Discover how application blocking prevents risky or unauthorized apps. Learn its role in security, compliance, and reducing shadow IT risks.
Content Safety and Web Filtering
This glossary breaks down the technologies that make it possible to filter the Internet intelligently—by IP address, application, URL, or content type. Whether you're building acceptable use policies, protecting employees from phishing links, or preventing access to illegal material, these terms provide the building blocks for safer, more compliant networks.
Glossary > Content Safety and Web Filtering
Cloud Access Security Broker (CASB) is a middleman that sits between a user and access to cloud-based apps.
Learn what content filtering is, how it works, and why it matters. Explore types, use cases, and examples of filtering across networks.
Understand CSAM, its legal risks, and detection methods. Learn how filtering, reporting, and global partnerships combat abusive online content.
DLP refers to the identification and monitoring of sensitive data to ensure it’s only accessed by authorized users.
EDR is an integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data.
Endpoint Protection refers to a system for network security management that focuses on network endpoints, or individual devices.
Geoblocking is the process of limiting access outbound to the internet or inbound to a network based on a user’s physical location.
Discover how IP filtering works at the network layer. Learn about types, use cases, and its role in blocking threats and enforcing access.
Secure Access Service Edge (SASE) is a cloud-based IT model that bundles software-defined networking with network security functions.
Secure Web Gateway (SWG) is defined as solutions that “protect Web-surfing PCs from infection and enforce company policies.
Learn how URL filtering works, why it matters, and common use cases. Explore filtering types, benefits, challenges, and real-world examples.
Explore how web filtering controls Internet access, blocks threats, and enforces policies. Learn its benefits, challenges, and real-world use cases.