Call Us
Powerful and Multilayered Web Security
Protect your organization from web-borne malware, offensive or inappropriate content, and manage time spent on websites that impact productivity with Trustlayer (formerly Censornet) Web Security — powered by a unique architecture that ensures lightning-fast response times for all users no matter where they are in the world.

Unrivalled user experience
Unique architecture eliminates the need to proxy web traffic. 11+ global data centers for guaranteed ultra-fast response times.
Empower the mobile workforce
Web Security provides roaming, personal (BYOD) and guest device support with zero-touch configuration and follow-the-user filtering.
Total flexibility & transparency
Rapid and flexible policy creation with a unique visual rule builder that enables powerful web access control without impacting users.

Total web security for today's threats
The web has changed – secure web gateways haven’t. TrustLayer Web Security provides next generation protection from all web-related threats.
Dangerous content
Harmful, offensive, inappropriate or illegal content on malicious pages or hidden deep within legitimate sites.
Web-borne malware
Malware distribution sites, compromised pages on legitimate sites, malvertising and infected files either downloaded or cloud-shared.
Inappropriate images
Inappropriate ‘Not Safe For Work’ (NSFW) images - including adult, offensive and extremist content.
The unique architecture eliminates the need to proxy web traffic, preserving the user’s real IP address and upholding privacy by allowing the browser to maintain direct communication with the web application server.
Datasheets
Features & Benefits of Web Security
Threat protection
Protection via a powerful combination of real-time traffic inspection, URL reputation, advanced anti-malware and threat intelligence.
Guest and Captive portals
Create and apply separate policies to personal and guest devices.
Encrypted sites
With over 70% of the web encrypted deep inspection of SSL/TLS traffic is essential.
Powerful policies
Block/allow or apply time quotas based on users, groups, devices by category or keyword lists.
Automatic URL classification
Automatic real-time analysis of previously unseen and unknown pages.
Page level categorization
With Web Security, every page within a site is categorized – not just the domain or subdomain.
The Image Content Analysis (ICA) add on for Web Security protects employees and IT environments from inappropriate ‘Not Safe For Work’ (NSFW) images – including adult, offensive and extremist content.
ICA incorporates AI and deep learning technology to provide extremely high accuracy, eradicating false positives.
ICA enables powerful Acceptable Use Policy enforcement – without the need for human moderation – whilst protecting employees, avoiding legal liability, and maintaining company culture and brand image.
- Prevent NSFW imagery from entering the environment
- Identify users that are potentially misusing Internet (web) access
- Detect and manage high-risk image and video content
- Proactive, automatic enforcement of policy as and when required – with an audit trail to demonstrate action / protection
Simple Management
ICA is fully integrated within the Web Security service as an optional add-on to the TrustLayer Cloud Security Platform. ICA scans all images and videos accessed online automatically, replacing any inappropriate content with a ‘safe’ symbol.
Legal Liability
In most countries, employers can be held vicariously liable for the actions of their employees – unless they can demonstrate they have taken all reasonable steps to protect their people from a hostile working environment.
ICA protects organizations from harassment and offensive content claims – or even criminal charges if illegal content is involved – and ensures a safe workplace for everyone.
Brand Preservation
Companies spend exceptional amounts of time and money building a compelling brand and positive brand image. Negative press coverage can damage an organization’s brand almost instantaneously but take an age to restore. ICA mitigates the risk of unwanted publicity.
Image Content Analysis is also available for CASB API Mode – scanning content of files uploaded to cloud storage applications including box, Dropbox, Google Drive, and OneDrive.
Image Content Analysis is also available as an add-on for Email Security, scanning images in email messages and attachments.
Web Security Statistics
0
URLs
0
Categories
0
Subcategories