Feeds

Blue Coat gobbles CCTV-for-network-traffic maker Solera

Packet inspector to aisle two, please

Securing Web Applications Made Simple and Scalable

Web security outfit Blue Coat Systems is buying Big Data security, intelligence and analytics firm Solera Networks.

Solera's DeepSee platform offers security analytics and forensic capabilities to help defend against advanced persistent threats (APTs) and targeted malware attacks. Solera has created a type of CCTV system for network traffic that records a detailed record of packets, flows and files across corporate systems.

This data can be mined by customers to identify and resolve APTs using the various analysis tools built into Solera's platform. DeepSee will be added to Blue Coat’s existing web-based threat intelligence roster, so customers can proactively block threats and rapidly identify, respond to and recover from any data breach or similar security incident.

Blue Coat's premise is that malware infection on corporate systems is more or less inevitable. The trick to beating them, according to Blue Coat, is to rapidly detect and block the spread of malware-based attacks using a combination of network traffic analysis and forensic tools. Other companies, such as SourceFire, share Blue Coat's vision.

Applying Big Data techniques to try to make sense out of security threats is a route that has also been taken by RSA Security and IBM, as The Register's security desk previously reported.

To identify threats hidden in encrypted traffic, Solera integrated its DeepSea platform with SSL technology from Netronome, which Blue Coat acquired earlier this month. Blue Coat also launched an SSL Visibility appliance on Tuesday, marking the first fruits of its Netronome purchase. The tie-in allows enterprises to analyse and block threats hidden in encrypted traffic.

Solera’s customers are the US Departments of Energy, Homeland Security and Defense, Hitachi, Qualcomm, Overstock.com and Zions Bank. Blue Coat started out as a provider of web security, URL blocking and WAN optimisation products.

The deep packet inspection capabilities of its products have proved to be of interest not just to corporates, but to ISPs and government in countries with patchy records on human rights, including Bahrain, Burma (Myanmar), China, Saudi Arabia, and Venezuela.

Use of Blue Coat's censorware technology by these countries prompted campaign group Reporters Without Borders to categorise Blue Coat as one of five "Corporate Enemies of the Internet" back in March.

Financial terms of Solera's acquisition by Blue Coat, which was announced on Tuesday, were not disclosed. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.