Web Security
Unrivalled user experience
Unique architecture eliminates the need to proxy web traffic. 11+ global data centres for guaranteed ultra-fast response times.
Empower the mobile workforce
Web Security provides roaming, personal (BYOD) and guest device support with zero-touch configuration and follow-the-user filtering.
Total flexibility & transparency
Rapid and flexible policy creation with a unique visual rule builder that enables powerful web access control without impacting users.
+ combine with other security products to unlock the benefits of ASE
Enable traditionally silo’d products to share and react to security events and state data whilst leveraging world class threat intelligence. Prevent attacks before they enter the kill chain.
Total web security for today's threats
The web has changed – secure web gateways haven’t. Censornet Web Security provides next generation protection from all web-related threats.
Dangerous content
Harmful, offensive, inappropriate or illegal content on malicious pages or hidden deep within legitimate sites.
Web-borne malware
Malware distribution sites, compromised pages on legitimate sites, malvertising and infected files either downloaded or cloud-shared.
Inappropriate images
Inappropriate ‘Not Safe For Work’ (NSFW) images – including adult, offensive and extremist content.
How Censornet Web Security works
Unique architecture eliminates the need to proxy web traffic, preserving the user’s real IP address and upholding privacy by allowing the browser to maintain direct communication with the web application server.
Features & Benefits of Web Security
Threat protection
Encrypted sites
Automatic unknown URL classification
Guest and Captive portals
Powerful policies
Page level categorisation
Intuitive user interface
Interested in finding out more?
-
Image Content Analysis
-
The Image Content Analysis (ICA) add on for Web Security protects employees and IT environments from inappropriate ‘Not Safe For Work’ (NSFW) images – including adult, offensive and extremist content.
ICA incorporates AI and deep learning technology to provide extremely high accuracy, eradicating false positives.
ICA enables powerful Acceptable Use Policy enforcement – without the need for human moderation – whilst protecting employees, avoiding legal liability, and maintaining company culture and brand image.
- Prevent NSFW imagery from entering the environment
- Identify users that are potentially misusing Internet (web) access
- Detect and manage high-risk image and video content
- Proactive, automatic enforcement of policy as and when required – with an audit trail to demonstrate action / protection
Simple Management
ICA is fully integrated within the Web Security service as an optional add on to the Censornet Cloud Security Platform. ICA scans all images and videos accessed online automatically, replacing any inappropriate content with a ‘safe’ symbol.
Legal Liability
In most countries employers can be held vicariously liable for the actions of their employees – unless they can demonstrate they have taken all reasonable steps to protect their people from a hostile working environment.
ICA protects organisations from harassment and offensive content claims – or even criminal charges if illegal content is involved – and ensures a safe workplace for everyone.
Brand Preservation
Companies spend exceptional amounts of time and money building a compelling brand and positive brand image. Negative press coverage can damage an organisation’s brand almost instantaneously but take an age to restore. ICA mitigates the risk of unwanted publicity.
Image Content Analysis is also available for CASB API Mode – scanning content of files uploaded to cloud storage applications including box, Dropbox, Google Drive, and OneDrive.
Image Content Analysis is also available as an add-on for Email Security scanning images in email messages and attachments.
-
Gateway Antivirus (AV)
-
After email, the web is the second most common vector for malware infection.
The Antivirus (AV) add on for the Censornet Cloud Gateway provides an optional additional layer of advanced malware protection at the network edge, stopping malicious code before it reaches the endpoint.
Gateway AV scans all accessed web content in real-time for malware with support for all file types known to be used to spread malware content – including executables, packed executables, archives, Office documents, flash files and MP4 video. The AV engine is updated hourly.
A multi-layer web security model protects users from advanced malware threats:
- Layer 1 – uses URL filtering and online threat detection to identify malware before it gets to the device
- Layer 2 – uses heuristics, emulation, and generic signatures to identify unknown malware that has not been seen previously (zero day malware)
- Layer 3 – monitors file behaviour and blocks the file if it starts to behave maliciously
- Layer 4 – file hashes are compared with a database of more than 1.6 billion known clean file hashes to reduce false positives
-
Extended Logging
-
This optional add on provides additional reports by Active Directory Group including:
Top Web Categories by Group – The top Web categories visited by all users with the option to limit to a specific Active Directory group (direct membership).
Top Domains by User or Group – The top domains visited by users with the option to limit to a specific Active Directory group (direct membership).
Top Users or Groups by Time Spent – The top users by approximate time spent browsing, with the option to limit to a specific Active Directory group (direct membership).
What Our Customers Say
Web Security stats
Our platform
Total visibility, seamless authentication and powerful intelligence.
All at your fingertips with integrated email, web and cloud security with identity and context.