructures as enabling elements, not burdensome technology shackles and to think about what can be done from a security standpoint to mitigate risk as much as possible without stifling the underlying value of...

    Provided By Blue Coat Systems

  • White Papers // Nov 2013

    Advanced Threat Protection for Dummies

    Cyber attacks are becoming more sophisticated, more targeted, and more persistent. You need a comprehensive defense that can protect against real-time advanced threats and retrospectively process traffic to protect against threats not detected in real-time. Download now and learn how to: - Recognize when your organization has been compromised -...

    Provided By Blue Coat Systems

  • White Papers // Oct 2013

    A Complete Lifecycle Approach to Advanced Threat Protection

    Enabling users to choose their own devices, applications, technologies, services and data enables your organization to achieve key strategic goals. Yet the threat of security breaches is a barrier that can’t be ignored. According to the 2013 Internet Security Threat Report, 5,291 new vulnerabilities were discovered in 2012 alone. Find...

    Provided By Blue Coat Systems

  • White Papers // Nov 2013

    Advanced Threat Protection Lifecycle Defense

    View the infographic that quantifies the growing problem with advanced threats and presents a three-stage, lifecycle solution for total protection.  

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    2013 Mobile Malware Report

    While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users...

    Provided By Blue Coat Systems

  • White Papers // Apr 2013

    Secure Web Gateway Buyers Guide

    More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from...

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Mobile Malware Report: 2013

    Mobile users are transforming the scope and volume of human interactions globally. This transformation is enabled by the ubiquity of mobile devices, unprecedented access to the Internet from virtually any location and a growing wealth of mobile applications. The unfettered growth in mobility has also created an alluring opportunity for...

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Secure Web Gateways Buyer's Guide

    The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the volume, not to mention the increasing sophistication of all these web-based threats?...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Top 5 Strategies for Assuring SaaS Application Access and Performance

    As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.

    Provided By Blue Coat Systems

  • White Papers // Dec 2012

    Mobile Security Challenge Emerges

    All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices...

    Provided By Blue Coat Systems

  • White Papers // Apr 2013

    Virtualized Security: The Next Generation of Consolidation

    Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Assuring the Performance of Cloud-Based Applications

    Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Unified Web Security Solutions. Deliver No-Boundaries Protection To Users That Are Always On

    Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    IDC Security Infographic

    From the Era Before security to this current era of empowerment this infographic from Blue coat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Key Drivers: Why CIOs Believe Empowered Users Set the Agenda for Enterprise Security

    Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Security Empowers Business

    For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Business Assurance Technology Infographic

    Do you believe that empowered employees make businesses more profitable? You’re not alone. But how will you empower your company’s workforce to use the devices and apps they want, when they want to, without compromising security? And how will you support the full range of IT initiatives—from advanced threat protection,...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

    CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper...

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Top 5 Strategies For Assuring SaaS Application Performance

    As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from Blue Coat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Assuring Performance For Cloud-Based Applications

    Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.

    Provided By Blue Coat Systems

  • White Papers // Mar 2013

    Unified Web Security Solutions. Deliver No-Boundaries Protection

    Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations...

    Provided By Blue Coat Systems

  • White Papers // Apr 2013

    Virtualized Security: The Next Generation

    Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from...

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Building A Web Security Architecture

    CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper...

    Provided By Blue Coat Systems

  • White Papers // Jun 2013

    Emerging Mobile Security Challenges

    All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices...

    Provided By Blue Coat Systems

  • White Papers // Jan 2013

    Top 5 Requirements for Guest Wi-Fi Access

    While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? ...

    Provided By Blue Coat Systems

  • White Papers // Feb 2013

    Ponemon Institute Research Report: The Post Breach Boom

    This groundbreaking study from Ponemon Institute polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-malicious data breaches. Key findings of the report include: Data breaches are on the rise and organizations are unprepared...

    Provided By Blue Coat Systems