
19
IT can once again gain control over their WAN links, accelerating the good and denying the bad, regardless of SSL encryption.
No matter how your users reach their critical applications, Blue Coat ProxySG can help: inbound to your own server farm,
outbound to third-party service providers, SSL tunneled or in the clear; ProxySG accelerates and secures your business data.
Blue Coat appliances do all of this in a way that acknowledges that the balance of performance, security, and privacy will be
different for each organization, and empowers IT to translate written business policy into a deliverable quality of service pledge.
Glossary
Algorithm
A formula or set of steps for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a
clear stopping point.
Blue Coat ProxySG Appliance
A system that services Web servers by offloading TCP/IP connections, responding to Web Client requests, replicating the Web
content for availability and surge protection, and enhancing Web server performance. Also known as a Web accelerator or a
reverse proxy server.
Certificate Authorities
A trusted third-party organization or company that issues digital certificates used to create digital signatures and public-
private key pairs. The role of the CA in this process is to guarantee that the individual granted the unique certificate is, in fact,
who he or she claims to be.
Content Distribution Network (CDN)
The physical network infrastructure of connecting global locations together which allows for Web content to be distributed to
the edges of the entire network infrastructure.
Cryptographic Algorithms
A cryptographic system that uses two keys: a public key known to everyone, and a private or secret key known only to the
recipient of the message. An important element to the public key system is that the public and private keys are related in such
a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt
them. Moreover, it is virtually impossible to deduce the private key if you know the public key.
Decrypt
The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
Digital Certificate
An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify
that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. An
individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority.
Technology Primer: Secure Sockets Layer (SSL)
Kommentare zu diesen Handbüchern