Company Blog

THE WEB IN 2014: WHAT 2013 PREVIEWED

March 17, 2014 - By Jeff Brainard
 A look into the past can provide powerful insights into the future. Blue Coat uniquely has tremendous visibility on the worldwide web through its hundreds of collection points and prominent position in some of the world's largest enterprise and telco networks. In 2013 for example, all the deployed Blue Coat CacheFlow appliances processed over 850 petabytes of data and handled over 13.5 trillion requests!

Blue Coat at RSA 2014

February 24, 2014 - By Maureen Oconnell
Blue Coat at RSA 2014 Attending RSA 2014? Be sure to stop by Blue Coat—we have two booths. We’re in North Hall—booth 2721, and South Hall, booth 2009.  This year, we’re talking Block, Analyze and Remediate. Today’s advanced persistent threats require security that bridges the gap between ongoing prevention, incident containment and remediation.

Why Your Mobile Device Isn’t As Secure As You Think

February 20, 2014 - By Blue Coat
 

Going for the Gold

February 19, 2014 - By Maureen Oconnell
 Going for the Gold - Managing Business Network Traffic During The Sochi Winter Olympics  Just days into the Winter Olympics, the seminal competition is drawing massive audiences. In fact, an average of 25.1 million people watched NBC’s primetime broadcast of the first day of the Sochi Winter Olympics.

Finding the Value in the Blue Coat Solution

January 9, 2014 - By Tim Chiu
I was recently in a discussion with a CIO, and he informed me that all pitches from all the vendors he's been talking to sound the same.  Specifically he was of the belief that there was nothing unique about the  Blue Coat solution, and he did not believe our claim that we were the only vendor offering our type of malware prevention and detection.  He said our solution sounded like everyone else's.

The Growth and Risks of Online Shopping [Infographic]

December 5, 2013 - By Blue Coat
It's that time of year again — the bustling holiday season when millions of consumers search for, click on and buy gifts for their loved ones online. Despite the impressive ease of doing so in 2013, a now ubiquitous mass of digital shoppers face the mounting threat of cyber attacks and phishing scams from increasingly efficient hackers attempting to steal credit card information and siphon money. See the staggering statistics below and familiarize yourself with the risks of online shopping.

Avoid Cyber Risk: 7 Major Global Security Breaches

December 3, 2013 - By Blue Coat
Data security is a huge issue for any business today, as hackers have become increasingly sophisticated and, in many cases, their attacks are able to go completely undetected. The reasons individual companies experience security breaches vary from failing to follow standard safety protocols, to employees unknowingly aiding the attackers in their crimes. Business leaders would be wise to learn from the mistakes of their peers and not make the major security gaffes that the following organizations have made:  

Embracing an Open Ecosystem

November 19, 2013 - By Peter Doggart
One of most interesting parts of my job at Blue Coat, is seeing firsthand the ebb and flow of new technologies as they enter and leave the security market. It’s fascinating to witness the diversity and richness that this technology segment has to offer, and one that I feel is still unmatched. This is due in part to the rampant pace of IT security, and of course, with that ferocity comes incredible technology innovation.

How safe is your social network?

November 13, 2013 - By Blue Coat
How safe is your social network? Checking your "Social Security" - What are you doing to protect your information?

A Lifecycle Approach to Advanced Threat Protection

November 11, 2013 - By Kevin Flynn
It’s no secret that threats keep evolving. Today’s advanced threats are increasingly sophisticated, diverse, targeted, aggressive…and successful. Security breaches still happen at an alarming rate, despite the fact that security technologies and processes keep evolving too. So, what’s the secret to effective protection against today’s advanced threats?