Back to Trust Center
A
Authenticated Proxy

Mechanisms exist to force systems and processes to authenticate Internet-bound traffic with a proxy to enable user, group and/or location-aware security controls.