Web Proxy Caching


Web Proxy Caching Solutions 



Background


Web proxy caching stores copies of frequently accessed Web objects (such as documents, images, and articles) close to users and serves this information to them. Internet users get their information faster, and Internet bandwidth is freed for other tasks.

The proxy cache eases bandwidth requirements and reduces delays that are inherent in a heavily trafficked, Internet-connected network.

The proxy cache also stores all of the images and sub-files for the visited pages, so if the user jumps to a new page within the same site that uses, for example, the same images, the proxy cache has them already stored and can load them into the user's browser quicker than having to retrieve them from the Web site server's remote site.

Caching is a very useful caching technology because up to 90% of WAN traffic is repetitive. The reason for this is that most enterprise traffic is composed of the following:


Web application traffic – Users at the branch typically use the same or similar Web applications. Each interaction with these applications results in WAN traffic that is marginally different than the traffic for previous interactions resulting in the resending of the same bytes.

File server traffic – File traffic makes several round-trips over the WAN while the user is working on a file. The typical office applications save copies of the file at small intervals resending only slightly modified versions of the same document over the WAN link. Because byte caching is bidirectional – files requested or saved take advantage of byte caching.

E-mail traffic – Enterprise e-mails are frequently addressed to several people. For each recipient in the branch, a copy of the email travels over the WAN. In addition, replies to emails contain repetitive data resulting in further redundant traffic over the WAN.





Solution Features & Benefits


> WAN optimisation

> Enhancing employee productivity

> Integrated security, such as application control, SSL decryption, web content filtering, sensitive data loss prevention, web data audit and logging and anti malware (Spyware & anti-virus protection).






Solution Platforms
  • Appliance
  • Software for a physical server
  • Virtual machine version

  • Cloud-based service



Content Caching


Internet access is critical to the smooth functioning of any enterprise and latency or network congestion can disrupt business critical business apps. Content Caches acts as the enterprise’s network “memory”, remembering content and returning it locally rather than wasting precious internet bandwidth: 



Acceleration Web Content

  • Reduces user frustration caused by slow networks and business applications.
  • Provide compression support in HTTP to improve the web user experience.
  • Save significantly on bandwidth and accelerate the delivery of rich Web 2.0 content, including video.
  • Video caching - caches resource heavy video content, e.g. YouTube.
  • Off-load SSL decryption and encryption.


Bandwidth optimisation


Optimise traffic between office sites across private or public networks.

WAN optimisation consists of a number of techniques that you can apply to improve the efficiency of communication across your WAN. These techniques include protocol optimisation, byte caching, web caching, SSL offloading, and secure tunnelling.

Web caching stores web pages on the proxy server to reduce latency and delays between the WAN and web servers.

SSL offloading offloads SSL decryption and encryption from web servers onto SSL acceleration hardware.



Productivity

Implement granular access policies based on users, groups, time of day, location, network address, user, and other attributes to meet unique business requirements.

Administrators can create policies that control user access to 99.7 percent of commonly visited websites using 95 content categories including pornography, violence, hacking, sports, news, dating, shopping, chat, and more.

Granular control over Web 2.0 sites and web applications, including social media platforms.





Security Features



> Secures the enterprise 
Growing privacy concerns are increasing SSL usage, user identification or full authentication and putting new demands on web infrastructure.



> Application Control
Real-time deep packet inspection technology to analyse protocols independent of their port of destination servers.

By integrating Layer 7 protocol analysis with policy controls, enables complete control over application usage.




> SSL

Secure user access to web applications by acting as an SSL termination / origination point. This enables the proxy as an SSL termination point with re-encryption to web servers, or a man-in-the-middle (MITM) configuration.

Organisations can control online content normally hidden by SSL. This includes content found in social-media platforms, web-based email, and search engines. Administrators can specify domains and URL categories for which SSL-encrypted traffic will be decrypted and scanned for malware and policy.



> Keyword detection

Includes pre-built English-language dictionaries of keywords and phrases pertaining to harassment, weapons, terrorism, and pornography. Administrators can configure the device to automatically generate alerts when content containing these keywords or phrases is posted to social media portals and search engines. Administrators can also add their own keywords and phrases for monitoring. The alerts are tagged with real network user identities, making it easy to identify the source, independent of online profiles.




> Protects Web Application Servers

Deploy a reverse proxy solution, transparently or non-transparently as a web application reverse proxy.

Granular blocking controls allow you to granulary configure, block all or allow all. This is very useful when detecting unknown user agents and numeric hosts in untrusted network environments. 

 


> IPv6  

Act as a proxy gateway providing IPv6 to IPv4, and IPv4 to IPv6 support. 



> Web Filtering

  • Web content filtering to prevent access to unwanted or malicious content. 
  • Allows the network administrator to block access to selected content 
  • To block inappropriate web content

 

> Spyware and Virus Protection

Updated database to identify and block access to sites known to host spyware and viruses. It also detects installed spyware trying to access the Internet. 



> Archive and Analyse Data


Use the web proxy to monitor and archive outbound web application communications like Facebook posts, tweets, and web-based email to a message archiving solution. These messages can be indexed and then mined for forensic analysis.




> Cloud-based Web Security Service

  • Utilise scalable could architecture
  • Multi-tenanted environment
  • Managed SaaS (Software-as-a-Service) provides policy based web security for mobile user and remote office locations.







Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk