The Blue Coat ProxyAV Series™ integrated with the Blue Coat ProxySG appliances are part of a layered defense architecture that also includes the WebPulse collaborative cloud defense. ProxyAV plays a key role as the inline threat detection layer for this security framework where SSL traffic is not always visible to cloud analysis and thus requires inline inspection for threats and data loss. ProxyAV also analyzes all file downloads from Web 2.0 sites with user authentication or credential tokens, plus web mail, file sharing and other methods of content delivery.
Key Features of ProxyAV include:
-
Scalability and Performance
-
Layered Security
-
Strongest System For Preventing Unknown Spyware
-
Ease of Deployment and Administration
Scalability and Performance
Pairing the ProxyAV with the ProxySG provides significant advantages for high-speed Web threat analysis that standalone systems cannot match, such as:
-
ProxySG processes Web objects at wire speed with integrated caching
-
ProxyAV only scans Web objects forwarded from the ProxySG for improved performance
-
ProxyAV eliminates redundant scanning of frequently downloaded objects with scan-once-serve-many-times intelligent cache integration
The Blue Coat solution means less hardware, high performance Web threat analysis, and granular control of Web communications. The ProxyAV with ProxySG provides a key defense layer in an extensible security framework that works as an integrated system.
Layered Security
Recent increases in Web threats that infect popular Web sites, search engine results, social networking environments, Web 2.0 blogs and forums, and new levels of phishing attacks show the importance of a layered security strategy. ProxyAV provides the following features:
-
Choice of anti-malware engines with automated updates on the ProxyAV, allowing a layered virus scanning strategy with "Vendor A" for Web gateway threat detection and "Vendor B" for desktops, servers and gateways
-
Support for Kaspersky, Sophos, Panda and McAfee anti-malware engines
-
Option to detect malware inside of encrypted SSL traffic
-
Inbound and outbound threat detection deployments