Cet article n’est plus disponible depuis le 27 octobre 2020
Coordonnées du soutien après-vente (800) 972 3922, du lundi au vendredi, de 8 h à 22 h HE
Symantec ProxySG S200-10 - Proxy Edition - dispositif de sécurité
Détails du produit
dispositif de sécurité
Montable sur bâti
Aucune description marketing n'est disponible.
Symantec ProxySG S200-10 - Proxy Edition - security appliance is rated4.20 out of5 by5.
Rated 5 out of 5 byGirish Vyas from The solution lacks integration with SDN architecture. However, it does feature intuitive proxy policy deployment using a VPNWhat is our primary use case?The main use case of the solution was to deploy it as a proxy to access internet. In some cases it was an explicit proxy and in other cases it was implicit. We also explored the features of ADN to use caching and compression.How has it helped my organization?There were benefits but the evolution is slow, hence wanting to move on with the product. You can deploy the product in cloud but you can't automate it as the IP address can be assigned only after acquiring the serial number, hence you would not have a mechanism (by logging in/API) to apply the serial number beforehand so that the deployment can be automated.What is most valuable?Proxy Solution and ADN. Specifically its integration capability with Blue Coat director to apply seamless policy across all of Blue Coat. Also, it has intuitive proxy policy deployment using VPN. You can even forward-chain your proxy. Overall a good solution but growth requires automation support.What needs improvement?Automation for deployment of the device and pricing, which might be secondary considerations. The main consideration is deployment over multiple platforms and integration with SDN architecture.For how long have I used the solution?One to three years.What do I think about the stability of the solution?NoWhat do I think about the scalability of the solution?NoHow is customer service and technical support?Support for Blue Coat is good on the basic level problems. As the complexity increases, figure it out yourself as it appears that most engineers are not aware of their own products.Which solutions did we use previously?No. I used Blue Coat first but since it did not have the capabilities I was looking for I switched.How was the initial setup?It was complex, especially in the VM environment. In the case of hardware, it was simple but you still you need to be aware of proxy deployment along with MACH5 deployment.What about the implementation team?In-house. You can do it easily by yourself as the documentation is fairly good.What was our ROI?Some customers are adamant as they prefer Blue Coat as a vendor over others. They also provide free training, allowing you to learn a new technology.What's my experience with pricing, setup cost, and licensing?Licensing is the major challenge whether manual or automated. Specifically, if you are using a VM edition, you need to be sure that you are using the specified amount of RAM and CPU cores or else you will not be allowed to configure it.Which other solutions did I evaluate?Yes. I did a test on Websense and also on Fortigate. I also did test on McAfee Web Security Gateway and Baracuda.What other advice do I have?None as of now.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2018-07-11T00:00:00-04:00
Rated 5 out of 5 byit_user365724 from Now we are able to inspect full SSL traffic.Valuable Features* Granular security policy* Ability to use as a Forward or Reverse Proxy* ICAP integration, high performance SSL* High performance web acceleration* Integrates well with other vendorsImprovements to My OrganizationThe ProxySG allowed us to inspect full SSL traffic now without breaking a sweat. No more outages due to capacity, or DDoS.Room for ImprovementBlue Coat advertises the ProxySG as a WAF, but it really isn’t. I would like the ProxySG to have full WAF features that will detect XSS, SQLi, CSFR, etc.Use of SolutionI've used it for over 10 years.Deployment IssuesThe policy is very complex, and their CPL code requires some time to learn it. Once it was inpProduction, no issues were encountered with the migration.Stability IssuesThe ProxySG is a strong workhorse when compared to other proxy vendors.Scalability IssuesWe had a load balancer in front of the ProxySG’s. But for customers who do not have a load balancer, they may run into scalability issues.Customer Service and Technical SupportCustomer Service: Blue Touch support is top notch and very responsive when I opened service requests.Technical Support: Their support engineers are very knowledgeable of the products. I never had to get my service request escalated because it was immediately solved every time.Previous SolutionsWe previously used Network Appliance NetCache proxies, but Blue Coat acquired the NetCache series and phased it out. We reviewed a NetCache replacement and it was determined the ProxySG was the better candidate for use.Initial SetupIt was somewhat complex at first, but was able to migrate successfully because of rigorous testing before going into production.Implementation TeamIt was implemented in-house.Other Solutions ConsideredBlue Coat products are very expensive, but definitely worth a comparative analysis when choosing a proxy replacement. We looked at NetScaler, F5, and WebSense. Incorporating either one of those vendors required a full re-architecture of our front end which was not an option due to our complex network architecture.Other AdviceBe sure to get the proper sized appliance, better to be over than undersized just in case of spikes in your network.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-01-27T00:00:00-05:00
Rated 5 out of 5 byNuo Xu from We were able to monitor users' social media behavior and control certain activities, but the GUI needs updating.Valuable Features:* URL Filtering* SSL Decryption* Application and Activity Filtering* Media Streaming OptimizationImprovements to My Organization:We were able to monitor users' social media behavior and control certain activities to be allowed on the social media. This helped to prevent data loss and other activities that could result in a negative impact to the organization.URL Filtering provides both category filtering and customized filtering, which provides us with a lot of flexibility.Room for Improvement:The GUI works, but could be better. It is 2015 and I don't want to be stuck in 1999. Just saying.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-08-26T00:00:00-04:00
Rated 5 out of 5 bySuhas Suryavanshi from Granular control over website access has lead to decreased bandwidth and increased performanceWhat is our primary use case?The primary use for this solution is to protect the private IP for our customers who do not want to disclose it. It is also used for granular control of web access for employees, including how they are using the internet and what sites they are visiting. It provides control over how much data they are using, as well as what kind of data they are uploading and downloading from internet websites.How has it helped my organization?One of our customers is a leading bank in India, with more than ten thousand employees across the globe. They did not have any restrictions or control over what kinds of sites the employees should or should not access. Since the implementation of this solution, the bandwidth has decreased and the performance in terms of internet access has increased.What is most valuable?The most valuable feature is the Policy Manager. After that, the Proxy Reporter is the next best function. You can integrate it with a cloud proxy as well as DLP.What needs improvement?It would be great if the product had inbuilt queuing for Quality of Service. They do have a solution, but for that, you need to buy another appliance.For how long have I used the solution?Two and a half years.What do I think about the stability of the solution?This is definitely a stable product.What do I think about the scalability of the solution?The scalability of this solution is fantastic.The number of boxes depends on how many users are creating concurrent sessions and the bandwidth of their organization. The bank where this solution was implemented has more than ten thousand users.How are customer service and technical support?They have fantastic technical support.If you have to replace the appliance then you just have to send back what you have.If you previously used a different solution, which one did you use and why did you switch?I have not previously worked on another solution, but I am familiar with the competitors.How was the initial setup?If you have previously worked on the product then it is quite simple. However, if you are new to it then the implementation is a little bit tricky.On the Cloud Proxy, the deployment takes less than one day. If you are using the ProxySG or the on-premises solution, it will take one to two weeks depending on the policy configuration, the size of the organization, and what kinds of policies are needed.The number of staff you need to maintain the solution depends on the size of the organization, and how many changes occur on a daily basis. If you have one thousand employees then you need at least one employee to look after it.What about the implementation team?We handle the implementation of this solution for our customers.What's my experience with pricing, setup cost, and licensing?There is a perpetual license, except for URL filtering that you have to renew annually.Additional features, such as Flash Proxies, have their own licensing fees that depend on what the requirements are.Which other solutions did I evaluate?I have reviewed the Gartner Magic Quadrant Report. From that, I know the competitors, where the vendors stand, and what the drawbacks are.What other advice do I have?It is important to determine the proper requirements and do the proper planning. If you have any doubt then you can ask for support from the Blue Coat staff. The conditions should be agreed upon before you start implementing.The functionality of this solution is one of the best, and it is leading the market.I would rate this solution a ten out of ten.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-05-08T00:00:00-04:00
Rated 5 out of 5 byit_user254964 from ?It's a great solution for high load enterprise infrastructure, but it can be complex to customize the setup.Valuable FeaturesThe anti-phishing attack features. It's very important feature in Eastern Europe to protect our users from phishing attacks by malicious web sources.Improvements to My OrganizationAfter implementation, there has been much less malicious actions from the internet and it has reduced the scope of APT attack vectors from the web.Room for ImprovementThey need to improve the intellectual analysis for APT vectors from web.Use of SolutionI've been using it for three years.Deployment IssuesIt's easily deployed, but it takes time for adjustment (like any other similar product).Stability IssuesIt's a very stable product.Scalability IssuesGreat scalability.Customer Service and Technical SupportCustomer Service: 6/10.Technical Support: 6/10.Previous SolutionsIt was our first full-scale enterprise solution.Initial SetupIt was a complex setup because we had to do custom adjustments, but the product is very flexible for that.Implementation TeamIt was done in-house.Pricing, Setup Cost and LicensingIt offers unlimited count for licenses.Other Solutions ConsideredWe specifically chose this product as it's the industry standard.Other AdviceIt's a great solution for high load enterprise infrastructure to protect company networks from web threats.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-06-16T00:00:00-04:00
Cette page a été imprimée le 15/06/2021 à 18:03:14.