Cybersecurity Expertise and Secure File Transfer Best Practices

Perimeter Defense: The Reverse Proxy

By Michael Ryan, CEO of South River Technologies

Nearly all businesses protect vital internal assets by means of a firewall: a software- or hardware-based solution that sits between the corporate LAN and the external internet. These firewalls are designed to limit, regulate, and monitor traffic that passes between the public internet and the private corporate LAN. Unfortunately, as hacking techniques get more sophisticated, it is possible to hack through a firewall using various spoofing and packet injection methods. When these methods are successful, your data is at risk.

How can your company protect against attackers getting into your LAN through the firewall? While the easiest option would be to trim the attack vectors by closing all inbound firewall entry points, this might not be the most practical. With today’s workforce becoming more mobile and remote, the need for employees to have access to shared network resources while on the road is vital. Closing down firewall ports and cutting off access for remote employees is simply not plausible in today’s environment.

Another option open to businesses comes in the form of a reverse proxy. A reverse proxy is a hardware or software solution which allows businesses to close down inbound access through the firewall, rendering it impervious to malicious injection attacks while still allowing remote workers access to critical internal shared data.

Click here to read the full article.