A Secure Web Gateway (SWG) is a security solution that inspects and filters outbound web traffic to enforce acceptable-use policy, block malicious content, and prevent data from being transmitted to unauthorized destinations.
‍
Secure web gateways emerged when the web was the primary threat vector and enterprise browsing happened predominantly on managed devices, on corporate networks, routed through predictable infrastructure. The gateway sat inline—every request passed through it, policy was applied at the point of transit, and the IT team had a complete picture of what employees were accessing. That model worked well when the corporate network was effectively the boundary of work.
‍
The model works less well when employees are working from home on personal devices, accessing SaaS services directly over broadband, and using applications that connect to each other via API rather than through a browser at all. The inline inspection model requires a consistent, observable traffic path—and that path is increasingly absent from how work actually happens.
‍
SWGs operate as a proxy layer between users and the internet:
Three structural limitations define SWG coverage in a distributed SaaS environment:
‍
Unmanaged devices—SWG coverage requires the proxy to be in the traffic path. Personal devices, contractor systems, and mobile devices that don't have SWG certificates installed send no traffic through the gateway.
‍
Personal accounts and shadow SaaS—Employees accessing SaaS through personal email addresses or direct signups may be doing so through browsers or devices that bypass corporate SWG entirely.
‍
SaaS-to-SaaS integrations—OAuth-connected applications communicate directly with each other via API. No browser, no user traffic, no SWG touchpoint—these connections are structurally invisible to SWG.
‍