Secure Web Gateway enables organizations to easily manage the enforcement of company business policies through customizable user groups and category-based URL and DNS filtering.
It also provides various threat protection measures – such as URL and DNS filtering, malware protection, TLS interception or certificate validation – to help prevent security breaches.

Protect Yourself From Web Threats
The Secure Web Gateway helps protect you from web threats and enforces your business policy.
Authentication
Authentication
Create policy groups and different levels of malware protection, URL filtering or TLS interception for different departments or groups of people.
Seamless authentication can be enabled using Kerberos tickets issued by your existing Active Directory infrastructure.
Malware Protection
Malware Protection
Protocol scanning technologies for HTTP and FTP traffic are used and combined with filters to detect both known and unknown malware.
With TLS interception, encrypted traffic can be scanned for any malicious content.
Expert-level Operations
Expert-level Operations
Enjoy the peace of mind of 24×7 monitoring, incident handling, and change management – provided by our L3 engineers.
Central policy setup and control allows you to enforce global security policies and configuration.
Authentication
Create policy groups and different levels of malware protection, URL filtering or TLS interception for different departments or groups of people.
Seamless authentication can be enabled using Kerberos tickets issued by your existing Active Directory infrastructure.
Malware Protection
Protocol scanning technologies for HTTP and FTP traffic are used and combined with filters to detect both known and unknown malware.
With TLS interception, encrypted traffic can be scanned for any malicious content.
Expert-level Operations
Enjoy the peace of mind of 24×7 monitoring, incident handling, and change management – provided by our L3 engineers.
Central policy setup and control allows you to enforce global security policies and configuration.
How Does Secure Web Gateway Work?
Authentication
Authentication
Authentication of users enables the creation of different policy groups and different levels of malware protection, URL filtering, and SSL scanning.
URL Filter
URL Filter
URL Filter enforces an organization’s internet access policy and protects against risks associated with employees’ internet use.
TLS interception and Certificate Validation
TLS interception and Certificate Validation
TLS interception and Certificate Validation applies an existing security and internet usage policy to the HTTPS protocol, expanding coverage of an organization’s policy to encrypted traffic (about 85% of all web traffic these days) and preventing viruses, spyware, and Trojans from bypassing malware protection by using HTTPS encryption.
Malware Protection
Malware Protection
Malware Protection uses protocol scanning technologies for HTTP and FTP, as well as a combination of filters, to detect both unknown and known malware. One highlight is the ability to filter for malicious macros of all Microsoft Office files (Excel, Word, etc.).
Authentication
Authentication of users enables the creation of different policy groups and different levels of malware protection, URL filtering, and SSL scanning.

URL Filter
URL Filter enforces an organization’s internet access policy and protects against risks associated with employees’ internet use.

TLS interception and Certificate Validation
TLS interception and Certificate Validation applies an existing security and internet usage policy to the HTTPS protocol, expanding coverage of an organization’s policy to encrypted traffic (about 85% of all web traffic these days) and preventing viruses, spyware, and Trojans from bypassing malware protection by using HTTPS encryption.

Malware Protection
Malware Protection uses protocol scanning technologies for HTTP and FTP, as well as a combination of filters, to detect both unknown and known malware. One highlight is the ability to filter for malicious macros of all Microsoft Office files (Excel, Word, etc.).
