Direct or Transparent Proxy - Test News

  • Choose the right configuration for your gateway.
  • McAfee

It appears that you have accessed this information via a path other than responding to our newsletters.  If this is indeed the case, please let us know who you are so we may add you to our community.



I agree to the Terms and Conditions and Privacy Policy (See below)

Organizations should deploy a secure web gateway (SWG) to protect their networks against access by malicious software.  A SWG intercepts and examines inbound and outbound web traffic and, in effect, becomes a proxy for the user.  Regardless of the choice between a between a direct proxy or a transparent proxy, both require some effort to work. This paper looks at the pros and cons of each option.

  • Download Paper
  • More resources from McAfee

    In order to provide you with this free service, we share your registration and usage information with sponsors and partners of Webtorials.  Your registration indicates that you accept the Terms of UseCopyright, and Privacy Policy, plus the Copyright and Professional Opinions as noted below. 

    Copyright 1999-2015 Distributed Networking Associates. All portions of this web site are copyrighted by Distributed Networking Associates and/or the organization credited as the source of information. All forms of reproduction and/or recording, including photocopying, tape recording, and video taping are strictly prohibited without the express prior written permission of Distributed Networking Associates. Clipart used may include images from Corel, Broderbund, and IMSI.

    Professional Opinions - All information presented and opinions expressed by Distributed Networking and/or the other organizations represented at Webtorials are the current opinions of Distributed Networking and/or the other organizations represented at Webtorials based on professional judgment and best available information at the time of presentation. Consequently, the information is subject to change, and no liability for advice presented is assumed. Ultimate responsibility for choice of appropriate solutions remains with the reader.