sb-au logo
Story image

Blue Coat dominates network security forensics market

Blue Coat Systems has been acknowledged for its dominance in the global network security forensics market, with Frost & Sullivan presenting the company with a Leadership Award for capturing the highest market share within its industry. 

According to Frost & Sullivan, Blue Coat achieved 14% share in the $1 billion-plus network security forensics market in 2015, making it the market leader.

The Blue Coat Security Analytics offering provides an integrated solution that offers packet analysis, metadata collection, comprehensive threat detection and unknown file inspection, combining analytics and threat intelligence, packet inspection, and network visibility.

“Blue Coat Security Analytics includes incident detection, network performance, sandbox integration, deep packet inspection, and network security forensics integrated within the same solution,” says Frost & Sullivan industry analyst Chris Kissel. 

“The integration of technologies helps incident response teams establish a ‘system of record’ using full traffic capture and replay capabilities to improve incident resolution and forensic,” he says.

“Additionally, Blue Coat’s Global Intelligence Services enhance the quality and depth of the metadata its Security Analytics draws from for a network security forensics investigation.”

Alan Hall, director of product marketing for security analytics, Blue Coat Systems, says the company is honoured to be granted Frost & Sullivan’s 2016 Global Leadership Award in the security forensics market.

“As the traditional notion of the network perimeter has expanded, so too has the attack surface. There are now endless entry points for cyber-attacks. Blue Coat’s mission is to provide enterprises a way to not only block attacks before they happen, but track, respond to and mitigate any attacks that do happen,” Hall says.

“Network forensics delivered by Blue Coat Security Analytics is a key component to protecting our customers and helping them reduce risk.”

Ultimately, Blue Coat Security Analytics focuses on finding the root cause of a security incident, either as it is happening or in a forensic investigation. The solution uses a combination of packet inspection, intelligence services, and metadata enrichment to determine the severity of a potential threat.

 Blue Coat Intelligence Services provide real-time malware detection across Web, mail and file protocols, incorporating URL and file reputation by automatically querying the Blue Coat Global Intelligence Network (GIN) for updated threat information. The solution also leverages Blue Coat Malware Analysis to detonate and analyse unknown files, establish risk, and assign threat scores within seconds, as well as for bidirectional communications with other security platforms to enrich and index metadata.

“Unlike competitors that often use only packet headers and metadata for visibility into potential security incidents, Blue Coat Security Analytics seeks to empower security professionals with full packet capture, indexing and analysing packets to offer maximum resolution in a forensics investigation,” explains Kissel.

“While most of the information that is contained in the packet headers is needed to route the packet over the Internet and to pass traffic through Web servers, the byte level granularity of packet data provides a forensic chain of exactly what happened before, during and after a security incident,” he says.

Further, Blue Coat Security Analytics can be deployed as hardware appliances installed on an on-premises network or be included as VMware virtual appliance, software and direct attached or storage area network (SAN) storage modules, which can scale to petabytes of storage for extended capture windows. For remote locations, virtual sensors can be deployed. The Security Analytics Central Manager can then be used to aggregate appliances, sensors and virtual machines. 

With the recent acquisition of Elastica, Blue Coat now provides cloud application security and visibility that complements Security Analytics.

Story image
HackerOne hits $100M milestone with bug bounties
“We have arrived at the point in history where you are ignorant and negligent if you do not have a way to receive useful input from ethical hackers."More
Download image
Revealed: How to make authentication simple again
It's absolutely necessary for a healthy security landscape, but authentication has become convoluted and bogged-down. Simplify and secure your processes with this tool.More
Link image
OSS Group helps businesses use IT Automation to unify people & processes
if it exists in IT there is usually a way to automate it. Whether you're a director or systems engineer, those that understand automation can achieve a more streamlined and secure business.More
Story image
Google most popular brand to impersonate in phishing campaigns - report
A new report from Barracuda released today shows 100,000 attacks impersonating reputable brands, with 65% of this figure using Google as a masquerade.More
Story image
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.” More
Story image
Cybercriminals exploiting virus fears to gain access to corporate IT systems
COVID-19 may have changed the way many people work, but this doesn’t have to mean companies must accept lower levels of security. More