Solved

solution to replace TMG[Microsoft web application proxy is out of the equation]

Posted on 2014-09-23
3
777 Views
Last Modified: 2016-02-25
Hello Experts,

I would like to evaluate 3 different solutions to do reverse proxy and replace old TMG firewall.

Can you please recommend at least 3 solutions and publish pros and cons? Please Microsoft WAP is not an option here.

Is websense a good solution for reverse proxy?

Please provide links, blogs  and pros and cons of each solution
0
Comment
Question by:Jerry Seinfield
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 24

Accepted Solution

by:
Dirk Kotte earned 500 total points
ID: 40340851
We check different products and select the sophos UTM, It replaces the most TMG features very good.
We don't test websense ... possible a good solution also.
Citrix Netscaler is a very big solution for publish, manipulate, protect, loadbalance and optimize web-content but makes a great job.
Some other products has aggressive marketing but not really a solution... especially for the reverse-proxy with preauthentication like TMG.
0
 

Author Comment

by:Jerry Seinfield
ID: 40341591
Thanks,

Any thoughts regarding Websense, or any other products?

Any chance to get a comparison chart, or doc for the products that you recommend?
0
 
LVL 24

Assisted Solution

by:Dirk Kotte
Dirk Kotte earned 500 total points
ID: 40343242
0

Featured Post

Create Professional Looking Email Signatures

Create "Professional HTML Email Signatures" with ease.
7 Day Money Back Guarantee if not 100% Satisfied.
Affordable - Try it out for 7 Days Totally Risk Free.
Installers provided for over 45 Email clients.
Both Windows & MAC Supported.
Highly Recommended!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question