Filter by Category

Reverse Proxy DMZ Gateways Might Be The Missing Link in Your MFT Strategy

By now, most companies have gotten the message that their dataas well as the sensitive data belonging to customers and partnersneeds reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously. Reverse Proxy Gateway, Managed File Transfer

The difference between the desire to keep data secure and actually getting it done, however, has proven to be challenging, especially considering the extraordinary amount of data that is being shared among companies and their customers, health care providers, financial institutions and more as part of daily business activities.

A common approach for sharing information with partners is to deploy a FTP or SFTP server in the "public" area of the company's network called the DMZ (demilitarized zone) where authorized users can drop off or retrieve files. Those files will often remain in the DMZ until an internal program or user copies them into the private network for processing.

Industry regulators and compliance auditors are becoming increasingly alarmed at this practice of staging files in the DMZ, because even if those files are encrypted, they are more susceptible to theft by savvy hackers. Worse yet, if the company decides to move those file servers into the private network, they may unintentionally be allowing unwanted access through open inbound ports.

A solution that's gaining in popularity is the reverse proxy DMZ gateway, which is used as a secure bridge between your trading partners and your file servers. A DMZ gateway allows you to move file servers and other public services out of the DMZ and into the private network without having to open inbound ports. Because it serves both as a reverse proxy for handling inbound traffic and a forward proxy for any outbound file transfer requests originating from inside your network, DMZ gateways keep the auditors happy and your data safe in the private network.

How does a DMZ gateway work, and what advantaes does it bring to your network security?

For more information about DMZ gateways and how you can use them in your organization, download our whitepaper: "DMZ Gateways: Secret Weapons for Data Security."

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


What’s the Difference Between GoAnywhere 6.0 and 6.1?

May 20, 2019

We’re excited to share that GoAnywhere 6.1 is now available for download! The newest version of our managed file transfer solution includes over 30 new features, such as X12 data…


How to Encrypt Files in Linux

May 16, 2019

If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they…


Everything You Need to Know about FTP Automation Software

May 9, 2019

So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are…


15 Ways to Avoid Document Chaos with Secure Forms

May 9, 2019

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like…


How to Prevent Data Breaches with MFT | Checklist and Plan

May 2, 2019

You know what a data breach looks like in the movies. A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightening speed, as if the PC itself…