?
Solved

solution to replace TMG[Microsoft web application proxy is out of the equation]

Posted on 2014-09-23
3
Medium Priority
?
808 Views
Last Modified: 2016-02-25
Hello Experts,

I would like to evaluate 3 different solutions to do reverse proxy and replace old TMG firewall.

Can you please recommend at least 3 solutions and publish pros and cons? Please Microsoft WAP is not an option here.

Is websense a good solution for reverse proxy?

Please provide links, blogs  and pros and cons of each solution
0
Comment
Question by:Jerry Seinfield
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 24

Accepted Solution

by:
Dirk Kotte earned 2000 total points
ID: 40340851
We check different products and select the sophos UTM, It replaces the most TMG features very good.
We don't test websense ... possible a good solution also.
Citrix Netscaler is a very big solution for publish, manipulate, protect, loadbalance and optimize web-content but makes a great job.
Some other products has aggressive marketing but not really a solution... especially for the reverse-proxy with preauthentication like TMG.
0
 

Author Comment

by:Jerry Seinfield
ID: 40341591
Thanks,

Any thoughts regarding Websense, or any other products?

Any chance to get a comparison chart, or doc for the products that you recommend?
0
 
LVL 24

Assisted Solution

by:Dirk Kotte
Dirk Kotte earned 2000 total points
ID: 40343242
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses
Course of the Month10 days, 12 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question