Blue Coat Systems today said it’s unified the real-time reporting in its cloud-based security service with that in its full line of ProxySG security appliances so that enterprises receive real-time information related to both.More: Seven hot security companies to watch“It’s unified the reporting into a single pane of glass,” says Sasi Murthy, director of web security at Blue Coat. The Blue Coat Cloud Service provides equivalent functionality in the cloud to Blue Coat’s line of ProxySG appliances for authentication, Web filtering, anti-malware, data-loss prevention and bandwidth management used on premises. But the real-time reporting for the cloud and the appliances had been separate. As of now, this information can be shared fully between the two, she noted.These unified reports would include those related to infected client computers, identifying which users need remediation; the histories of log-in information; and usage of web applications, social networking and bandwidth, she says. The intention with the unified reporting is to assist Blue Coat customers that use both cloud and appliances. Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.Read more about wide area network in Network World’s Wide Area Network section. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe