Blue Coat Security Analytics Appliances
Transcrição
Blue Coat Security Analytics Appliances
Accelerating Your Incident Response & Improving Your Network Forensics With the increasingly sophisticated threats targeting your organization, you need increasingly intelligent defenses that enable you to quickly and effectively respond. This requires full visibility into your network traffic and insightful security intelligence capable of uncovering breaches, so they can be quickly contained and remediated. Blue Coat Security Analytics Appliances deliver the complete network visibility and forensics you need, out of the box – so you can react to security issues, in real time, to protect your workforce, fortify your network and improve your security processes. Integrated, Turnkey Solution Blue Coat Security Analytics Appliances are part of Blue Coat Security Platform’s Incident Response and Forensics solutions. The turnkey, pre-configured appliances harness the Blue Coat Security Analytics software to capture, index and classify all network traffic (including full packets) in real time. This data is stored in an optimized file system for rapid analysis, instant retrieval and complete reconstruction to support all your incident response activities. The appliances can be deployed anywhere in the network: at the perimeter, in the core, in a 10 GbE backbone, or at a remote link to deliver clear, actionable intelligence for swift incident response and resolution and realtime network forensics. There are two solution deployment options: • 2Gbps appliances: Offering highperformance analytics; massive scalability; and centralized management. SECURITY ANALYTICS APPLIANCES • 10Gbps appliances and SAN storage: Providing enterprise-proven capabilities via more interfaces, storage and memory (up to 720 TB on a single sensor). Next-Generation Capabilities for Advanced Protection AT A GLANCE The Security Analytics Appliances are the only completely integrated solutions designed to deliver the security analytics and advanced threat protection you need to reduce the time it takes to resolve security incidents and conduct swift forensic investigations. With the Security Analytics Appliances, you can: • Speed Threat Identification – providing complete visibility into your network traffic, with full traffic capture, classification and deep packet inspection capabilities. Speed Threat Identification The solution gives you total visibility into your network traffic, from your data center to your remote offices, through full network packet recording and classification to accelerate the identification of attacks in your environment and shorten your exposure window. The Security Analytics Appliances deliver: • Application Classification: Through powerful deep packet inspection (DPI), more than 2,400 applications and thousands of descriptive, metadata attributes, including content types, file names, and more are classified for easy analysis and recall. The integrated, turnkey Security Analytics Appliances: • Reduce Incident Response Times & Streamline Forensics – providing context around what is happening in your network to support fast incident response and resolution and streamlined post-breach forensics. • Deliver Quick Time to Value – offering easy to deploy, turnkey appliances that seamlessly integrate with your environment to enhance and streamline your security activities. DATASHEET BLUE COAT SECURITY ANALYTICS APPLIANCES DATASHEET Security Empowers Business • Real-time Threat Intelligence: Direct access to the latest threat intelligence, via tight integration with the Blue Coat Intelligence Services and Global Intelligence Network, which is made up of more than 15,000 customers and 75 million users worldwide, as well as numerous 3rd-party threat reputation services. Blue Coat provides real-time, actionable threat and URL and file reputation data directly to the Security Analytics Appliances, so you can be confident you have the most up-to-the-minute information on the attacks targeting your organization. • Layer 2 through 7 Analytics: A variety of analytics tools, such as complete session reconstruction, data visualization, Root Cause Explorer, timeline analysis, file and object reconstruction, IP geolocation and trend analysis ensure you have all you need to fully understand the threats in your environment. For example, the Root Cause Explorer uses extracted network objects to reconstruct a timeline of suspect web sessions, emails and chat conversations, so you can find evidence of the full source and scope of a security event. • Emerging, Zero-Day Threat Detection: Automatic brokering of unknown files to Blue Coat’s Malware Analysis solution for sandboxing and threat scoring helps you incriminate or exonerate suspicious activity in your environment. • Tight Integration with Security Infrastructure: The appliances integrate with best-of-breed security technologies, including security information and event management (SIEM) systems, nextgeneration firewalls (NGFW), intrusion prevention devices (IPD), malware sandboxing and endpoint forensics, to help you leverage your existing security investments and improve the effectiveness of established processes and workflows. Reduce Incident Response Times & Streamline Forensics The Security Analytics Appliances give you the insights you need to understand the context of security events in your environment, so you can quickly contain and remediate the full extent of a security incident and support post-breach forensics activities. The appliances enable situational awareness, with clear, concise actionable intelligence about the threats to your applications, files and web content via: • Context-Aware Security: Blue Coat offers you context for all your security alerts, so you can understand what happened, before, during and after an attack. You can pivot directly from any alert or log and obtain the full-payload details to support quick incident resolution and ongoing forensics activities. Quickly Achieve Results with Easyto-Deploy, Integrated Turnkey Appliances The durable, certified, thoroughly tested appliances quickly add value to your security operations. The easy-to-deploy, integrated turnkey solutions offer: • High Performance: 2-10 Gbps interfaces provide lossless packet capture, indexing and classification that meet the performance demands of your environment. The carrierclass appliances are based on certified, industry standard hardware platforms that provide the high availability and serviceability you require to maximize uptime and performance. • Scalability: Massive storage capacity is able to accommodate extended historical capture windows. Optimized high-density SAN storage, with support for add-on capacity, up to petabytes in size, enables you to meet your fast-changing requirements and growing network traffic demands. • Turnkey Deployment: The appliances come with pre-installed and pre-configured Security Analytics Software for a fast deployment that delivers immediate value. The Security Analytics Central Manager enables you to centrally monitor and manage your distributed Security Analytics appliances from a single pane of glass. The built-in Security Analytics Dashboard makes it easy to get the information you need to accelerate your incident response and forensics activities. DATASHEET Security Empowers Business Media Panel: View all images files and all associated metadata See where all your traffic and threats are coming from Customized dashboard view for quick analysis SECURITY ANALYTICS APPLIANCES: DIRECT-ATTACHED STORAGE 2G APPLIANCE 10G APPLIANCE STORAGE MODULE CENTRAL MANAGER INTERFACES 3 x 10/100/1000 BaseT 7 x 10/100/1000 BaseT 2 x 10 GbE 2 SAS3 (12 Gb/s) 4 x 10/100/1000 BaseT ON-BOARD STORAGE 6TB Usable (Capture + Index): - 5TB RAID-5 Capture (6 x 1TB) - 1TB RAID-1 Indexing (2 x 1TB) - 1TB RAID-1 System (2 x 1TB) 22TB Usable (Capture + Index): - 18TB RAID-5 Capture (19 x 1TB) - 4TB RAID-5 Indexing (5 x 1TB) - 1TB RAID-1 System (2 x 1TB) 44TB (44TB Usable / 48TB Raw) 3TB Usable: - 1TB RAID-1 System (4 x 1TB) MAX. USABLE STORAGE Up to 1 40TB Storage Module - 50TB usable storage Up to 6 44TB Storage Modules - 264TB usable storage SAS 12 Gb/s Self-Encrypting --- CPU 2 Intel® Xeon® Processor E5-2620 v3 (15M Cache, 2.40 GHz, 6 Core) 2 Intel® Xeon® Processor E5-2680 v3 (30M Cache, 2.50 GHz, 12 Core) --- 2 Intel® Xeon® Processor E5-2620 v3 (15M Cache, 2.40 GHz, 6 Core) MEMORY CAPACITY 16 x 8GB RDIMM 16 x 16GB RDIMM --- 8 x 8GB RDIMM RACK HEIGHT 1 RU 2 RU 2 RU 1 RU RACK DEPTH 710 mm / 28 inches 723 mm / 28.5 inches 710 mm / 28 inches 710 mm / 28 inches CHASSIS CONFIGURATION Up to 10 Hard Drives Up to 26 2.5” Hard Drives --- Up to 4 Hard Drives POWER SUPPLIES Dual, Hot-Plug, Redundant (1+1), 750W Dual, Hot-Plug, Redundant (1+1), 1100W Dual, Hot-plug, Redundant, 600W Dual, Hot-Plug, Redundant (1+1), 750W POWER CORDS 2 x NEMA 5-15P to C13 Wall Plug, 125V 15A 2 x NEMA 5-15P to C13 Wall Plug, 125V 15A 2x C13 to C14, PDU-style, 12 amp, 2ft, Redundant PDUs 2 x NEMA 5-15P to C13 Wall Plug, 125V 15A RAILS ReadyRails™ Sliding Rails with Cable Management Arm ReadyRails™ Sliding Rails with Cable Management Arm Rack Rail, 2Us, Static ReadyRails™ Sliding Rails with Cable Management Arm INTERNAL RAID CONTROLLER 12 Gb/s SAS 12 Gb/s SAS --- 12 Gb/s SAS EXTERNAL RAID CONTROLLER 12 Gb/s SAS 2 12 Gb/s SAS --- --- EMBEDDED MANAGEMENT Full remote console access with remote removable media support Full remote console access with remote removable media support --- Full remote console access with remote removable media support INPUT POWER 320 W (1091.9 Btu/h) 646 W (2204.2 Btu/h) 370 W (1262.5 Btu/h) 372 W (1269.3 Btu/h) AIR FLOW 24.2 CFM (11.4 I/s) 32.6 CFM (15.4 I/s) 6.5 CFM (3.1 I/s) 28.75 CFM (13.5 I/s) TOTAL WEIGHT 37.3 lbs (16.9 kg) 65 lbs (29.5 kg) 63.1 lbs (28.6kg) 40.6 lbs (18.4kg) DATASHEET SECURITY ANALYTICS APPLIANCES: HIGH-DENSITY SAN STORAGE Security Empowers Business 10G HD APPLIANCE 240TB STORAGE ARRAY CAPTURE INTERFACES 2 port 10GigE N/A ON-BOARD STORAGE Eight (8) 1TB 7.2K FIPS 140-2 Self-Encrypting NLSAS 6Gbps 2.5in Hot-plug Hard Drives. For system partition only 240TB (60x4TB 7.2K FIPS 140-2 Self-Encrypting NLSAS 3.5in Hot-plug Hard Drives) MAX USABLE STORAGE N/A 208TB 2 R5 (4+1) index partitions = 32TB 4 R5 (11+1) capture partitions = 176TB 2 Hot Spares CPU 2 x Intel Xeon E5-2680 v3 N/A MEMORY CAPACITY 256 GB RAM N/A RACK HEIGHT 1.68” 7” RACK DEPTH 29.72” 32.5” CHASSIS HEIGHT (CHASSIS CONFIGURATION) 1U 4U POWER SUPPLIES Dual hot-plug power supplies Dual hot-plug power supplies POWER CORDS 2 x NEMA 5-15P to C13 Wall Plug, 125V 15A 2 x Power Cord, C20 to C19, PDU Style, 250V, 16A, 2ft (0.6m) RAILS ReadyRails with Cable Management Arm Static rails SERVER RAID CONTROLLER PERC H730P Integrated RAID Controller N/A EXTERNAL RAID CONTROLLER N/A N/A STORAGE NETWORK INTERFACE 2 x Emulex LPe16002B Dual Port 16 Gb/s Fibre Channel Host Bus Adapters 2 x 8GB Caching Controller with 16 Gb/s Fibre Channel support EMBEDDED MANAGEMENT iDRAC Enterprise remote management Modular Disk Storage Manager HEAT DISSIPATION 1563 BTU/hr 4262 BTU/hr INPUT VOLTAGE 100 – 240V AC, auto ranging, 50Hz/60Hz 200 - 240V AC, auto ranging, 50Hz/60Hz TOTAL WEIGHT 37.3 lb (16.92kg) 232 lb (105.23kg) AIR FLOW 33.8 CFM 231 CFM POWER CONSUMPTION 458 W 1249 W Blue Coat Systems Inc. www.bluecoat.com Corporate Headquarters Sunnyvale, CA +1.408.220.2200 EMEA Headquarters Hampshire, UK +44.1252.554600 APAC Headquarters Singapore +65.6826.7000 © 2015 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter, CacheOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, MACH5, PacketWise, Policycenter, ProxyAV, ProxyClient, SGOS, WebPulse, Solera Networks, the Solera Networks logos, DeepSee, “See Everything. Know Everything.”, “Security Empowers Business”, and BlueTouch are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. Blue Coat products, technical services, and any other technical data referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you. v.DS-SECURITY-ANALYTICS-APPLIANCES-EN-v5e-1215
Documentos relacionados
Intel ESS MetaScale IT Manager First Person Case Study v002
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specifi...
Leia mais