Benefits of ETP Proxy

The ETP proxy provides these benefits:

  • Hides sensitive information. Since suspicious traffic is directed to the proxy, an additional layer of security is present between the end user, ETP, and the origin server that responds to the request. The malicious website communicates with the proxy and information about the site is reported to ETP.

  • ETP threat intelligence identifies threats. In addition to custom lists that are created by an enterprise, ETP includes threat categories for malware, phishing, C&C communication, and more. For more information, see Threat categories.

  • ETP Proxy blocks unsafe traffic. ETP Proxy enhances security in the corporate network by examining the full URL and blocking or dropping traffic that is unsafe. ETP blocks traffic for a specific URL without blocking the entire domain. In a HTTP or HTTPS threat event, the blocked URLs are reported as compromised for the specific threat type.

  • Certificates establish trust. The ETP proxy uses short-lived, dynamically generated certificates to establish trust with the suspected site. If a website is blocked, the end user receives an error with this certificate.

  • Inline payload analysis. If inline payload analysis is enabled, an enterprise can also inspect website content. For example, this feature allows an enterprise to scan files on websites. For more information see Inline payload analysis.

  • Scans all web traffic. If you have an on-premises proxy or ETP Client, you can forward traffic to ETP Proxy and configure ETP Proxy to scan all web traffic. For more information, see Full web proxy.

  • TLS renegotiation is not supported. To address TLS weaknesses, ETP Proxy does not support TLS renegotiation with TLS 1.3.

Did this page help you?