Application Proxy

19th March 2020 | Cybrary Application Proxy


An Application Proxy is one of the most secure firewall types that can be deployed. The application proxy sits between the protected network and the rest of the world. Every packet that is sent outbound is intercepted by the proxy, which will initiate its own request and processes the response. If the packet is not a threat, the response is relayed back to the user. Thus, clients and servers never interact directly and the entire content of the packet can be inspected byte by byte if necessary. Different applications such as Java code can be checked in a Java Sandbox to assess effects before passing the packet on to a host.

Source: ScienceDirect

Additional Reading: Microsoft’s Latest Cloud Innovation: Printing

Related Terms: De-Militarized Zone, Firewall, Reverse Proxy

What does this mean for a SMB?

Application proxies are usually found in firewalls. The main deterrent to an Application proxy firewall is the performance hit of this technology on throughput. Most firewalls today are stateful inspection firewalls which can pass more traffic more quickly while still performing some (but not all) of the checks and security measures present in an Application proxy based firewall. Since stateful inspection firewalls have come a long way in security protections, they represent the majority of firewalls on the market today. There is less demand therefore in all businesses (Enterprise, Mid-market, and SMB) for application proxy based firewalls.

Where all businesses should consider using application based proxies is for all Internet traffic being passed into your business network. In these cases, even when passing this traffic to a De-Militarized Zone (DMZ) you should consider an application proxy to inspect and validate that traffic is legitimate and benign.

To learn more about Application Proxies, watch this 6 minute video:

https://www.youtube.com/watch?v=WZQnCvLqfjg

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more