Web Proxy Servers

Contributed by Billy Short

Information Technology management teams are constantly attempting to keep information safe and secure with various information security mechanisms. Most teams upgrade infrastructure by implementing new software and hardware devices, such as firewalls, demilitarized zone servers, or proxy servers to name a few. This writing will focus on defining what proxy servers are, what they are used for, why they are useful, advantages and disadvantages of implementing proxy servers, alternatives, and most importantly how they are used to enforce information security in order to keep data safe and secure. Throughout this document, I will include real world examples of how proxy servers are used, and explain some of the benefits of implementing one. By writing this document, I have learned quite a bit of information about proxy servers, and hope to help supply information to others who would like to learn more about this topic. We will focus on web proxy servers in particular throughout this writing.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet