ArticlesArticles 1 - 10 of 17
First | Prev. | 1 2 | Next | Last | All March 21, 2017
Unified Threat Management
Unified Threat Management (UTM), also called Unified Security Management (USM), is an all-in-one information security solution. The first UTMs appeared in 2004 as network attacks became too sophisticated to be fended off by the conventional firewalls.
Tags: UTM, Unified Thread Management
March 21, 2017
A firewall is a network device or a software application that monitors and, if necessary, filters traffic based on predefined settings. History and internal structure of firewalls.
March 21, 2017
Content Delivery Network
A content delivery network (CDN), also called content distribution network, is a global network that optimizes content delivery to end users on the Web. By using a CDN, content providers can greatly increase video, audio, software, and game downloading speeds.
Tags: CDN, CrystalWeb
October 25, 2016
Setting Up HTTPS Inspection in Squid
Tags: squid, ssl, https, proxyinspector
August 03, 2016
Configuring Squid proxy server and ProxyInspector to work together
Tags: Squid, ProxyInspector, squid.conf, access.log, log file
May 20, 2014
Configuring the WinGate 8 NAT log to work with ProxyInspector
Tags: WinGate 8, ProxyInspector, log file
May 14, 2014
Configuring Microsoft Exchange 2013 to work with MailDetective
Tags: Exchange Server 2013, MailDetective, log file
February 26, 2014
Configuring Cisco Web Security Appliance (IronPort) for working with ProxyInspector
Tags: ProxyInspector, Cisco Web Security, IronPort, log file
February 03, 2014
Life After TMG: Sophos UTM
As you most probably know, Microsoft has discontinued Forefront Threat Management Gateway 2010 (TMG) without announcing an official successor. With no direct upgrade path being available from Microsoft, more and more loyal TMG users start looking around for a replacement.
Tags: Sophos UTM, TMG, ProxyInspector, Astaro
November 18, 2013
Configuring Sophos UTM to work with ProxyInspector
Getting log files can often be a challenge when you use proprietary gateways and firewalls deployed on Linux. Luckily, this is not a problem for Sophos UTM.
Tags: Sophos UTM, ProxyInspector, log file, Astaro
Articles 1 - 10 of 17
First | Prev. | 1 2 | Next | Last | All
Internet access monitoring and reporting software