How To Secure Web Gateway & Web Filtering

In Association with Perimeter81

A secure web gateway offers protection against online security threats by enforcing company security policies and filtering malicious internet traffic in real-time. At a minimum, a secure web gateway offers URL filtering, application controls for web applications and the detection and filtering of malicious code. Data leak prevention features are essential. 

Secure web gateways (SWG) have become increasingly common as cyber criminals have grown more sophisticated in embedding threat vectors into seemingly innocuous or professional-looking websites. 

These counterfeit websites can compromise the enterprise as users access them, unleashing malicious code and unauthorised access in the background without the user's knowledge. The fake, criminal websites can be quite convincing.

Web filters are capable of preventing users from accessing sites that puts malicious code on the user's computer. Even on a small level, web filtering allows companies to block web sites that don't support an effective work day,as well as not fitting the requirements of their security policies.

And now Perimeter 81 has just launched its new Secure Web Gateway which also includes the highly in-demand Web Filtering features that are very popular among Network Security and IT managers. 

Benefits of Web Filtering: 

  •  Protects employees and the corporate network from web-based malicious threats.
  • Increases productivity by decreasing distractions from certain websites.
  • Prevents shadow IT and the use of unauthorized sites for business purposes.

A Secure Web Gateway protects a company’s employees and network from the dangers of the Internet. 
Web filtering is the key feature of SWG that allows the admin to determine who can reach what URL or website, even if they are not connected to the network. Users can be allowed access, denied access, or warned against proceeding.

Pain Points that Web Filtering Addresses:

  • Danger of hacks through phishing attempts of employees or employee access of malicious sites.
  • Employee use of distracting or illicit sites (such as gambling sites) during work hours.
  • Need to provide auditors with tracked web activity for compliance purposes.

How Web Filtering Works

With Perimeter 81, admins can set web filter rules using the same easy interface and quick deployment that the Perimeter 81 platform is known for. Unlike other rules in Perimeter 81, web filtering operates even when the employee is not connected to the network - in other words, the employee device is always protected with the agent running in the background.

Web Filter Rules

Web filter rules can be set per employee or employee group (for example, the marketing department may need access to social media sites to do their job, but the R&D department does not), and can also apply to specific days of the week or times. Admins can choose to block a specific site or an entire category, such as “Gaming” or “Phishing.” Categories are dynamically updated daily as new sites are identified.

Bypass Rules

There are certain cases when web filter rules should be bypassed. 

  • If there are privacy regulations – for example, if employee access of healthcare or financial sites is not allowed to be tracked.
  • If an application, such as Slack or Dropbox, needs unfiltered access.

For this we have Bypass Rules, which can be similarly set for specific employee groups, web categories, and programs.

Monitoring and Tracking

Monitoring and tracking are a fundamental and necessary part of SWG. Perimeter 81 Web Filtering tracks all employee attempted access of “denied” or “warned” sites, so that companies can take action following suspicious activity. Reports can be exported as a CSV file for auditing and analysis purposes.

For more information about Secure Web Gateways and Web Filtering please Contact Cyber Security Intelligence.

You Might Also Read:

Secure Network Access For The Modern Distributed Workforce:

 

« Ransomware Attack On Moncler
Online Daters Must Protect Themselves Against Fraud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.