{"id":28,"date":"2025-06-24T08:39:40","date_gmt":"2025-06-24T08:39:40","guid":{"rendered":"https:\/\/tham098.thamtuuytin.org\/?p=28"},"modified":"2025-06-24T08:39:40","modified_gmt":"2025-06-24T08:39:40","slug":"secure-web-gateway-swg-the-modern-shield-against-web-based-threats","status":"publish","type":"post","link":"https:\/\/tham098.thamtuuytin.org\/?p=28","title":{"rendered":"Secure Web Gateway (SWG): The Modern Shield Against Web-Based Threats"},"content":{"rendered":"<p data-start=\"322\" data-end=\"501\">In the cloud-first era, the traditional security perimeter no longer exists. Employees work from anywhere, use SaaS apps, and access cloud data via unmanaged networks and devices.<\/p>\n<p data-start=\"503\" data-end=\"604\">What protects your organization from <strong data-start=\"540\" data-end=\"577\">malware, phishing, and data leaks<\/strong> during everyday web usage?<\/p>\n<p data-start=\"606\" data-end=\"651\">The answer is a <strong data-start=\"622\" data-end=\"650\">Secure Web Gateway (SWG)<\/strong>.<\/p>\n<hr data-start=\"653\" data-end=\"656\" \/>\n<h2 data-start=\"658\" data-end=\"696\">What Is a Secure Web Gateway (SWG)?<\/h2>\n<p data-start=\"698\" data-end=\"951\">A <strong data-start=\"700\" data-end=\"722\">Secure Web Gateway<\/strong> is a cybersecurity solution that <strong data-start=\"756\" data-end=\"811\">monitors, filters, and secures outbound web traffic<\/strong> in real time. It ensures that users browsing the internet, whether on-premises or remote, are protected from threats and policy violations.<\/p>\n<p data-start=\"953\" data-end=\"1095\">It acts as a <strong data-start=\"966\" data-end=\"980\">checkpoint<\/strong> between users and the internet \u2014 inspecting traffic, enforcing acceptable use, and preventing sensitive data loss.<\/p>\n<hr data-start=\"1097\" data-end=\"1100\" \/>\n<h2 data-start=\"1102\" data-end=\"1132\">Why SWG Is Critical in 2025<\/h2>\n<ul data-start=\"1134\" data-end=\"1492\">\n<li data-start=\"1134\" data-end=\"1195\">\n<p data-start=\"1136\" data-end=\"1195\"><strong data-start=\"1136\" data-end=\"1160\">Phishing and malware<\/strong> are more sophisticated than ever<\/p>\n<\/li>\n<li data-start=\"1196\" data-end=\"1262\">\n<p data-start=\"1198\" data-end=\"1262\">Employees access the internet from <strong data-start=\"1233\" data-end=\"1260\">anywhere and any device<\/strong><\/p>\n<\/li>\n<li data-start=\"1263\" data-end=\"1338\">\n<p data-start=\"1265\" data-end=\"1338\">SaaS adoption increases the <strong data-start=\"1293\" data-end=\"1336\">risk of shadow IT and data exfiltration<\/strong><\/p>\n<\/li>\n<li data-start=\"1339\" data-end=\"1417\">\n<p data-start=\"1341\" data-end=\"1417\">Traditional firewalls and VPNs are not designed for <strong data-start=\"1393\" data-end=\"1415\">modern web traffic<\/strong><\/p>\n<\/li>\n<li data-start=\"1418\" data-end=\"1492\">\n<p data-start=\"1420\" data-end=\"1492\"><strong data-start=\"1420\" data-end=\"1446\">Compliance regulations<\/strong> require organizations to control internet use<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1494\" data-end=\"1580\">An SWG ensures <strong data-start=\"1509\" data-end=\"1546\">secure, policy-compliant browsing<\/strong>, even outside corporate networks.<\/p>\n<hr data-start=\"1582\" data-end=\"1585\" \/>\n<h2 data-start=\"1587\" data-end=\"1630\">Key Capabilities of a Secure Web Gateway<\/h2>\n<ol data-start=\"1632\" data-end=\"2270\">\n<li data-start=\"1632\" data-end=\"1750\">\n<p data-start=\"1635\" data-end=\"1654\"><strong data-start=\"1635\" data-end=\"1652\">URL Filtering<\/strong><\/p>\n<ul data-start=\"1658\" data-end=\"1750\">\n<li data-start=\"1658\" data-end=\"1713\">\n<p data-start=\"1660\" data-end=\"1713\">Block access to malicious or inappropriate websites<\/p>\n<\/li>\n<li data-start=\"1717\" data-end=\"1750\">\n<p data-start=\"1719\" data-end=\"1750\">Enforce acceptable use policies<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1752\" data-end=\"1876\">\n<p data-start=\"1755\" data-end=\"1779\"><strong data-start=\"1755\" data-end=\"1777\">Malware Protection<\/strong><\/p>\n<ul data-start=\"1783\" data-end=\"1876\">\n<li data-start=\"1783\" data-end=\"1829\">\n<p data-start=\"1785\" data-end=\"1829\">Detect and block known and unknown threats<\/p>\n<\/li>\n<li data-start=\"1833\" data-end=\"1876\">\n<p data-start=\"1835\" data-end=\"1876\">Leverage sandboxing and antivirus engines<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1878\" data-end=\"1995\">\n<p data-start=\"1881\" data-end=\"1913\"><strong data-start=\"1881\" data-end=\"1911\">Data Loss Prevention (DLP)<\/strong><\/p>\n<ul data-start=\"1917\" data-end=\"1995\">\n<li data-start=\"1917\" data-end=\"1995\">\n<p data-start=\"1919\" data-end=\"1995\">Prevent sensitive data from leaving via web uploads, forms, or cloud storage<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1997\" data-end=\"2074\">\n<p data-start=\"2000\" data-end=\"2024\"><strong data-start=\"2000\" data-end=\"2022\">SSL\/TLS Inspection<\/strong><\/p>\n<ul data-start=\"2028\" data-end=\"2074\">\n<li data-start=\"2028\" data-end=\"2074\">\n<p data-start=\"2030\" data-end=\"2074\">Inspect encrypted traffic for hidden threats<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2076\" data-end=\"2170\">\n<p data-start=\"2079\" data-end=\"2104\"><strong data-start=\"2079\" data-end=\"2102\">Application Control<\/strong><\/p>\n<ul data-start=\"2108\" data-end=\"2170\">\n<li data-start=\"2108\" data-end=\"2170\">\n<p data-start=\"2110\" data-end=\"2170\">Manage usage of web-based apps (e.g., Dropbox, WhatsApp Web)<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2172\" data-end=\"2270\">\n<p data-start=\"2175\" data-end=\"2207\"><strong data-start=\"2175\" data-end=\"2205\">Cloud-Delivered or On-Prem<\/strong><\/p>\n<ul data-start=\"2211\" data-end=\"2270\">\n<li data-start=\"2211\" data-end=\"2270\">\n<p data-start=\"2213\" data-end=\"2270\">Available as physical appliances or cloud-native services<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr data-start=\"2272\" data-end=\"2275\" \/>\n<h2 data-start=\"2277\" data-end=\"2312\">SWG vs Traditional Web Filtering<\/h2>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"2314\" data-end=\"2980\">\n<thead data-start=\"2314\" data-end=\"2408\">\n<tr data-start=\"2314\" data-end=\"2408\">\n<th data-start=\"2314\" data-end=\"2343\" data-col-size=\"sm\">Feature<\/th>\n<th data-start=\"2343\" data-end=\"2373\" data-col-size=\"sm\">Traditional Filtering Tools<\/th>\n<th data-start=\"2373\" data-end=\"2408\" data-col-size=\"sm\">Modern SWG<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"2505\" data-end=\"2980\">\n<tr data-start=\"2505\" data-end=\"2598\">\n<td data-start=\"2505\" data-end=\"2534\" data-col-size=\"sm\">Cloud app awareness<\/td>\n<td data-start=\"2534\" data-end=\"2563\" data-col-size=\"sm\">\u274c<\/td>\n<td data-start=\"2563\" data-end=\"2598\" data-col-size=\"sm\">\u2705<\/td>\n<\/tr>\n<tr data-start=\"2599\" data-end=\"2694\">\n<td data-start=\"2599\" data-end=\"2628\" data-col-size=\"sm\">SSL decryption<\/td>\n<td data-start=\"2628\" data-end=\"2658\" data-col-size=\"sm\">Limited<\/td>\n<td data-start=\"2658\" data-end=\"2694\" data-col-size=\"sm\">Full support with policy control<\/td>\n<\/tr>\n<tr data-start=\"2695\" data-end=\"2790\">\n<td data-start=\"2695\" data-end=\"2724\" data-col-size=\"sm\">Threat intelligence<\/td>\n<td data-start=\"2724\" data-end=\"2754\" data-col-size=\"sm\">Basic<\/td>\n<td data-start=\"2754\" data-end=\"2790\" data-col-size=\"sm\">Real-time global threat feeds<\/td>\n<\/tr>\n<tr data-start=\"2791\" data-end=\"2886\">\n<td data-start=\"2791\" data-end=\"2820\" data-col-size=\"sm\">Remote user coverage<\/td>\n<td data-start=\"2820\" data-end=\"2850\" data-col-size=\"sm\">Requires VPN<\/td>\n<td data-start=\"2850\" data-end=\"2886\" data-col-size=\"sm\">Direct-to-cloud, agent-based<\/td>\n<\/tr>\n<tr data-start=\"2887\" data-end=\"2980\">\n<td data-start=\"2887\" data-end=\"2916\" data-col-size=\"sm\">DLP integration<\/td>\n<td data-start=\"2916\" data-end=\"2945\" data-col-size=\"sm\">\u274c<\/td>\n<td data-start=\"2945\" data-end=\"2980\" data-col-size=\"sm\">\u2705<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sticky end-(--thread-content-margin) h-0 self-end select-none\">\n<div class=\"absolute end-0 flex items-end\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr data-start=\"2982\" data-end=\"2985\" \/>\n<h2 data-start=\"2987\" data-end=\"3007\">Use Cases for SWG<\/h2>\n<ul data-start=\"3009\" data-end=\"3295\">\n<li data-start=\"3009\" data-end=\"3064\">\n<p data-start=\"3011\" data-end=\"3064\"><strong data-start=\"3011\" data-end=\"3031\">Remote workforce<\/strong> security without requiring VPN<\/p>\n<\/li>\n<li data-start=\"3065\" data-end=\"3113\">\n<p data-start=\"3067\" data-end=\"3113\"><strong data-start=\"3067\" data-end=\"3111\">Blocking risky or non-compliant websites<\/strong><\/p>\n<\/li>\n<li data-start=\"3114\" data-end=\"3167\">\n<p data-start=\"3116\" data-end=\"3167\"><strong data-start=\"3116\" data-end=\"3146\">Monitoring cloud app usage<\/strong> across departments<\/p>\n<\/li>\n<li data-start=\"3168\" data-end=\"3227\">\n<p data-start=\"3170\" data-end=\"3227\"><strong data-start=\"3170\" data-end=\"3195\">Preventing data leaks<\/strong> via web uploads or copy-paste<\/p>\n<\/li>\n<li data-start=\"3228\" data-end=\"3295\">\n<p data-start=\"3230\" data-end=\"3295\"><strong data-start=\"3230\" data-end=\"3254\">Enforcing compliance<\/strong> for internet use in regulated industries<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3297\" data-end=\"3300\" \/>\n<h2 data-start=\"3302\" data-end=\"3345\">Top Secure Web Gateway Providers in 2025<\/h2>\n<h3 data-start=\"3347\" data-end=\"3387\">1. <strong data-start=\"3354\" data-end=\"3387\">Zscaler Internet Access (ZIA)<\/strong><\/h3>\n<p data-start=\"3389\" data-end=\"3449\">A cloud-native SWG that leads the SSE and Zero Trust market.<\/p>\n<ul data-start=\"3451\" data-end=\"3683\">\n<li data-start=\"3451\" data-end=\"3499\">\n<p data-start=\"3453\" data-end=\"3499\"><strong data-start=\"3453\" data-end=\"3465\">Best for<\/strong>: Large, distributed enterprises<\/p>\n<\/li>\n<li data-start=\"3500\" data-end=\"3683\">\n<p data-start=\"3502\" data-end=\"3517\"><strong data-start=\"3502\" data-end=\"3514\">Features<\/strong>:<\/p>\n<ul data-start=\"3520\" data-end=\"3683\">\n<li data-start=\"3520\" data-end=\"3556\">\n<p data-start=\"3522\" data-end=\"3556\">Inline inspection of all traffic<\/p>\n<\/li>\n<li data-start=\"3559\" data-end=\"3591\">\n<p data-start=\"3561\" data-end=\"3591\">Real-time malware protection<\/p>\n<\/li>\n<li data-start=\"3594\" data-end=\"3621\">\n<p data-start=\"3596\" data-end=\"3621\">Integrated DLP and CASB<\/p>\n<\/li>\n<li data-start=\"3624\" data-end=\"3650\">\n<p data-start=\"3626\" data-end=\"3650\">Granular policy engine<\/p>\n<\/li>\n<li data-start=\"3653\" data-end=\"3683\">\n<p data-start=\"3655\" data-end=\"3683\">AI-driven threat correlation<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"3685\" data-end=\"3688\" \/>\n<h3 data-start=\"3690\" data-end=\"3741\">2. <strong data-start=\"3697\" data-end=\"3741\">Symantec Web Security Service (Broadcom)<\/strong><\/h3>\n<p data-start=\"3743\" data-end=\"3802\">A comprehensive SWG platform with deep enterprise features.<\/p>\n<ul data-start=\"3804\" data-end=\"4048\">\n<li data-start=\"3804\" data-end=\"3867\">\n<p data-start=\"3806\" data-end=\"3867\"><strong data-start=\"3806\" data-end=\"3818\">Best for<\/strong>: Organizations needing advanced policy control<\/p>\n<\/li>\n<li data-start=\"3868\" data-end=\"4048\">\n<p data-start=\"3870\" data-end=\"3885\"><strong data-start=\"3870\" data-end=\"3882\">Features<\/strong>:<\/p>\n<ul data-start=\"3888\" data-end=\"4048\">\n<li data-start=\"3888\" data-end=\"3937\">\n<p data-start=\"3890\" data-end=\"3937\">Global threat intelligence from Broadcom Labs<\/p>\n<\/li>\n<li data-start=\"3940\" data-end=\"3972\">\n<p data-start=\"3942\" data-end=\"3972\">Encrypted traffic inspection<\/p>\n<\/li>\n<li data-start=\"3975\" data-end=\"4012\">\n<p data-start=\"3977\" data-end=\"4012\">File sandboxing and risk analysis<\/p>\n<\/li>\n<li data-start=\"4015\" data-end=\"4048\">\n<p data-start=\"4017\" data-end=\"4048\">Unified reporting and analytics<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4050\" data-end=\"4053\" \/>\n<h3 data-start=\"4055\" data-end=\"4093\">3. <strong data-start=\"4062\" data-end=\"4093\">Cisco Umbrella (SWG Module)<\/strong><\/h3>\n<p data-start=\"4095\" data-end=\"4156\">Cisco\u2019s cloud-delivered security suite includes a robust SWG.<\/p>\n<ul data-start=\"4158\" data-end=\"4382\">\n<li data-start=\"4158\" data-end=\"4213\">\n<p data-start=\"4160\" data-end=\"4213\"><strong data-start=\"4160\" data-end=\"4172\">Best for<\/strong>: Hybrid environments using Cisco stack<\/p>\n<\/li>\n<li data-start=\"4214\" data-end=\"4382\">\n<p data-start=\"4216\" data-end=\"4231\"><strong data-start=\"4216\" data-end=\"4228\">Features<\/strong>:<\/p>\n<ul data-start=\"4234\" data-end=\"4382\">\n<li data-start=\"4234\" data-end=\"4258\">\n<p data-start=\"4236\" data-end=\"4258\">DNS-layer protection<\/p>\n<\/li>\n<li data-start=\"4261\" data-end=\"4291\">\n<p data-start=\"4263\" data-end=\"4291\">App visibility and control<\/p>\n<\/li>\n<li data-start=\"4294\" data-end=\"4333\">\n<p data-start=\"4296\" data-end=\"4333\">SSL decryption with minimal latency<\/p>\n<\/li>\n<li data-start=\"4336\" data-end=\"4382\">\n<p data-start=\"4338\" data-end=\"4382\">Integrated with Cisco SecureX for automation<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4384\" data-end=\"4387\" \/>\n<h3 data-start=\"4389\" data-end=\"4418\">4. <strong data-start=\"4396\" data-end=\"4418\">Forcepoint ONE SWG<\/strong><\/h3>\n<p data-start=\"4420\" data-end=\"4486\">Focused on behavioral analytics and contextual policy enforcement.<\/p>\n<ul data-start=\"4488\" data-end=\"4702\">\n<li data-start=\"4488\" data-end=\"4539\">\n<p data-start=\"4490\" data-end=\"4539\"><strong data-start=\"4490\" data-end=\"4502\">Best for<\/strong>: Enterprises with strict DLP needs<\/p>\n<\/li>\n<li data-start=\"4540\" data-end=\"4702\">\n<p data-start=\"4542\" data-end=\"4557\"><strong data-start=\"4542\" data-end=\"4554\">Features<\/strong>:<\/p>\n<ul data-start=\"4560\" data-end=\"4702\">\n<li data-start=\"4560\" data-end=\"4596\">\n<p data-start=\"4562\" data-end=\"4596\">Real-time risk-adaptive controls<\/p>\n<\/li>\n<li data-start=\"4599\" data-end=\"4628\">\n<p data-start=\"4601\" data-end=\"4628\">Dynamic content filtering<\/p>\n<\/li>\n<li data-start=\"4631\" data-end=\"4659\">\n<p data-start=\"4633\" data-end=\"4659\">Insider threat detection<\/p>\n<\/li>\n<li data-start=\"4662\" data-end=\"4702\">\n<p data-start=\"4664\" data-end=\"4702\">Integration with CASB and ZTNA modules<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4704\" data-end=\"4707\" \/>\n<h3 data-start=\"4709\" data-end=\"4738\">5. <strong data-start=\"4716\" data-end=\"4738\">Cloudflare Gateway<\/strong><\/h3>\n<p data-start=\"4740\" data-end=\"4807\">A developer-friendly, fast, cloud-native SWG for modern businesses.<\/p>\n<ul data-start=\"4809\" data-end=\"5024\">\n<li data-start=\"4809\" data-end=\"4855\">\n<p data-start=\"4811\" data-end=\"4855\"><strong data-start=\"4811\" data-end=\"4823\">Best for<\/strong>: Agile teams and global users<\/p>\n<\/li>\n<li data-start=\"4856\" data-end=\"5024\">\n<p data-start=\"4858\" data-end=\"4873\"><strong data-start=\"4858\" data-end=\"4870\">Features<\/strong>:<\/p>\n<ul data-start=\"4876\" data-end=\"5024\">\n<li data-start=\"4876\" data-end=\"4908\">\n<p data-start=\"4878\" data-end=\"4908\">Fast DNS and proxy filtering<\/p>\n<\/li>\n<li data-start=\"4911\" data-end=\"4951\">\n<p data-start=\"4913\" data-end=\"4951\">Granular control over HTTP\/S traffic<\/p>\n<\/li>\n<li data-start=\"4954\" data-end=\"4984\">\n<p data-start=\"4956\" data-end=\"4984\">Built-in browser isolation<\/p>\n<\/li>\n<li data-start=\"4987\" data-end=\"5024\">\n<p data-start=\"4989\" data-end=\"5024\">Seamless deployment with WARP agent<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"5026\" data-end=\"5029\" \/>\n<h2 data-start=\"5031\" data-end=\"5063\">SWG and SASE: A Perfect Match<\/h2>\n<p data-start=\"5065\" data-end=\"5236\">Modern organizations are increasingly adopting <strong data-start=\"5112\" data-end=\"5149\">Secure Access Service Edge (SASE)<\/strong> \u2014 an architecture that converges networking and security into a cloud-delivered model.<\/p>\n<p data-start=\"5238\" data-end=\"5301\"><strong data-start=\"5238\" data-end=\"5281\">SWG is a foundational component of SASE<\/strong>, working alongside:<\/p>\n<ul data-start=\"5303\" data-end=\"5479\">\n<li data-start=\"5303\" data-end=\"5340\">\n<p data-start=\"5305\" data-end=\"5340\"><strong data-start=\"5305\" data-end=\"5313\">CASB<\/strong> for app-level visibility<\/p>\n<\/li>\n<li data-start=\"5341\" data-end=\"5379\">\n<p data-start=\"5343\" data-end=\"5379\"><strong data-start=\"5343\" data-end=\"5351\">ZTNA<\/strong> for identity-based access<\/p>\n<\/li>\n<li data-start=\"5380\" data-end=\"5437\">\n<p data-start=\"5382\" data-end=\"5437\"><strong data-start=\"5382\" data-end=\"5415\">Firewall as a Service (FWaaS)<\/strong> for traffic control<\/p>\n<\/li>\n<li data-start=\"5438\" data-end=\"5479\">\n<p data-start=\"5440\" data-end=\"5479\"><strong data-start=\"5440\" data-end=\"5450\">SD-WAN<\/strong> for performance optimization<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5481\" data-end=\"5576\">Together, these tools provide <strong data-start=\"5511\" data-end=\"5534\">complete protection<\/strong> for all users, apps, and data \u2014 anywhere.<\/p>\n<hr data-start=\"5578\" data-end=\"5581\" \/>\n<h2 data-start=\"5583\" data-end=\"5612\">Challenges in SWG Adoption<\/h2>\n<ul data-start=\"5614\" data-end=\"5811\">\n<li data-start=\"5614\" data-end=\"5660\">\n<p data-start=\"5616\" data-end=\"5660\"><strong data-start=\"5616\" data-end=\"5636\">Privacy concerns<\/strong> around SSL inspection<\/p>\n<\/li>\n<li data-start=\"5661\" data-end=\"5708\">\n<p data-start=\"5663\" data-end=\"5708\"><strong data-start=\"5663\" data-end=\"5685\">Performance issues<\/strong> with inline scanning<\/p>\n<\/li>\n<li data-start=\"5709\" data-end=\"5753\">\n<p data-start=\"5711\" data-end=\"5753\"><strong data-start=\"5711\" data-end=\"5727\">Overblocking<\/strong> can hinder productivity<\/p>\n<\/li>\n<li data-start=\"5754\" data-end=\"5811\">\n<p data-start=\"5756\" data-end=\"5811\"><strong data-start=\"5756\" data-end=\"5782\">Integration complexity<\/strong> with existing security stack<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5813\" data-end=\"5948\">To succeed, organizations must adopt SWGs that offer <strong data-start=\"5866\" data-end=\"5892\">granular policy tuning<\/strong>, <strong data-start=\"5894\" data-end=\"5915\">high availability<\/strong>, and <strong data-start=\"5921\" data-end=\"5947\">real-time threat intel<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the cloud-first era, the traditional security perimeter no longer exists. Employees work from anywhere, use SaaS apps, and access cloud data via unmanaged networks and devices. What protects your organization from malware, phishing, and data leaks during everyday web&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-28","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28"}],"version-history":[{"count":1,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/28\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}