972-590-9690
info@deepnines.com
DeepNines Technologies
Proxy Blocker
DeepNines Proxy Blocker is major requirement for Web security. A Web proxy is a computer, server or application that provides a surrogate connection to the internet that bypasses your existing network Web servers, thus bypassing all security in place for unmonitored, uncontrolled and unprotected access to the Web. Web proxies are easy to find (in excess of 56 Million websites dedicated to providing free proxies), anonymous, and completely free, which translates into the largest Web security gap in existence. The popularity of Web proxies and other circumvention tricks has dramatically increased in recent years because the tactic does not require a person to be technically savvy or have specific programming knowledge – simply type in any search engine “Web proxy” or similar, and away they go… Simply put, all Web security solutions must have proxy blocking as a core technology in order to provide real protection and control of Web traffic.

With more and more time spent on social networking, music downloading, streaming video and other recreational activities, users often resort to Web proxies in an effort to gain unrestricted Web access, which leaves your network completely vulnerable to acceptable use policy violations and serious threats like botnets, Trojans, worms and other types of viruses and malware. And since most traditional solutions only inspect URL-based traffic, it is usually very easy to find and connect to Web proxies that circumvent content filters and firewalls. Proxy Blocker prevents and reports on anonymizers or anonymizing proxy servers, tor networks, tunneling and encrypted proxies, and many more. The combination of proprietary signatures and deep packet inspection allows Proxy Blocker to identify and block all Web proxies regardless of port, protocol or application to ensure network security and compliance.

DeepNines Proxy Blocker detects and eliminates Web-based proxies that circumvent network security and filtering solutions. By identifying, reporting and preventing Web proxies in real time, Proxy Blocker protects against users bypassing content filtering, security policies and malware detection across all ports and protocols. Additionally since the DeepNines approach is based on detecting the fundamental technology used by the proxy, Proxy Blocker can immediately block all Web proxies without knowing the specific IP address or URL.
 
  • Provides complete proxy blocking
  • Eliminates any security and filtering circumvention
  • Provides enforcement of acceptable use policies
  • Prevents pornography viewing, peer-to-peer downloads, chat
  • Provides real time identification and blocking
  • Eliminates unwanted bandwidth consumption
  • Prevents inappropriate, illegal or unwanted Web traffic
  • Supports SafeSearch mode in Google and Yahoo!
DeepNines products that utilize Proxy Blocker are the Secure Web Gateway and iTrust Agent via the Secure Web Gateway. The technology's protection and findings are logged for reporting by the Network Security Manager.
There are more than 26 different types of Web proxies, and Proxy Blocker eliminates them all. The chart below outlines some of the more popular types of Web proxies and how they typically work when bypassing filtering and firewall policies.

TYPE

DESCRIPTION

BLOCKED BY DEEPNINES

Anonymous Proxies

Anonymous proxies are the most common type of Web proxy and therefore easiest to block.  These are generally URL-based and offer an embedded feature that allows users to bypass the network through an interface on the website. 

YES

Circumventors

Circumventor software can be placed on a home (or any out-of-network) computer, and it will return a URL that acts as a proxy which can connect back to the computer for anonymous browsing.  These URLS are dynamic and easily changed if ever discovered and blocked.

YES

Tor Network

The Tor network consists of virtual tunnels that make an indirect connection by having the connection hop through all of the computers on the Tor network before reaching its final destination, therefore disguising the browsing session and circumventing filtering policies.

YES

Browser Proxies

Browser proxies are a more complex version of anonymous proxies that provide the option of selecting different types of encoding to further hide the connection.

YES

SSL Proxies

SSL (or encrypted) proxies form a secure connection (HTTPS) which can only be detected and stopped by recognizing the proxy connection before the three-way handshake is completed and the secure tunnel is formed.

YES

Google Proxies

Google Mobile

Google can be used as a proxy by either choosing the option to translate the website into another language, or show content as it would appear on a mobile device, both of which allow for unrestricted Web browsing that all appears to come from Google and therefore circumvents filtering policies.

YES

Transparent Proxies

Transparent proxies work when a user changes his/her browser settings to search through a proxy.  Thousands of free IP addresses are available online and can be easily added to any browser.  These IP addresses are constantly changing and therefore very difficult to detect and stop as thousands of new IPs come out daily.

YES