Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Proxy server - Wikipedia

    en.wikipedia.org/wiki/Proxy_server

    A proxy server may reside on the user's local computer, or at any point between the user's computer and destination servers on the Internet. A proxy server that passes unmodified requests and responses is usually called a gateway or sometimes a tunneling proxy. A forward proxy is an Internet-facing proxy used to retrieve data from a wide range ...

  3. Bastion host - Wikipedia

    en.wikipedia.org/wiki/Bastion_host

    Bastion host. A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks, so named by analogy to the bastion, a military fortification. The computer generally hosts a single application or process, for example, a proxy server or load balancer, and all other services are removed or limited ...

  4. Jump server - Wikipedia

    en.wikipedia.org/wiki/Jump_server

    Jump server. A jump server, jump host or jump box is a system on a network used to access and manage devices in a separate security zone. A jump server is a hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them. The most common example is managing a host in a DMZ from ...

  5. Firewall (computing) - Wikipedia

    en.wikipedia.org/wiki/Firewall_(computing)

    Firewall (computing) In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. [1] [2] A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. [3]

  6. DMZ (computing) - Wikipedia

    en.wikipedia.org/wiki/DMZ_(computing)

    DMZ (computing) In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network or screened subnet) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional ...

  7. Personal firewall - Wikipedia

    en.wikipedia.org/wiki/Personal_firewall

    A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. [1] Typically it works as an application layer firewall . A personal firewall differs from a conventional firewall in terms of scale. A personal firewall will usually protect only the ...

  8. Comparison of firewalls - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_firewalls

    Included on Palo Alto. Networks firewalls. Proprietary, PAN-OS, Based on the Linux kernel. Sophos. Proprietary. Included on Sophos UTM. Linux -based appliance. Cisco ASA Firepower.

  9. Dual-homed - Wikipedia

    en.wikipedia.org/wiki/Dual-homed

    A dual-homed host (or dual-homed gateway [2]) is a system fitted with two network interfaces (NICs) that sits between an untrusted network (like the Internet) and trusted network (such as a corporate network) to provide secure access. Dual-homed is a general term for proxies, gateways, firewalls, or any server that provides secured applications ...