Solved

What security do Proxy Servers offer

Posted on 2009-07-14
4
305 Views
Last Modified: 2012-05-07
I have been advised to route Internet access via a Proxy Server for "security", but I cannot work out what security it offers. At the moment, all PCs are hidden behind a firewall with NAT.

The only thing I can see it offering with security is a mechanism to monitor my users Internet access.

Am I missing anything?
0
Comment
Question by:MortimerCat
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
jako earned 250 total points
ID: 24851415
mandatory web proxies give the benefit of web usage monitoring which might be desirable for the company owners and falls securely under security.
0
 
LVL 8

Expert Comment

by:jako
ID: 24851458
filtering is even better example of applying security through proxy use. One can implement intricate combinations of filtering rules in a proxy.
0
 
LVL 1

Author Comment

by:MortimerCat
ID: 24851670
You seem to be confirming what I thought.

Web proxies are there to provide protection from my own users!  If I can trust my users, then a proxy server would provide no more security benefit?

I appreciate "trust my users" is a bit vague, and proxies provide other advantages such as caching.  
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 24851727
don't think of active filtering as being protection from  your users - think of it as protecting them from web-borne issues by gaining the opportunity to virus scan and perform IDP/IDS at the perimeter.

really advanced solutions can even proxy (and virus scan) https traffic!
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question