473,850 Members | 2,032 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Expose firewall protected web apps and web services to the INTERNET securely and cost-effectively

A lot of architects tackle the issue of exposing internal web services
and web applications to the Internet. How many times do you see a
requirement such as "the application should be accessible to users
behind the firewall (on the intranet) but also to users on the

Traditionally, architects had two choices - beg the network engineers
and managers to "poke holes" in the firewall (unlikely), buy an
expensive specialized firewall which takes a long time to acquire,
configure and put in place, or replicate the application server,
perhaps the database server (and more) to the DMZ or Internet
accessible network segment. This is very costly, error prone, a
security nightmare and very time consuming.

Enter SecureWithin! Bitkoo's revolutionary product that removes all
the headaches associated with exposing internal endpoints to the
Internet easily, securely and with no added hardware or even a need
for your own DMZ.
How does it work? As the name implies - a combination of two smart
gateways, an internal and an external. The internal establishes
communications with the external and creates a persistent SSL tunnel.
Thus working within the constraints of the firewall and within the
security policy and security best practices. The external gateway is
deployed either on your own DMZ or on Bitkoo's hosted DMZ service.
Internet clients access the external gateway which looks to clients
exactly like the internal web application, web service or any TCP or
UDP endpoint.

Sophisticated security algorithms are used by both gateways to make
sure only authorized users can see designated endpoints. The solution
is far superior to VPN. Why? Because the entire network isn't exposed
- only designated internal endpoints. Also, absolutely no client-side
software is required.
The system protects against denial of service attacks, it tracks
intrusion attempts and stops them cold, notifies administrators of
suspicious activity and MUCH MORE.

Bitkoo's patent-pending technology is battle proven and extremely easy
to use and administer. It scales to thousands of simultaneous users,
it handles voice over IP or streaming video with ease and most
importantly it is secure (within).

If you need to expose your Intranet based apps or services to the
Internet and want to shave off weeks of development, configuration and
tens of thousands of Dollars in cost, visit http://www.bitkoo.com

Some suggestions for using SecureWithin in your environment: Expose
internal Microsoft Sharepoint sites, FTP or SFTP servers, SSH, Telnet,
Windows Communications Foundation (WCF), .Net remoting applications,
existing DCOM applications and much more.

Feb 14 '07 #1
0 1881

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

by: owen | last post by:
I have been developing web-based applications for around 3 years, first using ASP, and more recently, ASP.NET. I am starting to wonder if web applications are really the way forward for software. And by 'software' I mean applications, (eg. word, excel) not web sites (eg. amazon.com). I am starting to think, with the .NET framework being shipped with new operating systems, and freely available online, that a better way forward is...
by: Richard Choate | last post by:
I'm writing an article and I need your informed opinions, so I ask you this: 1. Doesn't the web-enabled app generally run slower for one reason or another? 2. Isn't the fact that application graphics must be limited, just proof of #1, especially with low bandwidth situations? 3. Aren't the web-enabled apps really less feature rich because the developer has to emulate the controls of a thick/fat client app, and sometimes you just can't...
by: Rajesh Kapur | last post by:
Hello, We use Informix and MySQL on linux/unix to drive our web application. SQL*Server is used only for backend enterprise applications within the firewall. I am trying to get the management to use SQL*Server outside the firewall. They tell me there are security issues with Microsoft products, including SQL*Server, that make it vulnerable to attacks outside the firewall. Can someone please point me to white papers/documentation that...
by: asj | last post by:
Just when I say web services may be hyped, here comes a news report that says Swedish Referendum Results will be delivered in real time over the internet using Java web services. In one sense, exposing the real-time results as a web service is sorta cool, since other apps can tie in to it and distribute the info to multiple targets. n the other hand, wouldn't deploying the information via HTML be easier for the majority of people who...
by: Jason Shohet | last post by:
I've got web services that work fine on a machine on our network, but not a single IIS box in our DMZ, neither 2003 or 2000. I don't have remote access to these machines, so I have to deploye with a floppy disk and copy all the folders & files in the web service 'site' to a site on the new box, except for the underscore folders (vti_ etc). I'm using framework 1.1 and VS.net v2 to build the ws's. On the DMZ machine I can browse to the...
by: nezoat | last post by:
Here is some working code to open the specified TCP port on the gateway nat device or firewall, and forward it to the calling machine. Great for p2p apps. The newsgroups are such a great resource and have helped me so much, I hope this helps others. Let me know if you find it useful! Lee Carlson Lee (at) Carlson (dot) net -----------------------------------
by: jb | last post by:
Hi, I've a software in winforms who needs to read data from a webservice in Internet, but the mcafee antivirus or others, are asking for permissions to the user to allow the connection to internet. This is a problem, because the users of the software aren't computer engineers, they doesn't understand the questions of the firewalls, and they usually block the software. Is there any solution?
by: ndskim | last post by:
Currently I have the Web Services Proxy code generated by the WSDL.Exe command line. My Web app consists of ASP.NET in VB 2005 version. Here is what I have in the sample code: ' Set Proxy Credentials to the current network DefaultCredentials. With lds_WebService
by: =?Utf-8?B?bnV1dHV1ZG5ldA==?= | last post by:
We want to use allready written C sharp programs for our asp.net applications. The idea is that we write a program ONCE and use this same EXACT logic for our internet apps. Everything will run on the same server but we will have two types of clients 1. web based, 2. intranet based. Is this possible? If so, what is it called in Microsoft speak? How to links would be appreciated. -- cheers, nuutuudnet
by: =?Utf-8?B?RHdlZWJlcmVsbGE=?= | last post by:
I created an Access 2007 application for my customer. The application is shared by three employees on a server. It maintains a contact list including financial data and social security numbers. Only the office manager generates reports in Access from this client data. Now they want to share this Access application with employees at a remote office. They expect to have a maximum of 30 employees editing the client list in both the...
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.