Upload
lamminh
View
218
Download
2
Embed Size (px)
Citation preview
The world’s most robust
and comprehensive
enterprise web and
applications security
solutions
Made in India. Built for the world.
Your trusted technology partner for web security
Web Application
Security
Secure Web Gateway
Application Layer Firewall
Helping You to Harness the Internet, Securely
rf
Pioneering Innovation
Building the technology, you will need tomorrow
Gateway-Level Multi-Scan Malware Defence Against Zero Day Attacks
Content Filtering Proxy Server, With Generic ICAP Connector
Clustering-Ready Web Filtering Proxy, For Profiled Internet Access
Gateway-Level Real-Time Image Analyser For Detection Of Pornography
Secure Web Gateway Solution For Networks With Multiple LDAP Services
100% Software Based Download-And-Deploy Web Security Solution, With Integrated Disaster Recovery
We Built the World's 1st
24
Over 10,000 installations, worldwide
Solutions serving over 20 Million users across a variety of segments
Web Security Solutions
Securely distribute Internet access across large user networks
Enhance User Experience
Stop Unauthorized Access
Block Inappropriate Content
Prevent Confidential Data Leaks
Prevent Malware related Outages
Shield Users from Phishing Attacks
Protect against Security Accidents
rf
Enforce Internet
Use Policies
Mitigation of both internal and external threats
Meet your web security goals, comprehensively
Boost productivity of your knowledge-workers
Protect your enterprise against productivity losses, and collateral losses
BoostProductivity
MitigateCyber
Liability
CurtailCyber-
slacking
EnsureData
Security
OptimiseBandwidth
Validate Usage
rfMost Comprehensively Designed Application Layer Firewall
SafeSquid is an HTTP Proxy Server specially designed for web security
Real-Time Content Security
Mitigate Threats at
the Gateway
Profiled Internet Access
Prevent Abuse and
Misuse
Traffic Intelligence
Validate Policy
Compliance
Scalable Architecture
Meet Topological Challenges
Easy Manageability
Reduce TCO
rf
Deep Protocol and Payload Modification
Full range of capabilities to defend you against both - internal and external threats
Malware DefenceReal-time Text and
Image AnalysisUpload Control SSL Security
Reprogrammable Engines
Meta-Scanning Malware Defence Technology
Reliable gateway-level mitigation of malware threats
In-Memory Virus Scanner
High-SpeedOn-The-Wire
Malware Defence
ClamAV
Open-Source Defence Against Targeted Attacks
ICAP
Engage Third-Party Malware Defence
Technologies
External Parser
Deploy Custom Malware Defence
Process
Logical Content Analysis Neural Network
Context-sensitized security
Pornographic Image Detection
• Skin Tone & Vector Analysis of Images
• 95% Accuracy
• Discovers Unclassified Pornographic Web-Sites
Text Analyzer
• Uses PCRE for Logical Textual Content Analysis
• Customizable to Cover Any Language
• Discovers Unclassifed Web-Sites that Serve Inappropriate Content
Categorized Database of Web-Sites
• Over 60 Million Web-Sites
• Pre-Classified in 40 Categories
• Create Custom Categories and include any Web-Sites to Meet Business Challenges
Create Policies for Content Type and Size
• Smart Discovery of Data Mime Type
• Prevent Downloads of Large Files
• Block Download of Music, Movies, Unwanted Software, etc.
ApplicationRe-Design
Open Architecture
ClusterOpen Architecture
Flexible solutions that adapt to your business requirements, and fuel growth
Deep Inspection Neural Network
Comprehensive web security for your users
Content Analysis
Source Security
PrivacyData
Security
Sophisticated Gateway-Level Protection against Phishing Attacks
Prevent your unsuspecting users from becoming victims of cyber attacks
Source Security
DNSBL SSL Certificates Attackers Database
Protection against Privacy Breaches
Empower your users to freely access the web
Proxy Chains
Data Leakage Prevention
Prevent loss of confidential data due to careless, or malafide employees
Deep POST DATA
Inspection
Elevated Privacy
Controls
Profiled Internet Access
Who
What
When
Where
How
How Much
Role Based User Policies
Define policies to meet business goals
Multiple user identification options
Integrate seamlessly with any user validation service
Directory Service
Integration
IP Based Policies
Kerberos based SSO
Integrated Captive Portal
Application Management
Client Application
Identity
Web-Site Categorization
Web 2.0 Application
Controls
Access Control
Content Control
Throughput Control
Application Identity Management
Create granular policies to ensure precise web access restrictions
Login Controls
Feature Controls
Data Capture
Usage Analysis
Extensive Web Application Controls
Enforce security policies to prevent misuse of Web 2.0 applications
100% Software based Solution
Setup your secure web gateway as a virtual appliance, hardware appliance, or in-cloud
In-Cloud SolutionWorld's Most Scalable
SWG Solution
Amazon® AWS
Microsoft® Azure
Rackspace® Cloud
Any Private Cloud
Virtual Appliance
Hardware Appliance
On-Demand Hybrid
On-Premise Solution
Robust Architecture Optimized for Resource Utilization
Scale up system resources to meet increase in throughput demands
>5000 Concurrent Connections
In-Memory DNS Caching
Session Caching
Content Pre-fetching
Connection Pooling
Seamless Addition of Nodes to SWG Cluster
Add nodes to the load-balanced clusters for redundancy and throughput
Scale Out
Cluster Ready
WCCP Compatible
Automatic Policy
Replication
Unmatched Scalability
Create load-balanced clusters or geographically distributed nodes to meet your business requirements
Scalable Architecture
100% Software
Scale Up Scale Out
Zero Cost Redundancy
Rea
l-Ti
me
Co
nten
t Se
curi
ty
Content Analysis
Meta-Scan
ICAP
ClamAV
External ParserIn-Memory Virus
Scanner
Pornographic Image Detection
Text-Analysis
Content Re-Write
Source Security
DNSBL
SSL Certificates
Data Security
DLP
Elevated Privacy
Privacy
Proxy-Chains
Cookie Control
Header Obfuscation
Pro
file
d In
tern
et A
cces
s
Application Management
Client Application Identity
Web-Site Categorization
Web 2.0 Access Controls
Feature Control
Content Control
User Identity Management
Multi LDAP Integration
User / Group / IP based Policies
Credential Management
Scal
able
Arc
hit
ectu
re
100% Software
Installable Software
Appliance Builder
Virtual Appliance
Hardware Appliance
Cloud
Scale Up
>5000 ConcurrentConnections
In-Memory DNS Caching
Content Caching
Content Pre-fetching
Connection Pooling
Scale Out
Cluster-Ready
WCCP
Zero Cost Redundancy
Shareable Activation Key
Pay-As-You-Go
Global Relocation
Deliver high-performance web security with an enhanced user experience
Sophisticated Technology, Robust Architecture
PAM-Aware LDAP-Aware Kerberos Aware
Basic / SSO Authentication In-Memory virus scanner ICAP ready
Clustering-ready SMP-aware Application Filter
Customizable URL DB Categorized Web-Site DB DNSBL Filter
Header Filter Cookie Filter PCRE aware
HTTPS Inspection Application Profiling Response Profiling
Time Profiles Content Caching DNS Caching
External Parsers Intrinsic WebUI Pornographic Image detection
Text Analyzer Real-time content modification Content Control
Application Control User Limits Custom Templates
Customization Library Open Format Logs Content Caching
DLP Appliance ISO Content Pre-fetching
Integrated Captive Portal IPv6 Orchestration Metrics
DLP POST-mortem Public SDK WCCP
Features designed to solve most complex requirementsAdvanced Features, State-of-Art Implemetation
Subscription Plans Designed For Low TCO
Setup a cost-efficient web security solution for your enterprise
Shareable Activation
Key
Pay-As-You-Go Subscription Plans
Global Relocation
Cloud Backed Disaster Recovery
Comprehensive Solutions Portfolio
Complete eco-system of solutions to meet your business challenges
• Secure Web Gateway for large networks
• Software Appliance
SAB
• Secure Web Gateway as native Windows service
• Ideally suited for legacy Microsoft Networks
SafeSquid Lite
•Advanced Data Leakage Protection for Web Gateways
DLPv2
• In-Cloud Secure Web Gateway
• IAAS Agnostic
Cloud Based
•Consolidated Analytics for clusters
•Dedicated SIEM for HTTP
Data Aggregator
•Web Security for Roaming Users
BYOD Client
•Application Layer Security for web services
WAF
•Historical analysis of security breaches
Forensic Library
Voltas LimitedUser
India's largest air conditioning company, among world's premier engineering solutions providers and project specialists.
User Profile
Internet available to only 10% out of 2000 knowledge workers operating out of 20 cities.
Year 2007
Internet-enable entire workforce.Goal
• Safely distribute Internet Access to all knowledge workers
• Prevent productivity losses due to any misuse
• No IT security expertise to manage and monitor web security
• No centralized user identity management system
• Ensure Seamless transition when a user changes work office
• Maintain readiness for proposed setup of Microsoft Active Directory Services
Challenge
• SafeSquid deployed on Linux across multiple locations
• Managed by TCS
Solution
• Integration with Microsoft AD, achieved at all locations
Benefit
Case Study
Secure Web Gatewayfor Enterprise Network Users
Safran S.A.
User
French multinational aircraft engine, rocket engine, aerospace-component, defense, and security company. Its headquarters are located in Paris. The company is a component of the Euro Stoxx 50 stock market index.
User Profile
Sensitive data collation required on web-assets. Over 50% Security risk in accessing uploaded content. Regular attempts to compromise operations via malware injection.
Year 2012
Ensure 100% sterility in all uploaded content. Prevent malafide access to web assets.
Goal
•Meet the demands of security architecture designed by IBM to screen uploaded content.
• Forensic analysis of all uploaded content.
• Policy replication across web-security cluster.
Challenge
• SafeSquid based Reverse Proxy cluster with customized content screening and logging add-ons
•Managed by IBM
Solution
• 100% uploaded content sterility.
•Reliable high-availability of all web-assets.
Benefits
Case Study
Web Application Securityfor Paranoid Level Malware Defence
Telefonica O2 WiFi
User
Telefonica launched O2 WiFi to change the WiFi market. O2 WiFi is a free, fast, reliable and easy to use public WiFi service across thousands of locations nationwide.
User Profile
Scale up the new start-up to over 10 Million users across UK and create a sustainable Location Based Advertising business.
Year 2012
Ensure high quality of user experience to over 10.2 Million people who use it for checking emails, uploading photos to Facebook, watching videos on YouTube, and all such applications possible from a smartphone, tablet or laptop.
Goal
• Prevent saturation of Internet resources.
• Ensure users' security confidence.
• Integrate with Location Based Advertising business.
• Scale the solution on-demand.
Challenge
• Customized edition of SafeSquid
• Integration with Symantec's RuleSpace
• Self-deployable packaged software
Solution
• Scaled business to desired goals within 1 year.
• Completely in-house managed by O2 WiFi
Benefits
Case Study
Public WiFi Hotspot Securityfor Location Based Advertising
Case Study
Secure Web Accessfor Sensitive Government Establishments
Bhabha Atomic Research Center
User
BARC is the mother of the R&&D institutions such as IGCAR, RRCAT, VECC, etc., which carry out pioneering research on nuclear and accelerator technologies and industrial establishments such as NPCIL, NFC, ECIL, etc., spearheading nuclear power production, materials technology, electronics & instrumentation.
User Profile
Web Security team distributes Internet across to multiple strategic units and establishments. Users spread across more than 100 Networks, and 25 Directory Services.
Year 2007
Provide secure web gateway to multiple autonomous establishments.
Goal
• Comprehensive security (meta-scanning), with full technology transparency.
• Ease of management.
• Scalability for location, concurrency, and reporting.
• Flexibility for reporting customization.
• Only 10% Internet-enabled locations
• Make in India
Challenge
• Secure web gateway as a High-availability cluster.
• Packaged Installable Software, compatible for all Linux distributions (Scientific Linux)
• Integration with Multiple LDAP services
• 8x5 Priority Support
Solution
• 100% Internet-enabled Locations
• Integrated with self-developed IDS and SIEM
• Fully self managed by BARC web security team.
Benefits