Streaming vs. proxy deep packet inspection

26.03.2012

As a result of proxy-based DPI, CPU cycles are spent on buffering versus other tasks, and the CPU has to multitask and prioritize between several files already buffered for scanning. This introduces very high latency for proxy-based solutions, compounded by ever-increasing amounts of network traffic containing rich content and multiple . Because application proxies are application-specific, an unknown application creates a potential security loophole or compatibility issue.

Against a backdrop of continually expanding , application proxies are not highly scalable. Thus, application proxies present definite implementation challenges against the two core -- but not always harmonious -- goals:

1. Protect critical business data from the most sophisticated threats, while still enabling the business to enjoy the productivity benefits of , multiple devise and rich content.

2. Maintain that robust, comprehensive security capability against the tidal wave of employee demand and network usage -- without causing significant performance issues.

PHENOMENON: