Logo
Sign in
Product Logo
Fortra SWGDigital Gardian

Cloud-native secure web gateway protecting against threats, data leakage, and suspicious web traffic.

fta-cdp-fortra-swg-ds.pdf
Product details

Overview

Fortra Secure Web Gateway (SWG), formerly Clearswift SWG, is a web security solution that monitors inbound and outbound internet traffic for malicious content and sensitive data. It provides granular policy controls to block threats such as malware and phishing while preventing unwanted data leakage through context-aware content inspection. With its zero-trust architecture and single-proxy design, the solution delivers full inspection of all web connections to strengthen protection and ensure continuous compliance.

Features & Capabilities

  • **Policy Management: **Flexible, granular policy control applicable to entire organizations, departments, or individual users.
  • **Deep Content Inspection: **Analysis of web content including text, documents, and metadata using lexical logic to detect sensitive information even within embedded metadata.
  • **Adaptive Redaction: **Automatic removal of sensitive information while allowing the rest of the content to pass through unharmed.
  • **Inbound Threat Protection: **Integrated anti-virus engines with heuristic and behavioral analysis to detect malware, spyware, and harmful executable files.
  • **Executable / Script Sanitizing: **Scans incoming scripts and downloads, removing potentially dangerous active content from HTML files and documents.
  • **URL / Web Filtering: **Large, regularly updated URL category database with real-time classification of new or unknown websites.
  • **Time / Quota Policies: **Controls based on time of day or allowed browsing duration within specific URL categories.
  • **Data Loss Prevention (DLP): **Detection of PII, PCI, and HIPAA-related data through pattern matching and customizable compliance dictionaries.
  • **OCR (Optical Character Recognition): **Detection of sensitive text embedded within images such as screenshots or scanned documents.
  • **Web Activity Monitoring: **Comprehensive monitoring of all inbound and outbound web traffic to enforce policies and generate logs.
  • **Shadow IT Detection: **Identification of unauthorized cloud or web applications used within the organization.
  • **Content Filtering: **Restriction of access to websites by category, including social media, gambling, and potentially harmful sites.
  • **Deployment Options: **Available as a hardware appliance, virtual machine image, or cloud-based deployment in public cloud environments.
  • **Reporting & Auditing: **Extensive reporting and auditing features delivering insights into usage patterns, violations, data movement, and threats.
  • **Regulatory Compliance Support: **Built-in compliance dictionaries supporting frameworks such as HIPAA, PCI, and SOX.