Greetings,

I believe I have an adequate understanding of how proxy works and why it is
beneficial to implement into ones network security solution.

But, I have been unable to find a good source on the benefits of and
practical implementations of a reverse proxy.  I have bee told by "security
consultants" that my network should have a reverse proxy, but are unable to
give me a clearly defined answer as to why.  (personally, I think the people
I have been dealing with are just security salesmen, and don't really know
what the hell they are techno-babbling about).

Could someone give me a point of reference to perform further research,
and/or give me a basic overview of its practical application?

Many thanks,

winmail.dat

Reply via email to