Filter by Category

Reverse Proxy DMZ Secure Gateways Might Be The Missing Link in Your MFT Strategy

By now, most companies have gotten the message that their data—as well as the sensitive data belonging to customers and partners—needs reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously. Reverse Proxy Gateway, Managed File Transfer

The difference between the desire to keep data secure and actually getting it done, however, has proven to be challenging, especially considering the extraordinary amount of data that is being shared among companies and their customers, health care providers, financial institutions and more as part of daily business activities.

A common approach for sharing information with partners is to deploy a FTP or SFTP server in the "public" area of the company's network called the DMZ (demilitarized zone) where authorized users can drop off or retrieve files. Those files will often remain in the DMZ until an internal program or user copies them into the private network for processing.

Industry regulators and compliance auditors are becoming increasingly alarmed at this practice of staging files in the DMZ, because even if those files are encrypted, they are more susceptible to theft by savvy hackers. Worse yet, if the company decides to move those file servers into the private network, they may unintentionally be allowing unwanted access through open inbound ports.

A solution that's gaining in popularity is the reverse proxy DMZ secure gateway, which is used as a secure bridge between your trading partners and your file servers. A DMZ secure gateway allows you to move file servers and other public services out of the DMZ and into the private network without having to open inbound ports. Because it serves both as a reverse proxy for handling inbound traffic and a forward proxy for any outbound file transfer requests originating from inside your network, DMZ secure gateways keep the auditors happy and your data safe in the private network.

How does a DMZ secure gateway work, and what advantages does it bring to your network security?

For more information about DMZ secure gateways and how you can use them in your organization, download our whitepaper: "DMZ Secure Gateways: Secret Weapons for Data Security."

Latest Posts


7 Benefits of Using Managed File Transfer (MFT)

May 27, 2020

Moving beyond the scripts and programs you lovingly set up to carry your data around can be scary but, like pushing a baby bird out of the nest, it eventually becomes necessary. Instead of sending…


What Are the Top File Transfer Protocols?

May 25, 2020

And the Top File Transfer Protocols Are... Before implementing the secure managed file transfer solution of your choice, it’s a good idea to have a basic understanding of the protocols involved…


Key Cybersecurity Takeaways from the EasyJet Data Breach

May 22, 2020

A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And…


GDPR and Data Privacy after Brexit: What’s Next?

May 21, 2020

So, the GDPR (General Data Protection Regulation) hit us with a bang in May 2018 and aside from a few high-profile fines, companies seem to be coping well on the whole. But is that really what’s…


Top 3 Things to Look for in a Remote Collaboration Tool

May 19, 2020

Feel Like You're Working Together — Even From Apart Finding the best way to securely collaborate on and share files can be difficult in the best of times. With large swathes of people working…