WEB SSL VPN | SOLUTIONS | SUPPORT | COMPARE / SELECT | CORPORATE | |||||||
HOW WEB SSL VPN WORK | |||||||||
HOW MEGAPROXY® WEB SSL VPN WORK | |||||||||
|
Megaproxy® is an easy to use, affordable next-generation Web SSL VPN service. If you have a modern web browser and an Internet connection, you can experience the benefits of the Megaproxy® Web SSL VPN service anywhere, anytime by following these simple steps:
| ||||||||
SIGN-UP TODAY! | |||||||||
A CLOSER LOOK: SECURE APPLICATION-LEVEL REWRITING PROXY TECHNOLOGY | |
The Megaproxy® Web SSL VPN service is a medium that handles web requests on your behalf in order to preserve the privacy and integrity of your Internet experience. When using Megaproxy®, your web requests are first sent to Megaproxy® secure system, where they are processed and filtered for your security in the same (or less!) amount of time required to access them if they were sent directly to the target web site. On average, the process is completed within ten milliseconds. Because the connection to the Megaproxy® service is encrypted with 128-bit SSL encryption, neither the target web site nor the Internet Service Provider is able to determine where you are from, from where you are surfing, or what content you are downloading. The following message sequence details the communication stream between a user and Megaproxy® during a typical session:
- F A novice Internet user may confuse this with the operation of a typical Internet proxy server. However, Megaproxy® is not an ordinary W3 HTTP or IETF SOCKS web proxy, but rather, is an intelligent next-generation solution designed for a secure Internet browsing experience with complex technology and many exclusive service offerings. At Megaproxy's core is a proprietary application content engine that acts as a medium to safeguard your identity and prevent direct communication-- and thus the security and privacy leaks that come with it-- between your Internet browser and a remote web server. This server-side "browser-within-a-browser" operation validates the integrity of all web content by processing, filtering, and rewriting the web content before it is delivered to the end-user over a strong e-commerce grade SSL encrypted tunnel. This content purification process helps to minimize exposure to Internet exploits, spyware, hidden browser traps, popup-ads, excessive animations, and additional content payloads that do not comply with well-accepted Internet standards. Beyond essential content validation and rewriting, Megaproxy® is also the only service available to Internet users that supports real-time rewriting of both JavaScript and Macromedia Flash (including Active Script) web pages. The benefit of full-time SSL stream encryptionSince each HTTP request submitted via the Megaproxy® system travels over a secure SSL tunnel, the actual destination web site address ( ex. http://www.google.com ) remains private. Anyone snooping network packets, watching a firewall, or utilizing on-wire filtering software can only see that the user visited the Megaproxy® web site. Information about specific web sites visited or files downloaded will not be available to on-wire snoopers. The concept of secure Internet transactions over SSL/TLC is not new. Online banking institutions and e-commerce web sites rely on 128-Bit SSL technology to keep your private data confidential and "snoop-free" while in-transit on the Net. Behind the scenesMegaproxy's best of breed technology is not limited to the Megaproxy® secure proxy application engine. Each web request is load balanced "real-time" via a complex array of resources engineered to ensure that each request is successfully completed in less than 10 milliseconds. To compliment the super fast clustered architecture, Megaproxy® is strategically positioned directly on top of one of the most robust TIER-1 Internet backbones in the world to bring you unmatched service, speed and responsiveness no matter where you are located in the world. |
Copyright © 2000-2020 Megaproxy.com, Inc All Rights Reserved. | |
Access to Megaproxy® site/service is subject to Terms of Service and to our Privacy Statement. | |