fbpx
Proxy Servers are referred to those servers that act as an intermediary to the request made by clients to a particular server for some services or request for some resources.
 
 
There are several types of proxy servers available whose use will depend on the purpose of a request made by the clients to the servers. The purpose of Proxy servers is to Protects the direct connect of Internet clients and internet and internet resources: Proxy server prevents the identification of the client’s IP address while any request is made to any other servers.
  • Internet clients and internal resources: Proxy servers also act as a shield for an internal network against the request coming from a client to access the data on that server. The original IP address of the node remains hidden while accessing data from that server.
  • Protects true host identity: Outgoing traffic appears to come from the proxy server. It must be configured to the specific application e.g. HTTPs or FTP.
 
For example, as a client to MNC, a client can use a proxy to observe the traffic of its contract employees to get the work efficiently done. It can also be used to keep a check on any leakage of internal highly confidential data. Some can also use it to increase their websites rank and get the traffic diverted anonymously.
 

This Article Was Written & published by Meena R,  Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India. 

Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...

She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms. 

34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook. 

If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:

Click Here to follow her: Cybersecurity PRISM