Mode of operation
TightGate-Pro is a so-called ReCoBS. ReCoBS stands for Remote-Controlled Browser System, literally translated as "remotely controlled web browser". TightGate-Pro physically separates the web browser execution environment from the workstation. The system helps shield the internal network from the Internet. TightGate-Pro thus serves to protect against attacks from the Internet that exploit security vulnerabilities in popular Internet browsers. TightGate-Pro is the most widely used dedicated ReCoBS. It is used by government agencies, administrative bodies, financial institutions and industrial enterprises, among others - in short, wherever Internet access at the workplace is essential, but internal infrastructures need to be secured in the best possible way.
With TightGate-Pro, the web browser no longer runs on the workstation computer. Instead, a dedicated server located outside the internal network takes over the execution of the browser. The workstation computer receives only the browser's screen display as graphics. Conversely, mouse and keyboard input for remote control of TightGate-Pro is transmitted from the workstation. A packet filter between TightGate-Pro and the workstation PCs ensures that connections are only made from the workstation PCs to TightGate-Pro.
For you as a user, hardly anything changes in your daily work. Instead of the local browser, you open TightGate-Pro by clicking on the "Internet" icon located on your desktop. Since TightGate-Pro is a very flexible system, it may be that your company or agency has a specially customized version of TightGate-Pro in use. It is therefore possible that individual operating steps may have to be carried out in a slightly different way than specified in this manual. Therefore, please also refer to the supplementary information provided by your system administrator, who will be happy to explain any possible changes to you.
Note: While the use of the Internet via TightGate-Pro is largely analogous to the local Internet browser, there are differences in the respective procedures when transferring files that you want to download from the Internet. In this context, please pay particular attention to the notes in this user manual and follow the specifications of your system administration.