SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Web Proxy Data Sheet




DeepNines Proxy Blocker
detect and eliminate security bypass

                                        Proxy Blocker
 Product Benefits                        DeepNines Proxy Blocker detects and eliminates Web-based proxies that
                                        circumvent network security and filtering solutions. By identifying, reporting
 • Real-time identification and
                                        and preventing Web proxies in real-time, Proxy Blocker protects against users
   blocking
                                        bypassing content filtering, security policies and malware detection across all
 • Denies unauthorized Web access       ports and protocols. By preventing unauthorized access to the Web, users
   and proxy tunneling                  cannot access online content and applications using the over 200 ports and the
 • Eliminates unwanted bandwidth        variety of protocols that consume bandwidth, violate security policies, and
   consumption                          open vulnerabilities in the network.

 • Ensures security compliance and      Proxy Blocker’s complete proxy protection uses proprietary technology to
   enforcement of acceptable use        detect and block all proxies by identifying the fundamental technology used
   policies
                                        by the proxy without knowing the specific IP address or URL. In order to
 • Prevents inappropriate, illegal or   completely identify and block all Web proxies, the DeepNines Secure Web
   unwanted Web traffic                   Gateway with Proxy Blocker inspects all ports and protocols. Many proxy

 • Supports SafeSearch mode in          blocking technologies only inspect port80 with URL filtering techniques,
   Google and Yahoo                     which is incomplete, allowing users to easily circumvent the solution.

 • Prevents peer-to-peer access and
   downloads

 • Reduces risks of botnets




                                                                                            R e a l -T i m e N e t w o r k D e f e n s e
Web Proxy Data Sheet




Blocking Web Proxies
The combination of proprietary signatures and deep packet inspection allows Proxy Blocker to identify and block all Web
proxies regardless of port, protocol or application to ensure network security and compliance. The chart below outlines
some of the many types of Web proxies, and how they typically work when bypassing filtering and firewall policies.
DeepNines Proxy Blocker technology eliminates all of these proxy types and more.


   Type                                     Description                                                                                                                             Blocked by
                                                                                                                                                                                    DeepNines

   Anonymous Proxies                        Anonymous proxies are the most common type of Web proxy and therefore
                                            easiest to block. These are generally URL-based and offer an embedded                                                                            
                                            feature that allows users to bypass the network through an interface on
                                            the website.

   Circumventors                            Circumventor software can be placed on a home (or any out-of-network)
                                            computer, and it will return a URL that acts as a proxy and can be used
                                                                                                                                                                                            
                                            to connect back to that computer for anonymous browsing. These URLS
                                            are dynamic and easily changed if ever discovered and blocked.

   Tor Network                              The Tor network is a network of virtual tunnels that creates an indirect

                                                                                                                                                                                            
                                            connection to the Internet by having the desired connection to hop
                                            through all of the computers on the Tor network before reaching its final
                                            destination, therefore disguising the browsing session and circumventing
                                            filtering policies.


                                                                                                                                                                                            
   Browser Proxies                          Browser proxies are a more complex version of anonymous proxies that
                                            provide the option of selecting different types of encoding to further hide
                                            the connection.

   SSL Proxies                              SSL (or encrypted) proxies form a secure connection (HTTPS) which can
                                            only be detected and stopped by recognizing the proxy connection before                                                                         
                                            the three-way handshake is completed and the secure tunnel is formed.

   Google Proxies                           Google can be used as a proxy by either choosing the option to translate
   Google Mobile                            the website into another language, or show content as it would appear on a                                                                      
                                            mobile device, both of which allow for unrestricted Web browsing that all
                                            appears to come from Google and therefore circumvents filtering policies.

   Transparent Proxies                      Transparent proxies work when a user changes his/her browser settings to

                                                                                                                                                                                            
                                            search through a proxy. Thousands of free IP addresses are available online
                                            and can be easily added to any browser. These IP addresses are constantly
                                            changing and therefore very difficult to detect and stop as thousands of
                                            new IPs are published daily.                                                                                                                                           DeepNines_WebProxy_0909




1 4 6 4 3 D a l l a s P a r k w a y, S u i t e 1 5 0 | D a l l a s , T X 7 5 2 5 4 - 8 8 0 1 | t e l 2 1 4 . 2 7 3 . 6 9 9 6 | e m a i l s a l e s @ d e e p n i n e s . c o m | w e b d e e p n i n e s . c o m

Copyright © 2009 DeepNines Technologies, Inc. All rights reserved. DeepNines, the DeepNines logo and DeepNines products of DeepNines Secure Web Gateway and DeepNines
features, technologies and product-lines are registered trademarks of DeepNines Technologies, Inc. All other trademarks are the property of DeepNines Technologies, Inc. or their
respective owners. While every effort is made to ensure the information given is accurate, DeepNines does not accept liability for any errors or mistakes which may arise.
Specifications and other information in this document may be subject to change without notice. DeepNines Data Sheet released 09, 2009. DeepNines is protected by US
Patents 6,930,978, 7,058,976 and 7,380,272.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Proxy Blocker Ds Lr[1]

  • 1. Web Proxy Data Sheet DeepNines Proxy Blocker detect and eliminate security bypass Proxy Blocker Product Benefits DeepNines Proxy Blocker detects and eliminates Web-based proxies that circumvent network security and filtering solutions. By identifying, reporting • Real-time identification and and preventing Web proxies in real-time, Proxy Blocker protects against users blocking bypassing content filtering, security policies and malware detection across all • Denies unauthorized Web access ports and protocols. By preventing unauthorized access to the Web, users and proxy tunneling cannot access online content and applications using the over 200 ports and the • Eliminates unwanted bandwidth variety of protocols that consume bandwidth, violate security policies, and consumption open vulnerabilities in the network. • Ensures security compliance and Proxy Blocker’s complete proxy protection uses proprietary technology to enforcement of acceptable use detect and block all proxies by identifying the fundamental technology used policies by the proxy without knowing the specific IP address or URL. In order to • Prevents inappropriate, illegal or completely identify and block all Web proxies, the DeepNines Secure Web unwanted Web traffic Gateway with Proxy Blocker inspects all ports and protocols. Many proxy • Supports SafeSearch mode in blocking technologies only inspect port80 with URL filtering techniques, Google and Yahoo which is incomplete, allowing users to easily circumvent the solution. • Prevents peer-to-peer access and downloads • Reduces risks of botnets R e a l -T i m e N e t w o r k D e f e n s e
  • 2. Web Proxy Data Sheet Blocking Web Proxies The combination of proprietary signatures and deep packet inspection allows Proxy Blocker to identify and block all Web proxies regardless of port, protocol or application to ensure network security and compliance. The chart below outlines some of the many types of Web proxies, and how they typically work when bypassing filtering and firewall policies. DeepNines Proxy Blocker technology eliminates all of these proxy types and more. Type Description Blocked by DeepNines Anonymous Proxies Anonymous proxies are the most common type of Web proxy and therefore easiest to block. These are generally URL-based and offer an embedded feature that allows users to bypass the network through an interface on the website. Circumventors Circumventor software can be placed on a home (or any out-of-network) computer, and it will return a URL that acts as a proxy and can be used to connect back to that computer for anonymous browsing. These URLS are dynamic and easily changed if ever discovered and blocked. Tor Network The Tor network is a network of virtual tunnels that creates an indirect connection to the Internet by having the desired connection to hop through all of the computers on the Tor network before reaching its final destination, therefore disguising the browsing session and circumventing filtering policies. Browser Proxies Browser proxies are a more complex version of anonymous proxies that provide the option of selecting different types of encoding to further hide the connection. SSL Proxies SSL (or encrypted) proxies form a secure connection (HTTPS) which can only be detected and stopped by recognizing the proxy connection before the three-way handshake is completed and the secure tunnel is formed. Google Proxies Google can be used as a proxy by either choosing the option to translate Google Mobile the website into another language, or show content as it would appear on a mobile device, both of which allow for unrestricted Web browsing that all appears to come from Google and therefore circumvents filtering policies. Transparent Proxies Transparent proxies work when a user changes his/her browser settings to search through a proxy. Thousands of free IP addresses are available online and can be easily added to any browser. These IP addresses are constantly changing and therefore very difficult to detect and stop as thousands of new IPs are published daily. DeepNines_WebProxy_0909 1 4 6 4 3 D a l l a s P a r k w a y, S u i t e 1 5 0 | D a l l a s , T X 7 5 2 5 4 - 8 8 0 1 | t e l 2 1 4 . 2 7 3 . 6 9 9 6 | e m a i l s a l e s @ d e e p n i n e s . c o m | w e b d e e p n i n e s . c o m Copyright © 2009 DeepNines Technologies, Inc. All rights reserved. DeepNines, the DeepNines logo and DeepNines products of DeepNines Secure Web Gateway and DeepNines features, technologies and product-lines are registered trademarks of DeepNines Technologies, Inc. All other trademarks are the property of DeepNines Technologies, Inc. or their respective owners. While every effort is made to ensure the information given is accurate, DeepNines does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice. DeepNines Data Sheet released 09, 2009. DeepNines is protected by US Patents 6,930,978, 7,058,976 and 7,380,272.