1. Create a single point of access to the file transfer server
As long as you have your firewalls and reverse proxies configured correctly, no one can directly access any file transfer server. Everyone must go through a reverse proxy. When this happens, you can focus on monitoring what is going in and out through the reverse proxy.
2. Simplify access control tasks
Since you have only one point of access, you can centralize access control on that point of access. For example, you can simply create a set of IP access rules on a reverse proxy, rather than specifying the IP addresses that are allowed to connect on each server. If the user tries to connect from an unauthorized IP, the reverse proxy can immediately terminate the attempt.
3. Move user credentials to a more secure location
Most user credentials are simply stored on the file transfer server itself. Therefore, if the file transfer server is placed on the DMZ, it can be easily caught by an aggressive attacker. By moving the server to the internal network and deploying a reverse proxy to control access, you can provide better security for these credentials and the data that is protected accordingly.
4. Reduce the risk of sensitive data
Given the extensive amount of information we regularly share with business partners, customers, and field employees, I’m pretty sure some of that information is not for public use. I’m sure you don’t want your personal information, trade secrets, prototype blueprints, payroll spreadsheets, or financial data to leak to the public or fall into the hands of others.
However, if the file transfer server is located in the DMZ, then all the confidential data stored in its hard drive will attract identity thieves, corporate spies, fraudsters, and other scammers. One way to mitigate this risk is to deploy reverse proxies.
Using reverse proxies, you will have the option to move DMZ-based file transfer servers to internal networks where they are less vulnerable to attack.
5. Help to achieve compliance
Many de facto standards and government-imposed regulations do not allow data to be stored in a highly vulnerable area, such as a DMZ. For example, PCI-DSS (Payment Card Industry - Data Security Standard) explicitly requires that credit card information be stored on an internal network isolated from the DMZ.
But what if you want to share sensitive data with an organization, such as a trading partner, that does not have access to your internal network?
One solution that complies with the regulatory requirements is to place a reverse proxy in the DMZ and allow your trading partners to connect securely to your back-end servers through that proxy. Using a special reverse proxy technique (such as a DMZ stream), you can share sensitive information with external partners even if you do not put information on the DMZ or grant direct access to a back-end server.
6. Reduce capital and operating expenses
Let’s review the questions raised in items 4 and 5 of this list. One of the traditional ways to solve these problems is to install two sets of servers. One set on the DMZ serves external clients and the other serves internal clients. The downside of this solution is that it is obviously very expensive, and because you need to manage two sets of servers, it puts an additional burden on an already overworked administrator.
If you use reverse proxies, you do not have to set up two sets of servers. All of your servers can be placed on your internal network and can serve both your internal and external clients.
7. Allow transparent maintenance of back-end servers
The changes you make to the server running behind the reverse proxy will be completely transparent to the end-user. Even if you shut down a secure file transfer server (assuming it belongs to a cluster) for maintenance, upgrade, or replacement, the end-user will not notice it.
8. Enable load balancing and failover
Reverse proxies such as Jscape MFT Gateway already support high availability approaches such as load balancing and failover. This will allow you to eliminate downtime and increase productivity. In most cases, you typically set up a cluster and add a file transfer server to it. The reverse proxy will then enforce load-balancing algorithms, such as polling, weighted polling, minimum connections, weighted minimum connections, or random numbers, to distribute the load between servers in the cluster.
When the server is shut down, the system automatically fails over to the next server, and users can continue their secure file transfer activities.