What is internet content adaptation protocol (ICAP)?

ICAP (Internet Content Adaptation Protocol) is a protocol designed for communication between proxy servers and their additional services. It is similar to the HTTP protocol and is primarily used for filtering and modifying data transmitted by reverse proxies. Through ICAP, proxy servers can be connected to various additional services, such as virus scanners or web application firewalls (WAFs), to ensure the security and integrity of data traffic.

Typically, virus scanners are connected to WAFs via ICAP to scan traffic in real time for malware and other threats. In addition, external filters and other WAF additional services can also be based on ICAP to enable filtering, analysis and modification of data streams.

ICAP allows proxy servers to dynamically access traffic and act according to defined policies and rules. This provides granular control over data flow, enabling organizations to enforce security policies and meet compliance requirements.

Overall, ICAP serves as an important interface for integrating security solutions into network environments and enables companies to protect their IT infrastructure from a wide range of threats. By leveraging ICAP, organizations can improve the security of their network while optimizing the performance and efficiency of their proxy servers.

The Airlock Gateway uses the ICAP as an interface to integrate additional components into your security solution.

Airlock Gateway

Information for you

-Our whitepapers-

Executive View: KuppingerCole - Airlock Secure Access Hub for applications and APIs

This KuppingerCole Executive View report provides an architectural and functional overview of the Airlock Secure Access Hub, an integrated platform for secure access management - a multicloud-native security tool for web applications, APIs and beyond.

 

Fill out the form now and receive Executive View!

Whitepaper: Security for cloud-native applications

You can read about how companies can ensure the security of web applications and APIs in Kubernetes in the white paper "Security for cloud-native applications", which was created in collaboration between heise and Airlock.

 

Request whitepaper

Whitepaper: Zero Trust is a journey

The ongoing digital transformation of the world is progressing and having a profound impact on our personal and professional lives in ways that were difficult to imagine just a few years ago.


This white paper discusses the effects of continuous digitalization and its impact.

Request free of charge

Off to DevSecOps

In this white paper, you will learn the most important insights into how you can implement DevSecOps successfully and efficiently, which security components are required for this and the advantages of a microgateway architecture.

 

Request free of charge

Airlock 2FA - Strong authentication. Simple.

Double security - this is what two-factor authentication offers in the field of IT security.


Find out more about strong authentication and the possibilities offered by Airlock in our white paper.

Download for free

Further whitepapers

We provide you with free white papers on these and other topics:

 

  • Successful IAM projects
  • compliance
  • Data protection (DSGVO)
  • Introduction of PSD2
  • PCI DSS requirementsPCI DSS requirements
Request free of charge