Blue Coat Systems has added global threat defence, universal policy and unified reporting across its secure web gateway appliances to protect the user rather than the device.
Described as an always-on solution to protect the user wherever they are, the company said Unified Security enables the extended enterprise to expand its secure perimeter to include all users on devices across any network.
It said that in today's environment, securing the network means securing the user. Talking to SC Magazine, Dave Ewart, director of product marketing at Blue Coat, said traditional security solutions are not equipped to continuously protect, control and manage users as they move from headquarters to branch offices to remote locations and from desktops to laptops to mobile devices.
He said: “From home to work, I connect to three different networks and our approach ties the policy to me – it knows where I am and understands that I will use different devices and that there may even be instances where there is a mix of work and play.
“This policy of technology allows us to understand that we have an acceptable-use policy that will change as I change my device.”
He added: “We apply a set of technologies wherever the user is, so policies are applied with no security gap. You can connect through the network, but we allow the user to connect directly to the cloud service so you are using the same policy.”
Global Threat Defence provides consistent enterprise-grade protection powered by Blue Coat WebPulse. The Universal Policy gives extended enterprises the ability to create global policies that seamlessly follow a user across all networks on all devices; while Unified Reporting delivers a single ‘pane-of-glass' view into all web and user behaviour so the enterprise can identify security risks and take closed-loop policy actions.
Steve Daheb, chief marketing officer and senior vice-president of corporate and business development at Blue Coat, said: “The growing adoption of mobile devices gives employees maximum access to the corporate network with little of the protection they get within the four walls of the enterprise.
“This fundamental transition requires enterprises to shift from securing the network to securing the user by extending corporate security and compliance policies to all devices accessing the network.”