The Blue Coat ProxyAV
Series™ integrated with the
Blue
Coat ProxySG
appliances are part of a
layered defense architecture
that also includes the
WebPulse collaborative cloud
defense. ProxyAV plays a key
role as the inline threat
detection layer for this
security framework where SSL
traffic is not always
visible to cloud analysis
and thus requires inline
inspection for threats and
data loss. ProxyAV also
analyzes all file downloads
from Web 2.0 sites with user
authentication or credential
tokens, plus web mail, file
sharing and other methods of
content delivery.
Key Features of ProxyAV
include:
-
Scalability and
Performance
-
Layered Security
-
Strongest System For
Preventing Unknown
Spyware
-
Ease of Deployment and
Administration
Scalability and Performance
Pairing the ProxyAV with the
ProxySG
provides significant
advantages for high-speed
Web threat analysis that
standalone systems cannot
match, such as:
-
ProxySG processes Web
objects at wire speed
with integrated caching
-
ProxyAV only scans Web
objects forwarded from
the ProxySG for improved
performance
-
ProxyAV eliminates
redundant scanning of
frequently downloaded
objects with
scan-once-serve-many-times
intelligent cache
integration
The Blue Coat solution means
less hardware, high
performance Web threat
analysis, and granular
control of Web
communications. The ProxyAV
with ProxySG provides a key
defense layer in an
extensible security
framework that works as an
integrated system.
Layered Security
Recent increases in Web
threats that infect popular
Web sites, search engine
results, social networking
environments, Web 2.0 blogs
and forums, and new levels
of phishing attacks show the
importance of a layered
security strategy. ProxyAV
provides the following
features:
-
Choice of anti-malware
engines with automated
updates on the ProxyAV,
allowing a layered virus
scanning strategy with
"Vendor A" for Web
gateway threat detection
and "Vendor B" for
desktops, servers and
gateways
-
Support for Kaspersky,
Sophos, Panda and McAfee
anti-malware engines
-
Option to detect malware
inside of encrypted SSL
traffic
-
Inbound and outbound
threat detection
deployments