From the Summer 2016 Issue

Perimeter Defense: The Reverse Proxy

Michael Ryan
CEO | South River Technologies

  •  
  •  
  •  
  •  
  •  
  •  

Nearly all businesses protect vital internal assets by means of a firewall: a software- or hardware-based solution that sits between the corporate LAN and the external internet. These firewalls are designed to limit, regulate, and monitor traffic that passes between the public internet and the private corporate LAN. Unfortunately, as hacking techniques get more sophisticated, it is possible to hack through a firewall using various spoofing and packet injection methods. When these methods are successful, your data is at risk.

How can your company protect against attackers getting into your LAN through the firewall? While the easiest option would . . .

Leave a Comment