This article can also be found in the Premium Editorial Download "Information Security magazine: What's the best IT security advice you've ever received?."
Download it now to read this article plus other related content.
eSafe is typically installed behind the perimeter firewall. It can be installed in router mode and in transparent bridge mode as a forwarding proxy, or it can work using Check Point Software Technologies' Content Vectoring Protocol to communicate with Check Point firewalls. In bridge and router modes, eSafe provides clustering, load-balancing and failover capabilities.
This was first published in August 2005