A look into the past can provide powerful insights into the future. Blue Coat uniquely has tremendous visibility on the worldwide web through its hundreds of collection points and prominent position in some of the world's largest enterprise and telco networks. In 2013 for example, all the deployed Blue Coat CacheFlow appliances processed over 850 petabytes of data and handled over 13.5 trillion requests!
Blue Coat at RSA 2014
Attending RSA 2014? Be sure to stop by Blue Coat—we have two booths. We’re in North Hall—booth 2721, and South Hall, booth 2009. This year, we’re talking Block, Analyze and Remediate. Today’s advanced persistent threats require security that bridges the gap between ongoing prevention, incident containment and remediation.
Going for the Gold - Managing Business Network Traffic During The Sochi Winter Olympics
Just days into the Winter Olympics, the seminal competition is drawing massive audiences. In fact, an average of 25.1 million people watched NBC’s primetime broadcast of the first day of the Sochi Winter Olympics.
I was recently in a discussion with a CIO, and he informed me that all pitches from all the vendors he's been talking to sound the same. Specifically he was of the belief that there was nothing unique about the Blue Coat solution, and he did not believe our claim that we were the only vendor offering our type of malware prevention and detection. He said our solution sounded like everyone else's.
It's that time of year again — the bustling holiday season when millions of consumers search for, click on and buy gifts for their loved ones online. Despite the impressive ease of doing so in 2013, a now ubiquitous mass of digital shoppers face the mounting threat of cyber attacks and phishing scams from increasingly efficient hackers attempting to steal credit card information and siphon money. See the staggering statistics below and familiarize yourself with the risks of online shopping.
Data security is a huge issue for any business today, as hackers have become increasingly sophisticated and, in many cases, their attacks are able to go completely undetected. The reasons individual companies experience security breaches vary from failing to follow standard safety protocols, to employees unknowingly aiding the attackers in their crimes. Business leaders would be wise to learn from the mistakes of their peers and not make the major security gaffes that the following organizations have made:
One of most interesting parts of my job at Blue Coat, is seeing firsthand the ebb and flow of new technologies as they enter and leave the security market. It’s fascinating to witness the diversity and richness that this technology segment has to offer, and one that I feel is still unmatched. This is due in part to the rampant pace of IT security, and of course, with that ferocity comes incredible technology innovation.
How safe is your social network? Checking your "Social Security" - What are you doing to protect your information?
It’s no secret that threats keep evolving. Today’s advanced threats are increasingly sophisticated, diverse, targeted, aggressive…and successful. Security breaches still happen at an alarming rate, despite the fact that security technologies and processes keep evolving too.
So, what’s the secret to effective protection against today’s advanced threats?