Home » Computer & Software » Hardware » Blue Coat Expands Security Industry–s Largest Collaboration for Encrypted Traffic Management
Ihren XING-Kontakten zeigen

Blue Coat Expands Security Industry–s Largest Collaboration for Encrypted Traffic Management

SUNNYVALE, CA — (Marketwired) — 10/07/15 — ., a market leader in enterprise security, today announced it has added seven new partners to the , bringing the total number of partners to 17. This group of leading security vendors forms the largest industry collaboration to help customers expose and combat threats hiding in encrypted traffic while also protecting privacy and ensuring compliance. Launched in March 2015, the ETM Ready Program is designed to prepare and certify to integrate SSL visibility solutions into the Blue Coat architecture, resulting in best-in-class security products to effectively detect and eliminate the hidden threats in encrypted traffic.

New members , , , , , and join founding ETM Ready partners , , , , , , , , and .

Today, the number of both business and consumer websites using SSL encryption as the default for securing all data in transit continues to grow. According to Blue Coat Labs research, of the top 10 most visited web sites, 100 percent of them use HTTPS, or encrypted traffic, rendering 100 percent of that traffic invisible to all security devices unless it is decrypted. The growing use of encryption to address privacy concerns is creating a perfect set of conditions for cyber criminals to hide malware inside encrypted transactions. In fact, Blue Coat researchers have found that it often reduces the level of sophistication required for malware to avoid detection, thereby making it easier for malware to get onto the network. The Blue Coat researchers found that over a typical seven-day period, out of 1.1 million new sites identified and classified, over 40,000 requests were newly-classified malicious HTTPS sites and 100,000 requests — or approximately 10 percent — to Command-and-Control HTTPS sites were already infected.

“Currently, encrypted traffic is a huge blind spot for enterprise visibility. The importance of privacy will ensure this trend continues, but investments in network security are largely being wasted when encrypted traffic isn–t being inspected,” said Adrian Sanabria, senior security analyst at 451 Research. “Sophisticated attackers know that evading defenses to get command and control traffic or data out of the enterprise is often as simple as using encryption in transit and perhaps a proxy or two. However, the technology to decrypt that traffic is only half the challenge — the other half is to leverage existing network security investments, which is why Blue Coat–s partnering efforts are so important.”

“As our customers increasingly adopt SSL visibility tools, the need for a solid way to manage them is growing. Blue Coat–s SSL visibility solution combined with its ETM Ready Program is an excellent solution that provides enterprises with insight into previously hidden threats,” said Davitt J. Potter, senior engineering manager with Arrow ECS. “As with any technology or tool that grants access to sensitive data, a rock-solid way to audit, manage, and control access to those powerful tools becomes necessary. We–re finding the combination of Gemalto–s SafeNet Luna SP HSM and Blue Coat–s SSL visibility solution makes deployment, management, and the scalability and usability of these tools simpler and more secure.”

“We–re definitely seeing a market need for the management and administration of the security infrastructure as more organizations face increasing SSL/TLS encrypted traffic and need effective protection of the certificates and keys along with it,” said David Etue, vice president, business development, identity & data protection, Gemalto. “Working with Blue Coat and having our industry-leading HSMs certified with the ETM Ready program is a great asset for our customers.”

“Encryption is the tool of choice to protect privacy. But it is also quickly becoming yet another method of attack across the threat landscape,” said Peter Doggart, vice president of business development for Blue Coat. “Our customers are telling us that protecting employee and customer data is critical, but they also need to protect their network and the sky-rocketing use of encryption is hindering their ability to do so. Blue Coat and our ETM Ready partners are working to ensure enterprises can protect both privacy and their networks even as their use of encryption grows.”

The ETM Ready Program is designed to enable Blue Coat technology partners to build solutions that help combat security threats hidden in encrypted traffic while preserving privacy, policy and regulatory compliance. By integrating their products with the , Blue Coat technology partners– products can offer certified solutions to detect, prevent and eliminate the hidden threats in encrypted traffic. For more Information, please visit .

“Today–s best practice in network security requires multiple inline security appliances to have visibility into the growing amount of SSL encrypted traffic. Integrating Blue Coat–s SSL visibility appliance with the GigaSECURE security delivery platform gives our joint customers scalable infrastructure that unobtrusively enables security analytics and inspection at scale.” – Johnnie Konstantas, director of security solutions marketing, Gigamon

“Detecting and responding to today–s cyber threats requires pervasive visibility across the entire network, including visibility into encrypted SSL traffic. The combination of Blue Coat–s encrypted traffic management solution and LogRhythm Network Monitor delivers a powerful new way to detect threats concealed within SSL traffic and provides a holistic view of application, network, and user activity, while preserving privacy and regulatory compliance.” – Matthew Winter, Vice President of corporate & business development, LogRhythm

“ManagedMethods is pleased to be part of Blue Coat–s Encrypted Traffic Management Ready Certification Program. With the increasing use of cloud applications and services (SaaS) in the enterprise, it is imperative that IT security organizations gain visibility into their usage. The combination of Blue Coat–s encrypted traffic management appliances and the ManagedMethods– Cloud Access Monitor product provide customers with a potent new weapon in the fight against Shadow IT. This is crucial today as most SaaS applications use encrypted traffic, which creates blind spots that traditional security measures cannot inspect.” -Charlie Sander, CEO, ManagedMethods

“With SSL encrypted traffic seen as an attractive place to hide malware, it–s important for IT to gain visibility for such traffic in order to prevent data leaks and other malicious activity. Symantec Data Loss Prevention (DLP) helps customers identify and protect sensitive information. By integrating with the Blue Coat SSL Visibility Appliance, our customers will now have an additional option to easily identify and monitor sensitive data shared outside of the organization.” – Nicolas Popp, vice president, information protection, Symantec

“Integrating with Blue Coat–s encrypted traffic management solution enables TopSpin an even better analysis and detection of the attackers– activities with the Internet and provides a complete picture of the attackers activities inside the organization and outside of the organization.” – Doron Kolton, CEO, TopSpin Security

“Trend Micro Deep Discovery provides unprecedented visibility throughout a customer–s network to mitigate next generation threats including targeted and zero-day attacks that can be delivered through encrypted communications. Working in concert with Blue Coat–s SSL Visibility Appliance will apply Deep Discovery–s dynamic capability to analyze this traffic and ensure these sophisticated attacks are contained in virtually real time. This, in turn, will provide customers with additional peace of mind without compromising privacy or performance.” – Kevin Simzer, CMO, Trend Micro

eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. eSentire–s flagship offering, Network Interceptor, challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. Protecting more than $2.5 trillion in Assets under Management (AuM), eSentire is the trusted choice for security decision-makers in the financial services, legal, healthcare, mining, engineering and construction, and technology industries.

Gigamon provides an intelligent Visibility Fabric architecture for enterprises, data centers and service providers around the globe. Gigamon–s technology empowers infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies and centralized management, the Gigamon GigaVUE portfolio of high availability and high-density products intelligently delivers the appropriate network traffic to management, analysis, compliance and security tools. Gigamon has been designing and building traffic visibility products since 2004 and its solutions are deployed globally across vertical markets including over half of the Fortune 100 and many government and federal agencies. Learn more at , the Gigamon Blog, or follow Gigamon on Twitter, LinkedIn or Facebook.

LogRhythm, a leader in and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company–s unifies next-generation , , , and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.

Consistently recognized by third-party experts, LogRhythm has been positioned as a Leader in report for four consecutive years, named a ” report and ranked Best-in-Class (No. 1) in DCIG–s 2014-15 SIEM Appliance Buyer–s Guide, awarded the SANS Institute–s “Best of 2014” award in SIEM and received the SC Magazine Reader Trust Award for “Best SIEM Solution” in April 2015. Additionally, the company earnedand has been named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region.

ManagedMethods– mission is to provide customers with an easy to use, efficient and effective Cloud Security Solution. We believe in the basics. You cannot secure what you do not know exists. Shadow IT is a real problem, but it does not need to be. With our products, companies can easily monitor and control the use of Cloud Applications (SaaS) and reduce their cloud risk.

Founded in 2013 by industry veterans of enterprise performance and security software, ManagedMethods products focus around the growing use of Cloud applications and services that are at the core of today–s mission critical business functions.

Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings — anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company–s more than 19,000 employees reside in more than 45 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2015, it recorded revenues of $6.5 billion. To learn more go to or connect with Symantec at: .

TopSpin Security provides a solution that protects organizations from loss of valuable data and prevents disruption of operations. The emphasis is on accuracy, minimal overhead and simplicity of deployment and usage. The company–s solution incorporates a set of unique security engines that discover infected assets in organizations before damage is done. These include active deception, automatic configuration to networks and automated structured analysis of network traffic. For more information, visit .

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 26 + years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based , the Trend Micro Smart Protection Network infrastructure, and are supported by more than 1,200 threat experts around the globe. For more information, visit .

Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. Blue Coat was acquired by Bain Capital in March 2015. For additional information, please visit .

Blue Coat and the Blue Coat logo are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners.

Maureen O–Connell
Blue Coat Systems

408-541-3279

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop