Sunnyvale, CA, United States
Sunnyvale, CA, United States

Blue Coat Systems Inc., formerly CacheFlow, based in Sunnyvale, California, United States is a provider of security and networking solutions. In February 2012, Blue Coat was acquired by private equity investment firm Thoma Bravo for $1.3 billion and began operating as a privately held company. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Patent
Blue Coat Systems | Date: 2016-03-22

Methods and systems for blocking unwanted software downloads within a network. Such methods may thereby prevent (i) downloads of spyware from one or more identified locations, and/or (ii) certain outbound communications from the network and/or may also permit software downloads only from specified locations. In general, the policies are defined by rules specified by a network administrator or other user.


Patent
Blue Coat Systems | Date: 2016-06-10

Control and management of bandwidth at networks remote from the physical bandwidth management infrastructure. Particular implementations allow network equipment at a plurality of data centers, for example, to manage network traffic at remote branch office networks without deployment of network devices at the remote branch office networks.


A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.


Patent
Blue Coat Systems | Date: 2016-09-22

An example embodiment of the present invention provides a process for opening and reading a file over a network, including a WAN. In the example embodiment, an edge file gateway appliance (or server) receives a request from an application such as a tile manager to open a file cached with the edge file gateway appliance at one point on a network and stored on a file server connected to a central server appliance (or server) at another point on the network. The edge file gateway appliance then forwards the request to open the file to the central server appliance, along with any offsets and lengths stored from any previous requests to read the file. The central server appliance responds by sending any file data described in the stored offsets and lengths to the edge file gateway appliance. Then when the edge file gateway appliance receives a read request from an application, the edge file gateway appliance stores the offset and length for the request, if a predefined storage limit is not exceeded, and attempts to satisfy the request from cached file data. The edge file gateway appliance fetches the entire file from the CS appliance if a predefined file limit is exceeded.


A proxy apparatus includes a processor and a memory storing instructions executed by the processor to determine whether a received packet has a corresponding application proxy and, if so, apply application proxy processing optimizations to the packet plus overlay network optimizations to the packet. Wherein the application proxy processing optimizations include header reduction for header fields that remain static from transmission to transmission.


A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.


Patent
Blue Coat Systems | Date: 2016-03-22

According to one aspect, a method for categorizing at least one image includes obtaining the at least one image and mapping the at least one image to at least a first grid. The first grid is a two-dimensional grid that includes a plurality of cells. The method also includes characterizing the first grid, wherein categorizing the first grid includes determining whether the first grid is indicative of an offensive characteristic, and identifying the at least one image as offensive when it is determined that the first grid is indicative of the offensive characteristic. When it is determined that the first grid is not indicative of the offensive characteristic, the at least one image is identified as not offensive.


Patent
Blue Coat Systems | Date: 2016-03-17

Application programming interface (API) hooks are injected into an application program executing at a client during run-time. Responsive to these hooks, data intended for encryption prior to transmission from the client is diverted, for example for content filtering, compression, etc., prior to being encrypted. In the case of encrypted data received at the client, the data is decrypted but before being passed to the application it is diverted, under control of the API hooks, for content filtering, decompression, etc.


A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The specified network interactions are compared to normative values to produce a promiscuity score indicative of the risk of the client machine contracting malicious software. Depending upon the promiscuity score, prophylactic actions are optionally applied to the client machine.


Patent
Blue Coat Systems | Date: 2016-01-14

A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.

Loading Blue Coat Systems collaborators
Loading Blue Coat Systems collaborators