Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1119

SWG

What is SWG?

SWGA Secure Web Gateway (SWG) is a proxy — on-prem or cloud — that inspects user web traffic, enforces acceptable-use policy, and blocks malware, phishing, and data exfiltration.


A Secure Web Gateway sits in line with user-to-internet traffic, terminates TLS, and inspects HTTP and HTTPS requests against URL categorization, content filtering, malware scanning, and DLP policies. Modern cloud SWGs are delivered as part of SSE/SASE platforms and combine reputation feeds, advanced threat protection (sandboxing, isolation), and identity-aware policy. They replace legacy on-prem proxies for remote and hybrid workforces and provide visibility into shadow IT, suspicious downloads, and unauthorized SaaS use. SWGs are typically paired with CASB for SaaS-specific controls and ZTNA for private app access, sharing one policy plane.

Examples

  1. 01

    A cloud SWG blocks a user clicking a phishing URL and rewrites unsafe downloads through a sandbox.

  2. 02

    Enforcing a no-personal-cloud-storage policy by category-blocking upload to consumer storage sites.

Frequently asked questions

What is SWG?

A Secure Web Gateway (SWG) is a proxy — on-prem or cloud — that inspects user web traffic, enforces acceptable-use policy, and blocks malware, phishing, and data exfiltration. It belongs to the Network Security category of cybersecurity.

What does SWG mean?

A Secure Web Gateway (SWG) is a proxy — on-prem or cloud — that inspects user web traffic, enforces acceptable-use policy, and blocks malware, phishing, and data exfiltration.

How does SWG work?

A Secure Web Gateway sits in line with user-to-internet traffic, terminates TLS, and inspects HTTP and HTTPS requests against URL categorization, content filtering, malware scanning, and DLP policies. Modern cloud SWGs are delivered as part of SSE/SASE platforms and combine reputation feeds, advanced threat protection (sandboxing, isolation), and identity-aware policy. They replace legacy on-prem proxies for remote and hybrid workforces and provide visibility into shadow IT, suspicious downloads, and unauthorized SaaS use. SWGs are typically paired with CASB for SaaS-specific controls and ZTNA for private app access, sharing one policy plane.

How do you defend against SWG?

Defences for SWG typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SWG?

Common alternative names include: Secure Web Gateway, Web proxy.

Related terms