Entity

Time filter

Source Type

Sunnyvale, CA, United States

Blue Coat Systems Inc., formerly CacheFlow, based in Sunnyvale, California, United States is a provider of security and networking solutions. In February 2012, Blue Coat was acquired by private equity investment firm Thoma Bravo for $1.3 billion and began operating as a privately held company. Wikipedia.


Thompson H.,Blue Coat Systems
IEEE Security and Privacy | Year: 2013

Information security has long hinged on trusted insiders' ability to make good decisions. However, modifying human behavior through training is difficult; some battle-worn security executives might even dismiss it as impossible. Although foundational controls such as antivirus, data leak protection, and firewalls are important, they're far from sufficient. The sharp rise in 'knowability' of people at a distance raises an important question for the information security industry about the automation of personalized attacks: what happens when the marginal cost of launching a convincing personalized attack starts to approach 0 Today, most security controls are ignorant of rich historical data about the person they're tasked with protecting. As the cost for attackers to personalize their attacks goes down, our zeal in building technology to personalize defense must rise. This article explores our industry's need to embrace security's human element. © 2003-2012 IEEE. Source


A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service.


A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.


A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.


Patent
Blue Coat Systems | Date: 2013-02-12

According to one aspect, a method of assessing typicality of a first name that includes a plurality of characters includes obtaining the first name, determining at least a first N-gram size, and extracting a first plurality of N-grams of the first N-gram size from the first name. The first plurality of N-grams is analyzed with respect to a model. Analyzing the first plurality of N-grams with respect to the model includes obtaining a first score. Finally, the method includes determining whether the first score indicates that the first name is typical.

Discover hidden collaborations