Unrivalled user experience

Unique architecture eliminates the need to proxy web traffic. 11+ global data centres for guaranteed ultra-fast response times.

Empower the mobile workforce

Web Security provides roaming, personal (BYOD) and guest device support with zero-touch configuration and follow-the-user filtering.

Total flexibility & transparency

Rapid and flexible policy creation with a unique visual rule builder that enables powerful web access control without impacting users.

+ combine with other security products to unlock the benefits of ASE

Enable traditionally silo’d products to share and react to security events and state data whilst leveraging world class threat intelligence. Prevent attacks before they enter the kill chain.

Total web security for today's threats

The web has changed – secure web gateways haven’t. Censornet Web Security provides next generation protection from all web-related threats.

Dangerous content

Harmful, offensive, inappropriate or illegal content on malicious pages or hidden deep within legitimate sites.

Phishing simulation
Web-borne malware

Malware distribution sites, compromised pages on legitimate sites, malvertising and infected files either downloaded or cloud-shared.

Inappropriate images

Inappropriate ‘Not Safe For Work’ (NSFW) images – including adult, offensive and extremist content.

jump To:

How Censornet Web Security works

Unique architecture eliminates the need to proxy web traffic, preserving the user’s real IP address and upholding privacy by allowing the browser to maintain direct communication with the web application server.

Web security cloud service process

Features & Benefits of Web Security

Bite-sized Online Training
Threat protection

Protection via a powerful combination of real-time traffic inspection, URL reputation, advanced anti-malware and threat intelligence.

Encrypted sites

With over 70% of the web encrypted deep inspection of SSL/TLS traffic is essential.

Automatic unknown URL classification

Automatic real-time analysis of previously unseen pages.

Guest and Captive portals

Create and apply separate policies to personal and guest devices.

Powerful policies

Block/allow or apply time quotas based on users, groups, devices by category or keyword lists.

Page level categorisation

With Web Security, every page within a site is categorised – not just the domain or sub-domain

Intuitive user interface


Interested in finding out more?

Arrange a demo or download our technical datasheet.
Image Content Analysis

The Image Content Analysis (ICA) add on for Web Security protects employees and IT environments from inappropriate ‘Not Safe For Work’ (NSFW) images – including adult, offensive and extremist content.

ICA incorporates AI and deep learning technology to provide extremely high accuracy, eradicating false positives.

ICA enables powerful Acceptable Use Policy enforcement – without the need for human moderation – whilst protecting employees, avoiding legal liability, and maintaining company culture and brand image.

  • Prevent NSFW imagery from entering the environment
  • Identify users that are potentially misusing Internet (web) access
  • Detect and manage high-risk image and video content
  • Proactive, automatic enforcement of policy as and when required – with an audit trail to demonstrate action / protection


Simple Management

ICA is fully integrated within the Web Security service as an optional add on to the Censornet Cloud Security Platform. ICA scans all images and videos accessed online automatically, replacing any inappropriate content with a ‘safe’ symbol.

Legal Liability

In most countries employers can be held vicariously liable for the actions of their employees – unless they can demonstrate they have taken all reasonable steps to protect their people from a hostile working environment.

ICA protects organisations from harassment and offensive content claims – or even criminal charges if illegal content is involved – and ensures a safe workplace for everyone.

Brand Preservation

Companies spend exceptional amounts of time and money building a compelling brand and positive brand image. Negative press coverage can damage an organisation’s brand almost instantaneously but take an age to restore. ICA mitigates the risk of unwanted publicity.

Image Content Analysis is also available for CASB API Mode – scanning content of files uploaded to cloud storage applications including box, Dropbox, Google Drive, and OneDrive.

Image Content Analysis is also available as an add-on for Email Security scanning images in email messages and attachments.

Gateway Antivirus (AV)

After email, the web is the second most common vector for malware infection.

The Antivirus (AV) add on for the Censornet Cloud Gateway provides an optional additional layer of advanced malware protection at the network edge, stopping malicious code before it reaches the endpoint.

Gateway AV scans all accessed web content in real-time for malware with support for all file types known to be used to spread malware content – including executables, packed executables, archives, Office documents, flash files and MP4 video. The AV engine is updated hourly.

A multi-layer web security model protects users from advanced malware threats:

  • Layer 1 – uses URL filtering and online threat detection to identify malware before it gets to the device
  • Layer 2 – uses heuristics, emulation, and generic signatures to identify unknown malware that has not been seen previously (zero day malware)
  • Layer 3 – monitors file behaviour and blocks the file if it starts to behave maliciously
  • Layer 4 – file hashes are compared with a database of more than 1.6 billion known clean file hashes to reduce false positives
Extended Logging

This optional add on provides additional reports by Active Directory Group including:

Top Web Categories by Group – The top Web categories visited by all users with the option to limit to a specific Active Directory group (direct membership).

Top Domains by User or Group – The top domains visited by users with the option to limit to a specific Active Directory group (direct membership).

Top Users or Groups by Time Spent – The top users by approximate time spent browsing, with the option to limit to a specific Active Directory group (direct membership).

What Our Customers Say

newlife-logo-800 w
In-built permissions over what our staff can and can’t access improves productivity and security. The risk from the web is well known but without the addition of cloud security, there is a risk staff could be downloading dangerous files from applications without even realising it. Overall, the control from Censornet, and the ability to drill down into traffic coming from the web and cloud, gives us greater security that we aren’t going to be hacked.
Phil Ashcroft, Technology Manager, Newlife
We needed to allow the off-site users to access the internet without going through the VPN, as it really hindered connectivity. We wanted to ensure all users were as protected as possible. Censornet Web Security allowed us to do this.
Hamish Ross, Senior IT Engineer
Tangerine Confectionery logo
Censornet stood out because it was an exact match for our requirements. When employees leave the network, they are seamlessly protected when browsing online. Censornet Web Security was the only product in the market that could provide this solution for us. Censornet has delivered the solution it promised and have gone above and beyond to ensure that it works with our business. It prevents issues before they happen by making sure employees are protected from malicious sites and activity online. We have had no security issues since we began using it.
Mike Ryan, Infrastructure Manager
The Censornet team was really keen to understand Cloetta’s specific business issues and design a solution that would best protect Cloetta’s assets, whether that was our secret confectionery recipes or secure financial information.
GertJan Minkels, Solution architect

Web Security stats

Sub Categories

Our platform

Total visibility, seamless authentication and powerful intelligence.

All at your fingertips with integrated email, web and cloud security with identity and context.

Secure your entire organisation from known, unknown & emerging email security threats - including email fraud.
Protect your organisation from web-borne malware, offensive or inappropriate content & improve productivity.
Discover, analyse, secure & manage user interaction with cloud applications - inline & using APIs.
Advanced data loss prevention, protect your data from unauthorized access, accidental disclosure, and attacks.
Defend your organisation against cybercriminals and strengthen your ‘human firewall’.
Protect user accounts with more than just a password and reduce the impact of password reuse.
Get total control over user access, replacing passwords entirely across all applications.

Autonomous Security Engine
Pioneering ASE technology

Connecting your entire security product suite so it evolves and reacts automatically to a changing threat landscape.
ASE provides 24x7 security so you don’t need to
Full access to threat intelligence without the cost
Integral part of the Censornet platform