Feeds

CacheFlow dons Blue Coat moniker

Hi-Di-Hi to security repositioning

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

CacheFlow, which made its name supplying hardware based caching devices to telcos, yesterday announced a change of name and a change of emphasis to security supplier.

Blue Coat Systems, as the company will henceforth be known, has repositioned itself as a supplier of security appliances designed to combat the increasing number of Web-based threats targeting port 80 'holes' in the corporate security infrastructures.

The new Blue Coat name (which sounds like something from the dire 1980s Holiday Camp sitcom Hi-Di-Hi) is the "culmination of recently announced strategic transitions, which include new channel business models, solution providers, strategic partners, products and services, all designed to focus resources on Web security," the company said.

A slowdown in caching appliance sales to telcos and dot com firms has encouraged the vendor to evolve its product line towards becoming a security supplier to enterprise customers. All business previously conducted by CacheFlow will continue to be handled by Blue Coat Systems without interruption, the company said.

Along with the name change, the company announced the first product to carry its new moniker - the Blue Coat SG800 appliance. The appliance is designed to perform multiple Web security functions that include Web-based anti-virus detection, content security and content-URL filtering, without imposing response-time penalties on end-users.

The SG-800 supports multiple Web security applications through Blue Coat's partnerships with anti-virus providers Symantec and Trend Micro as well as alliances with URL and content filtering providers Secure Computing and Websense. ®

Related Stories

Web cache hardware launches DoS attacks, site claims
Web caching tech boosts network performance 400%

Remote control for virtualized desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?