Feeds

Blue Coat gobbles CCTV-for-network-traffic maker Solera

Packet inspector to aisle two, please

Reducing security risks from open source software

Web security outfit Blue Coat Systems is buying Big Data security, intelligence and analytics firm Solera Networks.

Solera's DeepSee platform offers security analytics and forensic capabilities to help defend against advanced persistent threats (APTs) and targeted malware attacks. Solera has created a type of CCTV system for network traffic that records a detailed record of packets, flows and files across corporate systems.

This data can be mined by customers to identify and resolve APTs using the various analysis tools built into Solera's platform. DeepSee will be added to Blue Coat’s existing web-based threat intelligence roster, so customers can proactively block threats and rapidly identify, respond to and recover from any data breach or similar security incident.

Blue Coat's premise is that malware infection on corporate systems is more or less inevitable. The trick to beating them, according to Blue Coat, is to rapidly detect and block the spread of malware-based attacks using a combination of network traffic analysis and forensic tools. Other companies, such as SourceFire, share Blue Coat's vision.

Applying Big Data techniques to try to make sense out of security threats is a route that has also been taken by RSA Security and IBM, as The Register's security desk previously reported.

To identify threats hidden in encrypted traffic, Solera integrated its DeepSea platform with SSL technology from Netronome, which Blue Coat acquired earlier this month. Blue Coat also launched an SSL Visibility appliance on Tuesday, marking the first fruits of its Netronome purchase. The tie-in allows enterprises to analyse and block threats hidden in encrypted traffic.

Solera’s customers are the US Departments of Energy, Homeland Security and Defense, Hitachi, Qualcomm, Overstock.com and Zions Bank. Blue Coat started out as a provider of web security, URL blocking and WAN optimisation products.

The deep packet inspection capabilities of its products have proved to be of interest not just to corporates, but to ISPs and government in countries with patchy records on human rights, including Bahrain, Burma (Myanmar), China, Saudi Arabia, and Venezuela.

Use of Blue Coat's censorware technology by these countries prompted campaign group Reporters Without Borders to categorise Blue Coat as one of five "Corporate Enemies of the Internet" back in March.

Financial terms of Solera's acquisition by Blue Coat, which was announced on Tuesday, were not disclosed. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.