Blue Coat ProxySG 200
August 25, 2005
Blue Coat SystemsProduct:
- Ease of Use:
- Value for Money:
- Overall Rating:
It is possible to create complex security rules.
There are some minor errors in the documentation.
A versatile device that offers IM security to the smaller enterprise.
Blue Coat's ProxySG 200 system is a 1-U height rack-mountable device that provides proxy services for the small enterprise network. Using Blue Coat's secure SGOS operating system, it offers a range of proxy services and security features for a number of internet applications.
Its instant messaging features address the more common IM clients, namely those from AOL, Microsoft and Yahoo!.
Initial configuration can be carried out through either a Java-enabled web browser or through a command line interface over a serial connection. We configured the device using the serial connection after our attempt to use the browser connection failed because an error in the documentation gave the wrong connection details.
We obtained the correct information from the serial configuration, and we could then use the browser-based management interface. However, the standard of documentation was generally good, despite this.
The system offers the ability to configure polices controlling IM clients based on a large number of criteria. Policies can be applied globally, to groups of users or to individuals, and actions can also be applied to individual files. It is possible to block any or all IM services on the same basis, or to restrict access to certain services to particular time slots.
Quite complex rule sets can be created to cover most requirements, although careful planning would be needed to avoid leaving gaps in the security screen. The system can also control clients that use an http proxy.
Its content-filtering service can be configured to trigger alerts if defined key words are found, and the transmission can be blocked, if necessary. There is also a "reflection" feature that spots whether clients are operating on the same internal network, and simply routes traffic between them, instead of forwarding it to the public IM server.
The management interface has access to all aspects of the device's configuration and operation, with real-time statistics and graphs of the device's performance and traffic throughput. There are extensive archiving and reporting options allowing for detailed auditing of IM sessions.
Sign up to our newsletters
SC Magazine Articles
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Report: $19M breach settlement between MasterCard, Target terminated
- Logjam attack exposes data passed over TLS connections
- Google releases Chrome 43, addresses 37 bugs
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Senate fails to pass USA Freedom Act; McConnell moves for revote of Patriot Act extension
- Android ransomware distributed to English speakers in spam campaign
- Site operator sentenced to 13 months for facilitating prostitution
- ISA presses for data to shape cyber security policy, encourages use of NIST framework
- Former Jacobi Medical Center employee improperly emails patient data