Perimeter Defense-in-Depth: Using Reverse Proxies and other tools to protect our internal assets

The use of a reverse proxy server to provide defense-in-depth security will be discussed in this paper as a practical security solution for protecting our internal assets. There are several tools available that add obscurity to this process. We had a need to disguise our IBM mainframe yet allow...
By Lynda Morrison
February 18, 2002

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg