JSCAPE
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Pricing
  • Company
    • Blog
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
  • Support
    • Help Desk
    • Documentation
    • Customer Downloads
Get a demo

Keeping sensitive data out of the DMZ with a reverse proxy

Words by

Van Glass

A DMZ (demilitarized zone) is a section of the network that is exposed to an untrusted network, usually the Internet. The purpose of a DMZ is to act as an extra layer of security between external hosts and internal hosts. For security purposes, hosts located in the DMZ may have limited or no access to…

Published in:

Blog

/

JSCAPE MFT, Managed File Transfer

A DMZ (demilitarized zone) is a section of the network that is exposed to an untrusted network, usually the Internet. The purpose of a DMZ is to act as an extra layer of security between external hosts and internal hosts. For security purposes, hosts located in the DMZ may have limited or no access to hosts and services located on the internal network. Examples of hosts that may reside in the DMZ include mail servers, web servers, FTP servers and SFTP/SSH servers.

Trading partners regularly use the Internet to perform file transfers requiring that some file transfer services reside in the DMZ. The problem with this is that for various reasons the data to be transferred often does not or cannot reside in the DMZ. Two examples have been provided below which demonstrate the types of problems that can be experienced.

Trading Partner Examples

Example #1

Host A connects to Host B running an FTP/S service in the DMZ. Host A wishes to download a file from Host B however the file does not reside on Host B, rather it resides on Host C which is located on a server on the internal network unaccessible to Host A. How does Host B get the file that resides on Host C to Host A?

Example #2

Host A connects to Host B running an SFTP service in the DMZ. Host A wishes to upload a file to Host B however the organization for Host B has a policy that no files may physically reside in the DMZ. This is a common scenario for those organizations subject to government compliance requirements such as PCI that require no sensitive information (e.g. credit card data) be stored in the DMZ. How can this policy be enforced?

Solution

In order to solve the problem scenarios above one can use what is called DMZ streaming. DMZ streaming is a method of streaming data between the client, DMZ services and private internal networks while keeping the data from ever physically residing on DMZ servers.

What is a Reverse Proxy?

A common method of achieving DMZ streaming is through the use of a reverse proxy. A reverse proxy is a type of proxy server software that accepts incoming client connections and then connects to one or more (for reverse proxies that offer load balancing capabilities) destination server on behalf of the client.

The response from the destination server is then received by the reverse proxy and forwarded back to the client as though it came directly from the reverse proxy. This process is completely transparent to the client with all protocol translation and load balancing are handled by the reverse proxy.

How does a Reverse Proxy Work?

reverse proxy server

  1. Client establishes a connection to a file transfer service on the reverse proxy. An optional firewall in front of the DMZ may limit the services that the client can connect to and/or the IP addresses that client may connect from.
  2. Reverse proxy establishes a tunnel between the client, reverse proxy and file transfer service on the internal network. A firewall in front of the internal network is configured to allow connections to file transfer services on internal network from the reverse proxy.
  3. Client communicates seamlessly with file transfer services on the internal network via the tunnel established by the reverse proxy.

Summary

In this article I discussed DMZ streaming, reverse proxies and how these can be used to perform file transfers between DMZ hosts and hosts residing on an internal network. Using DMZ streaming in combination with MFT software can help users and organizations streamline file transfers while meeting compliance requirements such as HIPAA and PCI-DSS.

JSCAPE MFT Gateway is a load balancer and reverse proxy server that allows your trading partners to access your data without having to open ports on your internal network or store sensitive information in the DMZ. It currently comes with a fully-functional evaluation edition which you can download right now.

Download Reverse Proxy Gateway

Easy To Deploy, Easy To Administer, Easy To Manage

Ready to see how JSCAPE makes managed file transfer so much simpler? Schedule your demo now.

Request a demo

Popular Articles

View more by

JSCAPE
  •  
    1–2 minutes
    23/09/2025

    JSCAPE by Redwood, version 2025.3: New UI continues to make a splash

    Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive. 

    Read article

  •  
    1–2 minutes
    19/08/2025

    Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline

    The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of international tariffs throughout 2025, have…

    Read article

  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    23/07/2025

    Avoid downtime and threat actors: Getting the best of both worlds in MFT

    For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT software vulnerabilities to prevent breaches…

    Read article

Related Content

Read more about

JSCAPE MFT
  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    03/07/2025

    Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times

    Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are compelling enterprise organizations to reevaluate…

    Read article

  •  
    1–2 minutes
    31/03/2025

    SFTP vs. FTPS: Which file transfer software is best for business use?

    What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage…

    Read article

  •  
    1–2 minutes
    25/03/2025

    EDI integration with trading partners: 6 best practices

    Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI).…

    Read article

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Cookie Settings