![is transmit 5 an saas is transmit 5 an saas](https://onix-systems.com/web/uploads/-slSR0Jptb-sJ14mplGP1eKY1X7F_dO9.png)
The SaaS scanning service is typically provided to a plurality of endpoint computers 210 of different customers but only one endpoint computer 210 is shown for clarity of illustration. The endpoint computer 210 may also be employed outside of the private computer network 220 by taking advantage of additional security features provided by a local proxy application 211. 2, an endpoint computer 210 comprises a computer that is on-premise within a private computer network 220 of a customer (e.g., a corporation, individual, government, small business) of an SaaS scanning service provided by the SaaS scanning system 230. The components of the SaaS system 200 may communicate over the Internet or other computer network. 2, the SaaS system 200 comprises one or more endpoint computers 210, an SaaS scanning system 230, and a destination web server system 240. 2 shows a schematic diagram of an SaaS system 200 in accordance with an embodiment of the present invention.
#IS TRANSMIT 5 AN SAAS SOFTWARE#
An article of manufacture may be embodied as a non-transitory computer-readable medium including instructions that when executed by the computer 100 causes the computer 100 to be operable to perform the functions of the software modules 110.įIG. The software modules 110 may be loaded from the data storage device 106 to the main memory 108. The computer 100 may be configured to perform its functions by executing the software modules 110.
![is transmit 5 an saas is transmit 5 an saas](https://www.imore.com/sites/imore.com/files/styles/xlarge_wm_blw/public/field/image/2017/07/transmit-5-mac.jpg)
As another example, the software modules 110 may comprise a proxy server and a scanner when the computer 100 is employed as part of an SaaS proxy server system. As an example, the software modules 110 may comprise a local proxy application when the computer 100 is employed as an endpoint computer.
#IS TRANSMIT 5 AN SAAS CODE#
The software modules 110 comprise computer-readable program code stored non-transitory in the main memory 108 for execution by the processor 101. The computer 100 is a particular machine as programmed with software modules 110. The computer network interface 105 may be coupled to a computer network 109, which in this example includes the Internet.
#IS TRANSMIT 5 AN SAAS SERIAL#
The computer 100 may include one or more user input devices 102 (e.g., keyboard, mouse), one or more data storage devices 106 (e.g., hard drive, optical disk, Universal Serial Bus memory), a display monitor 104 (e.g., liquid crystal display, flat panel monitor), a computer network interface 105 (e.g., network adapter, modem), and a main memory 108 (e.g., random access memory). The computer 100 may have one or more buses 103 coupling its various components. The computer 100 may include one or more processors 101.
![is transmit 5 an saas is transmit 5 an saas](https://media.springernature.com/original/springer-static/image/chp%3A10.1007%2F978-3-030-32520-6_68/MediaObjects/478810_1_En_68_Fig5_HTML.png)
![is transmit 5 an saas is transmit 5 an saas](https://appomni.com/wp-content/uploads/2021/08/SSM-Guide-2021_Blog_Featured.png)
The computer 100 may have fewer or more components to meet the needs of a particular application. The computer 100 may be employed as an endpoint computer, as part of a computer system, and other computers described below. 1, there is shown a schematic diagram of a computer 100 that may be employed with embodiments of the present invention. In other instances, well-known details are not shown or described to avoid obscuring aspects of the invention. Persons of ordinary skill in the art will recognize, however, that the invention can be practiced without one or more of the specific details. In the present disclosure, numerous specific details are provided, such as examples of systems, components, and methods, to provide a thorough understanding of embodiments of the invention. These and other features of the present invention will be readily apparent to persons of ordinary skill in the art upon reading the entirety of this disclosure, which includes the accompanying drawings and claims. The local client transmits the web traffic to the local proxy using a communication protocol and the local proxy can transmit the web traffic to the SaaS scanning system using the same or different communication protocol. The local proxy inserts the customer identity string into the web traffic and thereafter transmits the web traffic to the SaaS scanning system, which authenticates the customer identity string before scanning the web traffic for web threats. The local proxy obtains a customer identity string that identifies a user of the local client as a paying customer of an SaaS scanning service provided by an SaaS scanning system. In one embodiment, an endpoint computer includes a local client that transmits web traffic to a local proxy that also runs on the endpoint computer.