Old bottled new wine on the Security Proxy Server

Source: Internet
Author: User

After some information query and communication with some security proxy server vendors, I feel that in the second 10 years of the 21st century, the Security Proxy Server may return to everyone's field of view. Next I will share my collected information with you.

What is the Security Proxy server?

I have learned that although the Security Proxy Server relies on the traditional server architecture, it greatly enhances the security protection and acceleration functions. To a certain extent, we can say that the value of Security and Acceleration is even greater than the value of proxy itself.

What is the use of the Security Proxy server?

1-Web security: as WEB 3.0 technology is gradually starting the All on Web trend, Web browsing is valued by a large number of viruses and Trojans. The objective reality of these Web attack sources and use units is that some users do not install anti-virus software or update OS patches, making zero-day attacks possible. Because the Security Proxy Server is placed at the Internet egress of the organization, it can provide direct protection for computers that lack security protection, and eliminate viruses, Trojans, and malicious code from the Internet.

2-Internet acceleration: Although Internet bandwidth is no longer in the dial-up era, the traffic of Internet applications is also increasing. Users can download up to MB or even GB of files. In addition, some traditional documents are also replaced by video materials, and the increased bandwidth will be stretched. The Security Proxy server can effectively achieve one-person access through file caching, video streaming media caching, and FLASH video caching. The global sharing method greatly improves the user's access to file downloads and videos, it also reduces the actual Internet egress traffic.

3-website protection and Server Load balancer: more and more organizations are currently using Web websites to provide services to the external public. These websites are usually attacked and have massive user access. The server may be attacked because the vulnerability is not fixed or the service may be stopped due to heavy load. Through its reverse proxy function, the Security Proxy server can become the website's front-end bastion host. Because of its professional operating system, hackers are difficult to break down. At the same time as reverse proxy, the Security Proxy server can evenly distribute access from a large number of external users to multiple backend servers that provide the same service, so that the server load is optimized and balanced.

How does the Security Proxy Server determine its quality?

Because the Security Proxy Server focuses on the three major values of Web security, Internet acceleration, and website protection and optimization, the evaluation of its quality should be carried out in this category.

1-core technologies of the security feature Library:

A) whether to provide real-time virus scanning, the size and update speed of the virus Database

B) Whether real-time Trojan scanning, Trojan library size, and update speed are provided

C) whether to provide scanning for malicious code, the size and update speed of the malicious code library

2-core internet acceleration Technologies

A) whether to provide File Download cache and cache size

B) whether to provide FLASH video caching and cache sizes such as Youku and Tudou

C) Whether HTTP link reuse technology is provided

3-core website protection and Server Load balancer Technologies

A) whether to provide reverse proxy and website Protection

B) can multiple backend websites be specified to provide multi-point load balancing?

C) whether it is a private operating system to reduce the possibility of attack intrusion

4-hardware-based product forms

A) whether it is a professional hardware architecture to avoid compatibility issues with hardware in pure software mode

I personally feel that the security proxy server is not fried with cold meals, but old bottled new wine, with different effects. Through the above brief introduction and selection focus, the author finally helped some friends sort out their correct choices.

Software products are not under consideration. Software-only proxy servers are not considered, such as ISA and CCproxy. First, because the performance is too low, and the WEB protection function is basically zero.

The seat number of hardware products is basically clear. Domestic products mainly include Bluecoat SG, wangkang NPS, and Sangfor SG. Sangfor SG is not a complete Security Proxy Server. Although it can provide caching functions, its video acceleration is weak and its Web approach and reverse proxy are almost zero, therefore, it cannot be regarded as a security proxy.

Due to the length issue, each selection detail is not available. However, I will provide detailed selection introductions one by one in the future, hoping to provide some guidance for IT colleagues. However, I hope that all IT colleagues can learn about the rapid growth method through this selection method and turn themselves into a comprehensive and in-depth talent as soon as possible.

Edit recommendations]

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.