When it comes to security, it pays to have Zero Trust
Following a rapid shift towards remote working and accelerated cloud adoption, businesses are dealing with numerous challenges to support suddenly ...
Protect your organisation from web-borne malware, offensive or inappropriate content and manage time spent on websites that impact productivity with Censornet Web Security. Powered by a unique architecture that ensures lightning fast response times for all users no matter where they are in the world.
Unique architecture eliminates the need to proxy web traffic. 11+ global data centres for guaranteed ultra-fast response times.
Web Security provides roaming, personal (BYOD) and guest device support with zero-touch configuration and follow-the-user filtering.
Rapid and flexible policy creation with a unique visual rule builder that enables powerful web access control without impacting users.
Unique architecture eliminates the need to proxy web traffic, preserving the user’s real IP address and upholding privacy by allowing the browser to maintain direct communication with the web application server.
Protection via a powerful combination of real-time traffic inspection, URL reputation, advanced anti-malware and threat intelligence.
With over 70% of the web encrypted deep inspection of SSL/TLS traffic is essential.
Automatic real-time analysis of previously unseen pages.
Create and apply separate policies to personal and guest devices.
Block/allow or apply time quotas based on users, groups, devices by category or keyword lists.
With Web Security, every page within a site is categorised – not just the domain or sub-domain
Arrange a demo or download our technical datasheet.
The Image Content Analysis (ICA) add on for Web Security protects employees and IT environments from inappropriate ‘Not Safe For Work’ (NSFW) images – including adult, offensive and extremist content.
ICA incorporates AI and deep learning technology to provide extremely high accuracy, eradicating false positives.
ICA enables powerful Acceptable Use Policy enforcement – without the need for human moderation – whilst protecting employees, avoiding legal liability, and maintaining company culture and brand image.
ICA is fully integrated within the Web Security service as an optional add on to the Censornet Cloud Security Platform. ICA scans all images and videos accessed online automatically, replacing any inappropriate content with a ‘safe’ symbol.
In most countries employers can be held vicariously liable for the actions of their employees – unless they can demonstrate they have taken all reasonable steps to protect their people from a hostile working environment.
ICA protects organisations from harassment and offensive content claims – or even criminal charges if illegal content is involved – and ensures a safe workplace for everyone.
Companies spend exceptional amounts of time and money building a compelling brand and positive brand image. Negative press coverage can damage an organisation’s brand almost instantaneously but take an age to restore. ICA mitigates the risk of unwanted publicity.
Image Content Analysis is also available for CASB API Mode – scanning content of files uploaded to cloud storage applications including box, Dropbox, Google Drive, and OneDrive.
Image Content Analysis is also available as an add-on for Email Security scanning images in email messages and attachments.
After email, the web is the second most common vector for malware infection.
The Antivirus (AV) add on for the Censornet Cloud Gateway provides an optional additional layer of advanced malware protection at the network edge, stopping malicious code before it reaches the endpoint.
Gateway AV scans all accessed web content in real-time for malware with support for all file types known to be used to spread malware content – including executables, packed executables, archives, Office documents, flash files and MP4 video. The AV engine is updated hourly.
A multi-layer web security model protects users from advanced malware threats:
This optional add on provides additional reports by Active Directory Group including:
Top Web Categories by Group – The top Web categories visited by all users with the option to limit to a specific Active Directory group (direct membership).
Top Domains by User or Group – The top domains visited by users with the option to limit to a specific Active Directory group (direct membership).
Top Users or Groups by Time Spent – The top users by approximate time spent browsing, with the option to limit to a specific Active Directory group (direct membership).
“In-built permissions over what our staff can and can’t access improves productivity and security. The risk from the web is well known but without the addition of cloud security, there is a risk staff could be downloading dangerous files from applications without even realising it. Overall, the control from Censornet, and the ability to drill down into traffic coming from the web and cloud, gives us greater security that we aren’t going to be hacked.”
Phil Ashcroft, Technology Manager, Newlife
“We needed to allow the off-site users to access the internet without going through the VPN, as it really hindered connectivity. We wanted to ensure all users were as protected as possible. Censornet Web Security allowed us to do this.”
Hamish Ross, Senior IT Engineer
“Censornet stood out because it was an exact match for our requirements. When employees leave the network, they are seamlessly protected when browsing online. Censornet Web Security was the only product in the market that could provide this solution for us. Censornet has delivered the solution it promised and have gone above and beyond to ensure that it works with our business. It prevents issues before they happen by making sure employees are protected from malicious sites and activity online. We have had no security issues since we began using it.”
Mike Ryan, Infrastructure Manager
“The Censornet team was really keen to understand Cloetta’s specific business issues and design a solution that would best protect Cloetta’s assets, whether that was our secret confectionery recipes or secure financial information.”
GertJan Minkels, Solution architect
Total visibility, seamless authentication and powerful intelligence. All at your fingertips with integrated email, web and cloud security with identity and context.
Secure your entire organisation from known, unknown & emerging email security threats - including email fraud.Discover More_
Protect users from web-borne malware, offensive or inappropriate content & improve productivity.Discover More_
Discover, analyse, secure & manage user interaction with cloud applications - inline & using APIs.Discover More_