Are Proxy Anonymizers Putting Your Enterprise in Peril?

Are Proxy Anonymizers Putting Your Enterprise in Peril?
Like many modern threats to enterprise security, the use of proxy anonymizers is largely part of a behavioural issue. Chances are, your company deploys web filters to fight off the threats lurking in cyberspace. And chances are, some of your employees have no trouble bypassing them by accessing web pages hosting proxy anonymizers, simple scripts that give surfers a way to get to sites that are officially off-limits. With so many new ones being created every day, ordinary filtering technology based on URL blocking just can't keep up. And because they don't raise red flags in log files the way unapproved sites do, they elude easy detection by IT security staff. Like many modern threats to enterprise security, the use of proxy anonymizers is largely part of a behavioural issue. Chances are, your company deploys web filters to fight off the threats lurking in cyberspace. And chances are, some of your employees have no trouble bypassing them by accessing web pages hosting proxy anonymizers, simple scripts that give surfers a way to get to sites that are officially off-limits. With so many new ones being created every day, ordinary filtering technology based on URL blocking just can't keep up. And because they don't raise red flags in log files the way unapproved sites do, they elude easy detection by IT security staff. -->

Published on 03 November 2010

By M86 Security
As a registered user of CBR you can skip the majority of this form. Registration is FREE so register now or log in if you're already a member.

Download whitepaper

I have read and accept the terms and conditions and privacy policy.
We'd like to keep you informed about relevant promotions, products and services, or if you would prefer not to receive these, uncheck this box.
If you would prefer not to hear from carefully selected third party companies uncheck this box
More White Papers

Join our network

733 people like this.
0 people follow this.

Related Intelligence and Suppliers

White Papers

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.