It’s Time to Fly direct

IN-flight_amentities

1. Redesigned architecture
2. mac native and windows
3. speed and reliability
4. single sign-on
5. data privacy
6. cloud-managed endpoint
7. cloud app controls
8. policy writing
9. user analytics
What does fly direct mean? It’s our way of saying we’ve completely reconstructed the outdated 20-year-old architecture that legacy SWGs are stuck running on. It’s time for something new.

By moving policy enforcement from the cloud to on-device, we’re flying direct between your device and internet access with all security checks happening locally — rather than at a stopover. You’ll no longer be affected by data center outages, all decryption will be securely on-device where no threat actors can see it, and you’ll experience 4x performance while running on HTTP/2.

And all on a beautiful and easy to use platform. Welcome to your first-class experience.
IN-flight_amentities

1. Redesigned architecture
2. mac native and windows
3. speed and reliability
4. single sign-on
5. data privacy
6. cloud-managed endpoint
7. cloud app controls
8. policy writing
9. user analytics
service will begin
shortly
So seamless it’s Almost invisible
Redesigned
Architecture
Our invisible endpoint does everything a SWG needs on-device. Anything you access is protected, but still performant. You won’t even notice an endpoint is running. We promise.

And, it works to secure any browser and application.
[ Now boarding Group 1 ]
Every OS is a first class Passenger
Mac native And Windows
We care about Mac just as much as you. That’s why we’re optimized for Apple Silicon M1 and Intel. All features are identical across both Windows and Mac.

It’s our commitment to support you on day one of a new OS.
[ the skies are clear ]
Working as Intended
Speed and
Reliability
As you fly direct from device to internet, you’ll experience a seamless browsing experience. Never get downgraded to HTTP/1.1 ever again.

And, if our cloud is down, your policy remains intact. During this rare event, you get to choose if you fail open or fail closed. It’s up to you, not us.
It’s never been this easy
One Click Single Sign-on
Simply sign into the console using your corporate Google or O365 account. Easily import your users and groups at the click of a button.

You’ll stay synced. If a user leaves the corporate account, their access is automatically revoked. If a user’s group changes, their policy assignment follows suit.
[ the skies are clear ]
Decrypt in the safe zone
decryption Privacy
We’ve completely cut out the data center. Control exactly how your data moves, and start decrypting your traffic directly on the endpoint. Your data never has to leave your sight again.

It’s safer. It’s faster. It’s in the “safe zone.”
[ The seatbelt sign has
been turned on ]
A beautiful cloud-native console
cloud Management
The console is where the magic is. On a single console access analytics, configure policies, monitor endpoints and more across all users. Gone are the days where you have to log into separate consoles.

Plus, your endpoints will auto-update with any new builds released.
[ cross-check ]
Simplifying the process
Cloud App Controls
Cloud Application Controls (CAC) can give yourself that added layer of security by restricting user access to specific domains or tenants. Drastically reduce the risk of data exfiltration while increasing end user productivity by blocking personal accounts.

Easily keep your data in your sanctioned apps — Microsoft O365, Google, Box, Dropbox, Salesforce, Slack, and Cisco Webex.
[ Please stow away
your legacy swg ]
Enterprise can be easy
Policy Writing
We built policy writing with hundreds of small to large companies in mind. It will feel familiar, and trust us, it’s much easier to configure.

You’ll start off with a ready-to-go base policy that applies to all users. Then, customize from there for your different users, regions, and groups.
[ air traffic control ]
Meet your users
User Analytics
Discover how your users access the Internet everyday. Leave boring graphs behind — our analytics will actually help you re-evaluate your policies and focus on the details. Toggle through policy violations, screen time, application usage, and more.

Whatever it is, we’ve got the numbers you need.
behind dope  behind dope