Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security products, providing limited security functionality against today’s advanced threats.

Once upon a time, Proxies fulfilled a need traditional firewalls could not meet: visibility into web traffic starting with categorization of HTTP and later HTTPS traffic.

However, little to no emphasis was put on traffic and the vast number of applications utilizing other avenues of accessing corporate networks.

Proxy vendors still over-emphasize the importance of HTTP and HTTPS traffic while downplaying the role of applications utilizing other entry points in cyber attacks. This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security. 

This white paper is available in Portuguese.