BIS Secure Proxy

Bridge the gap between security and flexibility with SEEBURGER BIS Secure Proxy

Data security and data integrity play a major part when it comes to transferring business data via the internet.
Data needs to be exchanged in a secure, compliant manner and your intra-corporate network needs outward protection. Simultaneously, you need to connect new business partners fast and in a flexible way without the hindrance of a highly complex IT-infrastructure.

With SEEBURGER BIS Secure Proxy you can meet all of these targets at the same time.
BIS Secure Proxy protects your data exchange, simplifies your DMZ-infrastructure and provides faster onboarding of business partners.  Through central administration of all partner-specific configurations in the Business Integration Suite the connection of partners can be seamlessly assigned at the push of a button - partner-specific firewall configurations are no longer necessary.
BIS Secure Proxy acts as an Application Layer gateway without persistent data. The connection between BIS and BIS Secure Proxy is only ever opened in one direction - secure zone to unsecure zone. Sensitive data is no longer held on exposed systems and the risk of data theft is greatly reduced.

The SEEBURGER BIS Secure Proxy solution at a glance:

BIS Secure Proxy provides a consolidated, centrally administered application layer gateway (Proxy/Reverse Proxy) solution for all external communication protocols such as FTP, SFTP, AS/2, HTTP etc., available as an integrated module of the SEEBURGER Business Integration Suite.

Bandwidth Management, Black/ White-Listing and the integration of external systems via  ICAP interface are part of the BIS Secure Proxy solution as well as authentication and protocol filtering.

BIS Secure Proxy assures compliant data transfer according to SOX, HIPAA, PCI DSS etc.

The SEEBURGER BIS Secure Proxy solution at a glance:

Features:

  • High availability via clustering & load-balancingg
  • No data stored in the DMZ
  • No session from unsecure zone to secure zone opened
  • Protocol termination in the DMZ
  • Authentication in the DMZ
  • Centralized configuration
  • ICAP Interface to connect AVP and DLP
  • IP Addresses Black/ White-Listing
  • Bandwidth Management

Benefits:

  • Increased security and efficiency for partner onboarding 
  • Full control of all external connections and communication
  • Connections are only outbound from the secure zone
  • No partner specific firewall configuration; no loss of security
  • No data or authentication information stored in the DMZ
  • Reduces complexity of infrastructure
  • Enables regulatory compliance to:
    • Sarbanes-Oxley Act (SOX)
    • Gramm-Leach-Bliley Act (GLBA)
    • Federal Financial Institutions Examination Council (FFIEC)
    • Health Insurance Portability and Accountability Act (HIPAA)
    • European Union Data Protection Directive
    • Personal Information Protection and Electronic Documents Act (PIPEDA)
    • Payment Card Industry Data Security Standard (PCI DSS)

参考

@

Contact us

Please fill in all fields to send us a message

Please fill in
Your message has been delivered