Wednesday, September 18, 2024
Homecyber securitySecure Web Gateway (SWG) - A New Bulletproof Corporate Web Security To...

Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web Attacks

Published on

The goal of Perimeter 81 from day one has been about providing cost-effective and cloud-based security solutions, such as our cloud-based Zero Trust Network Access (ZTNA) for protecting the corporate network in the new WFH hybrid model. 

Recently, we were named a Gartner® Recognized Representative ZTNA vendor. A proud achievement. With over 2,500 businesses greatly benefiting from Perimeter 81’s wide range of security services, we have added yet another tool to our arsenal.

The Need for Online Protection by Remote Workers

In that same study, we found that 64% of remote workers were the targets of various cybersecurity incidents in 2020 and 2021. The leading causes were ransomware and phishing attacks. So, the need to develop a Secure Web Gateway felt an almost natural fit for us.

- Advertisement - EHA

Perimeter 81’s SWG is designed to work against all kinds of threats with custom bypass rules. You’re now able to easily filter out harmful content or restrict certain websites such as gambling, gaming, and social media. Fewer distractions translate to increased employee productivity and a safer work environment. 

How Perimeter 81’s Secure Web Getaway Works

One of the main features of our SWG is web filtering, which also helps prevent shadow IT. Shadow IT is the use of hardware and software by a department without the knowledge of IT. This can be a real problem for a large scale organization as over 80% of workers have admitted to using SaaS applications at work without approval from IT.

Web filtering ensures that only authorized employees may access certain sites or applications.                                                             

We have also included rules for bypassing security in some instances where admins may want to do so. Some programs do not require SSL inspection, or admins may also want to bypass security to comply with some web activity privacy regulations.

With web access monitoring, organizations can have the visibility into web activities that they need for total network security. You can also create reports on web activity which can be filtered by employee or URL so that security breaches are easily caught and contained from the onset.

Available for Windows, Mac, Linux, and mobile devices. Employees have a shield of security since the “always-on” feature is kept by default, so remote devices can remain protected – far from the traditional office setting.                                

Other features we have added in the past year to enhance our security and networking capabilities include:                         

Malware detection coming soon, so stay tuned! We can’t wait to hear back from our early release customers after they try out all the features of our Secure Web Gateway. Learn more about our SWG and other solutions by scheduling a demo or contacting your Perimeter 81 account manager.

Latest articles

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN...

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in...

Discord Announces End-to-End Encryption for Audio & Video Chats

Discord has introduced end-to-end encryption (E2EE) for audio and video chats.Known as the...

Threat Actor Allegedly Selling Bharat Petroleum Database

A threat actor has allegedly put up for sale a database belonging to Bharat...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in...

Discord Announces End-to-End Encryption for Audio & Video Chats

Discord has introduced end-to-end encryption (E2EE) for audio and video chats.Known as the...

Threat Actor Allegedly Selling Bharat Petroleum Database

A threat actor has allegedly put up for sale a database belonging to Bharat...