Contents
Chapter 1 Fundamentals of Secure Proxies
Security Must Protect and Empower Users
Internet of Things and Connected Consumer Appliances
Conventional Security Solutions
Traditional Firewalls: What Are Their Main Deficiencies?
Firewall with DPI: A Better Solution?
Unified Threat Management and Next-Generation Firewall
Security Proxy—A Necessary Extension of the End Point
Certificate Pinning and OCSP Stapling
Chapter 2 Proxy Deployment Strategies and Challenges
Definitions of Proxy Types: Transparent Proxy and Explicit Proxy
Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline
Traffic Redirection Methods: WCCP and PBR
Forward Proxy and Reverse Proxy
Challenges of Transparent Interception
Asymmetric Traffic Flow Detection and Clustering
Chapter 3 Proxy Policy Engine and Policy Enforcements
Policy Updates and Versioning System
Get Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.