Blue Coat Labs How are we different? Our Labs include security perspectives from experts in areas as diverse as advanced persistent threats, malware, sandboxing, and of course, secure web gateways.
Global Intelligence Network This proprietary Blue Coat network draws on information from Blue Coat products and customers to deliver deeper and more complete protection against today’s advanced threats.
Labs Blogs Read the latest by our thought leaders on ransomware, malvertising, and much more.
Resources Whitepapers, security reports, and more, dealing with topics such as malware that hides in 1-day websites.
Labs Team Know the good guys behind the technology that reports on the bad guys.
This is the third and final post in our series about the key trends that are exerting the greatest pressure on enterprise security defenses today. In the first post we looked at the evolving endpoint and the expanding perimeter; the second post examined the need for encrypted traffic visibility and the move to cloud-based Office 365.
This is the second in a series of three posts about the key trends that are having the largest impact on enterprise security defenses today. In the first post we looked at the evolving endpoint and the expanding perimeter; let’s now examine two additional trends: encrypted traffic visibility and Office 365 adoption.
Last year 76% of enterprises were affected by a successful cyberattack, according to the newly released 2016 Cyberthreat Defense Report from CyberEdge Group. This happened despite the fact that 85% of companies are spending at least 5% of their entire IT budgets on security, and an astonishing 30% are spending at least 16% of their IT budget on security, according to the same report.
You may have seen speculation on Twitter about Blue Coat having control of an unrestricted intermediate CA signed by one of Symantec’s public roots. This speculation is false. Below is our official joint statement with Symantec on the matter:
Michael Rosen, Senior Technical Marketing Manager, Advanced Threat Protection
Evasive malware represents an escalating challenge for dynamic sandboxing solutions. Malicious actors incorporate increasingly clever evasion tactics into their malware to counter the security industry’s continuous improvements in their anti-evasion detection capabilities.