• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Search
Search
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Security
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Security for Chromebook
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella and Cisco Secure Access Packages
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
      • Cisco Umbrella for Government Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Your SSE journey with Cisco
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
      • Umbrella and Duo Layered Protection
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
        • – FTC Safeguards Rule Compliance 2023
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
      • Cybersecurity Webinars
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is DNS Security
      • What is a Secure Web Gateway
      • What is a Cloud Access Security Broker (CASB)
      • What is Security Service Edge (SSE)
      • What is Secure Access Service Edge (SASE)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Free Trial Quick Start Guide
      • Free Trial Help and Tips
  • Trends & Threats
    • Market Trends
      • Generative AI Cybersecurity Risks and Rewards
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Clearing search keywords

What Is A Secure Web Gateway?

A secure web gateway (SWG) is a web proxy network security solution that protects a business’s internal network beyond the Domain Name System (DNS) layer from unsecured internet traffic. SWG security tools filter web traffic, block threats, enforce policies, and safeguard data.

Explore Cisco Umbrella’s SWG

Why Secure Web Gateway | SWG Versus Firewall | SWG Features | Related Topics

Webinar: Dissatisfied with your SWG?

Video: Umbrella Secure Web Gateway features

Cisco Umbrella Secure Web Gateway (0:29)

Is Cisco Umbrella a secure web gateway?

Cisco Umbrella offers secure web gateway features. Umbrella is a cloud-delivered service that acts as an SWG between users and the internet, enabling traffic inspection, URL filtering, threat protection, policy enforcement, application visibility and control, data loss prevention, and DNS security.

Secure Web Gateway Basics

Icon: How it works

What does a secure web gateway do?

An SWG acts as a checkpoint to filter and monitor web traffic, allowing safe internet access while blocking potentially harmful content. SWG tools inspect URLs, detect threats, decrypt select encrypted traffic for inspection, and report analytics to help ensure secure and compliant web browsing.

Icon: Question in a light bulb

What are the benefits of a secure web gateway?

A secure web gateway can:

  • Block malware, viruses, phishing, and web-based threats
  • Enforce policies
  • Prevent data leakage
  • Gain visibility and control over distributed networks
  • Protect users regardless of location
  • Consolidate network security tools
  • Reduce risk and costs
Icon: Strong Protection

Why do companies need a secure web gateway?

Organizations need an SWG to protect against malware and phishing, enforce security policies to meet compliance mandates, and protect sensitive data. Essential for a distributed workforce, an SWG secures internet traffic and data access for all trusted users and devices, regardless of location.

Is a secure web gateway a firewall?

An SWG is not a firewall, but they work together to enhance network security. SWGs work at the application level to block or allow connections based on custom policies to protect against web-based threats. Firewalls primarily monitor data packet transfers at the network level and block known threats.
 

Woman is working on a laptop. She is signing up to subscribe to our blog to the Cisco Umbrella blog

A man and woman are working together in a well lit office. The woman is pointing to information on a computer monitor that is sitting on a desk.

Is a secure web gateway the same as a proxy?

A gateway is not a proxy, but SWGs use proxy servers for URL filtering. The difference between the two is that proxy servers route traffic from a client to a server, often for online anonymity, whereas gateways use proxy architecture to apply protection and policy enforcement to web traffic.

What are the features of SWG security?

Web proxy

A web proxy is an intermediary server that stands between users and the internet. Before allowing web content to reach the user, it inspects and filters web traffic, enforces access policies, and blocks web-based threats.

Learn about proxy servers

Policy enforcement

Policy enforcement refers to enabling and applying security rules to regulate web traffic. Policies define rules and restrictions for web usage, such as blocking specific websites, controlling application access, and prohibiting sensitive data transfer.

Customize your policies

Antivirus and anti-malware protection

Antivirus and anti-malware protection uses technologies that detect, prevent, and block malicious software and threats. These tools scan web traffic in real time to identify and remediate viruses, malware, ransomware, and other malicious content.

Investigate Umbrella

Traffic inspection

Traffic inspection refers to intercepting and examining encrypted web traffic. Encryption allows for safe exchange of sensitive data, but cybercriminals also use encryption to hide malware. Traffic inspection helps apply application-specific security, detect hidden threats, enforce URL and malicious content filtering, and secure web traffic.

Inspect traffic with SWG

Data loss prevention (DLP)

A secure web gateway with DLP security inspects outgoing web traffic, scans for sensitive data, and enforces policies to prevent data leaks. It analyzes content, applies predefined outbound traffic rules, and blocks sensitive data from leaving an organization’s network.

Read more about DLP

URL filtering

URL filtering is a security feature that blocks or allows access to websites based on their URLs or web addresses. It prevents users from accessing malicious or inappropriate websites and enforces compliance policies. Filtering can also allow restrictions on streaming services to optimize network performance.

Research web filtering

Sandboxing

Sandboxing is a security technique used to analyze potentially malicious code in a safe, isolated environment. It allows security professionals to test and observe suspicious files without risking damage to the host system or network.

Dig into sandboxing

Cloud-based outbound firewall

A cloud-based outbound firewall is a network security tool that provides firewall protections from the cloud. It monitors, filters, and enforces policies on network traffic. This firewall enables layer 7 application visibility and control, layer 3 and 4 protection of all ports and protocols, and an intrusion prevention system for added threat defense.

Discover more about cloud-based firewall

Remote browser isolation (RBI)

Remote browser isolation (RBI) is a security tool that runs a user’s web-browsing session in a virtualized environment in the cloud. Isolating web content in a secure container allows access to potentially risky websites without the risk of malware infections.

Learn about Umbrella RBI

Application visibility and control

Visibility and control functions allow organizations to gain insight into employee usage of cloud applications. Visibility informs reports on vendors, categories, application activity, and risk levels. This reporting enables better control over cloud adoption, risk reduction, and blocking or restrictions of inappropriate applications.

Gain app visibility

Get started

Why Umbrella
Cisco Umbrella packages
Cisco Umbrella overview (video 2:10)
How cloud security reduces threat risk e-book
Cloud Security Comparison Guide
Cisco Umbrella cloud security services
Cisco Secure Web Gateway
DNS-layer security that speeds up your network

Cisco security blogs

What is a secure web gateway and why do you need one?
The SWG of the future is simple and scalable
Consolidate your security in the cloud with Cisco Umbrella
AV-TEST places Cisco Umbrella first in SWG security
SASE and SSE: What you need to know
Cisco Secure Firewall on AWS

 

Ready to simplify and strengthen your cybersecurity with Cisco Umbrella?

Start a free trial now

Follow Us

Facebook X LinkedIn Youtube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2025 Cisco Umbrella