The challenge

50% OF CYBER INCIDENTS

are caused by uncontrolled employee web access

80% OF
ATTACKS

start with phishing or fake websites

99% OF MALICIOUS TRAFFIC

is encrypted — and invisible without SSL inspection

Why Solar Secure Web Gateway

  • COMPLETE VISIBILITY & CONTROL

    COMPLETE VISIBILITY & CONTROL

    Real-time monitoring, user activity profiling, detailed dashboards, and centralized policy management

  • ADVANCED THREAT & CONTENT FILTERING

    ADVANCED THREAT & CONTENT FILTERING

    Multi-layered security with SSL/TLS inspection, DPI for protocols and applications, real-time malware protection, threat intelligence feeds, and accurate web categorization.

  • GRANULAR ACCESS POLICIES

    GRANULAR ACCESS POLICIES

    Role-based access, time-based restrictions, flexible rules by keywords, departments, user groups, and custom exceptions

  • HIGH-SPEED PERFORMANCE

    HIGH-SPEED PERFORMANCE

    Enterprise-grade performance with traffic balancing and no compromise on speed, even as volumes grow

  • SCALABLE & FLEXIBLE ARCHITECTURE

    SCALABLE & FLEXIBLE ARCHITECTURE

    Modular design and centralized management with easy expansion across locations, users, and security features as your business grows

  • INTEGRATION WITH SECURITY ECOSYSTEM

    INTEGRATION WITH SECURITY ECOSYSTEM

    Integration with DLP, NGFW, SIEM, antivirus solutions, sandboxes, and AD/LDAP for unified security operations

Talk to an expert

Key Features at a Glance

  • Content Filtering — apply rules by keywords, MIME types, file extensions, and categories
  • Web Categorization — 30M+ URLs, 70+ categories, updated twice daily with Solar 4RAYS feeds, powered by Europe’s largest Security Operations Center (SOC).
  • Deep Packet Inspection (DPI) — analyze and control Layer 7 applications and protocols
  • SSL/TLS Inspection (up to 1.3) — detect threats hidden in encrypted traffic
  • Antivirus Protection — scan files in real time with delayed download mode
  • L3/L4 Firewall with NAT — reduce risks of network-level attacks
  • Reverse Proxy — secure remote access to internal resources with data transfer control
  • User Dossiers & Analytics — full visibility into user activity for investigations and audits
  • Centralized MultiProxy Management — manage and enforce web access policies across distributed offices from a single console

How Solar Secure Web Gateway works

How Solar Secure Web Gateway works

SYSTEM COMPONENTS

The modular architecture allows you to build the required configuration

Core — filtering and Proxying Module

  • Handles HTTP(S), FTP over HTTP, and SOCKS5 traffic
  • Enforces filtering policies
  • Performs TLS decryption (SSL inspection)
  • Detects applications and protocols at Layer 7 (DPI)
  • Acts as a central decision point: allow / block / notify
  • Forwards traffic to other modules for additional inspection

Antivirus — real-time traffic protection against malware

  • Scans inbound and outbound traffic for viruses in both forward and reverse proxy modes
  • Analyzes file uploads and downloads
  • Notifies the user when blocking occurs and logs the event

Reverse Proxy — secure employee access to internal company systems from outside

  • Provides employees outside the perimeter with access to internal web services (OWA, SharePoint, Jira, etc.)
  • Controls file uploads and downloads
  • Logs HTTP(S) requests and responses, including upload and download actions

WebCat — web categorization and threat intelligence

  • Classifies websites into 73 categories with a database of over 30 million records
  • Uses AI to evaluate the content of new websites
  • Updates automatically twice a day
  • Integrated with Solar threat feeds to block phishing and malicious resources

MultiProxy — centralized management of distributed deployments

  • Enables management of filtering policies across branch offices
  • Supports policy assignment by regions with priority for centralized policies
  • Automatically distributes policy settings to branch offices
  • Monitors the status of all connected nodes and records policy changes

Endpoint Agent — web access control on endpoints — both in the office and beyond

  • Enforces redirection of all traffic to the proxy, including non-standard applications
  • Supports interception of HTTPS and SOCKS5 connections
  • Authenticates users (NTLM, Kerberos) for precise activity attribution
  • Operates even when proxy settings are bypassed
  • Supports backup servers and failover mode
  • Scales easily and is suitable for remote or hybrid work