ProxyAV appliances work in tandem with Blue Coat ProxySG appliances and support industry-leading anti-malware engines. As an inline scanning device, the ProxyAV appliance analyses all file downloads from user-authenticated Web 2.0 sites, webmail, file sharing and other methods of content delivery.
Blue Coat ProxyAV appliances support four modes of content analysis, which enables you to scan all web traffic and deliver greater protection against potential threats. All without compromising network performance. For further protection against inbound threats, ProxyAV appliances can scan files up to 5.1 GB in size and analyse up to 100 layers of compressed archives.
Together ProxyAV and ProxySG provide:
Support for leading malware engines and frequent security updates.
Superior performance and the lowest hardware footprint requirements.
Protection from viruses, Trojans, worms, malware and other forms of malicious content.
Security for users who are not running anti-virus software
Flexible Policies for Managing Web Content
Blue Coat WebFilter categorises billions of web pages in more than 50 languages into 85 useful categories that can be easily managed by IT administrators. When deployed with ProxySG appliances, WebFilter can enforce and update corporate security policies across the network based on these categories and execute granular control over select popular web applications and operations.
To enable more accurate categorisation and to mitigate the risk of overblocking content, WebFilter supports multi-dimensional ratings per URL. With multiple category ratings, WebFilter gives IT administrators’ greater policy flexibility and granular control.
Blue Coat Malware Analysis Appliance
The Blue Coat Malware Analysis Appliance is part of the Security and Policy Enforcement Centre and bridges the gap between blocking known malware, detecting it and analysing unknown and advanced malware.
Simulates your systems to detect evasive malware.
Uses custom virtual environments for faster anomaly detection.
Never puts actual systems or applications at risk.
Provides a map of the damage a threat would cause if allowed to run in your network.
You can contain zero-day threats and unknown malware.
CONTACT US TODAY TO UNDERSTAND MORE ABOUT HOW WE CAN HELP YOU ENHANCE THE IT SECURITY IN YOUR ORGANISATION
0345 094 3070
About Blue Cube
The Blue Cube ethos is to offer fully independent and accurate advice providing the expertise, technology and management skills to help identify where to protect, what to protect and how to protect corporate IT resources and enable secure access for authorised users.