Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Network Security


Anonymous Proxy 2.0: When Traditional Filtering Falls Short

Request Your Free White Paper Now:

"Anonymous Proxy 2.0: When Traditional Filtering Falls Short"

Learn how Cymphonix Network Composer effectively controls filter bypass attempts.

In this white paper you will learn why traditional proxy-based and mirror-port filtering techniques are unable to keep up with advanced filter bypass techniques and how Cymphonix employs the following four-pronged approach to help you achieve effective anonymous proxy control:
  • In-line Packet Inspection
  • Certificate Inspection and Control
  • Active Filter Avoidance Scanning Technology
  • Full Decryption, Dynamic Scanning and Re-encryption
See how easy controlling anonymous proxies and other filter avoidance techniques can really be. Download this white paper now!

Offered Free by: Cymphonix Corporation

Other Resources from: Cymphonix Corporation

Share This:

Copyright © 2016 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to's Privacy Policy.
Resources: | FAQ | Legal Notices