Technical Review by
Craig MacAlpine
For enterprises needing zero-trust web security with unified threat prevention, Zscaler Internet Access delivers cloud-native SWG that eliminates VPNs without compromising scale. For organizations wanting browser-native threat detection without infrastructure overhaul, LayerX and Seraphic Security both catch threats inside encrypted sessions proxy-based tools miss. For consolidation-minded teams, Skyhigh Security packages SWG, CASB, and DLP into a single platform.
Web-based threats now account for the majority of successful attacks. Phishing campaigns target encrypted sessions that traditional proxy-based tools can’t inspect. Legitimate SaaS applications become attack vectors when accounts are compromised. The shadow IT problem-employees bypassing security controls with personal accounts-makes visibility impossible.
The secure web gateway market has split into two approaches: traditional proxy-based platforms that require infrastructure overhead, and browser-native solutions that catch threats where they actually happen. The right choice depends on your deployment model, threat priorities, and operational appetite for managing complex infrastructure.
We evaluated 11 SWG solutions across threat detection capability, ease of deployment, policy flexibility, performance impact, and integration depth. We evaluated each for both modern cloud-first and hybrid deployment scenarios to understand where friction emerges in practice.
This guide gives you the framework to select an SWG platform that addresses your actual threat model without creating operational burden.
Your ideal SWG depends on deployment model, infrastructure constraints, and whether you’re consolidating multiple point tools or adding targeted web protection.
LayerX is a browser-native security platform that inspects and blocks threats directly inside the browser session. It targets organizations that need real-time protection against phishing, credential theft, and shadow IT without ripping out existing infrastructure.
We found LayerX takes a different approach to web security. Instead of routing traffic through a traditional secure web gateway, it deploys as a lightweight browser extension that analyzes pages, objects, and actions as they render. That means it catches threats inside encrypted and certificate pinned sessions that proxy-based tools typically miss.
The policy engine stands out. You define rules based on user roles, access locations, actions taken, and risk levels. We saw this translate well into real world use cases like blocking unauthorized SaaS uploads and preventing malicious browser extension installs across an entire organization with a single policy push.
The initial policy setup draws some criticism. Customers say the configuration workflow takes some getting used to, though most report it clicks quickly after the first few policies are built. Shadow IT visibility stands out positively, with teams mapping application usage and spotting data leakage paths. Behavioral detection catches anomalous user activity fast.
We think LayerX works best as either a standalone SWG replacement or an added layer on top of your existing gateway. It supports Chrome, Edge, Firefox, Safari, Brave, and Arc. If your threat model prioritizes browser-borne attacks and you need granular policy control without heavy infrastructure changes, this fits well. Based on our review, it delivers strong protection with low friction for end users.
Menlo Security is a cloud-based SWG built around remote browser isolation as its core protection model. It executes all risky web content in a remote cloud browser so threats never reach the endpoint. The platform targets enterprises in regulated industries like finance, government, and education that need strong isolation without disrupting user workflows.
The differentiator here is Menlo’s Adaptive Clientless Rendering technology. Instead of inspecting traffic and hoping to catch threats, it renders all web content remotely in the cloud. Zero-day exploits, phishing sites, and ransomware downloads get neutralized before anything touches the user’s device. We found this approach particularly strong for organizations handling sensitive data where even a single browser-based compromise carries serious consequences.
Beyond isolation, the platform bundles SWG, CASB, DLP, proxy, and firewall-as-a-service capabilities. URL controls let you enforce read-only, read/write, or full block policies per site. The web logs and monitoring tools stood out to us as well. You get clear visibility into top sites, top users, and top threats, with reporting that is straightforward to interpret. Deployment works across desktop, laptop, and mobile devices.
Customers consistently praise the admin console for being intuitive and low-maintenance. Day-to-day policy management requires minimal tweaking, which frees up SecOps time. Customer support gets strong marks for responsiveness and smooth deployment assistance.
We think Menlo works best for enterprises that prioritize isolation as their primary web threat prevention model. If your risk profile demands that no active web content reaches endpoints, this delivers on that philosophy. Based on our review, teams wanting a traditional inspect-and-filter SWG may find the isolation approach more than they need, but for high-risk environments it is a strong choice.
Check Point Harmony is a unified security platform that combines endpoint protection, email security, and full SASE capabilities including SWG, ZTNA, DLP, and next-gen firewall under one umbrella. The SWG component is fully cloud-based and covers URL filtering and application control for over 8,999 apps. It fits organizations of all sizes that want web, endpoint, and email security managed from a single portal.
The range of coverage is what sets Harmony apart. Instead of buying separate tools for endpoint, email, and web security, you get all three through the Harmony Infinity Portal. We found the malware detection and sandboxing capabilities to be a core strength, leveraging Check Point’s threat emulation to catch zero-day threats, ransomware, and phishing before they land. The endpoint agent runs quietly in the background, giving security teams full visibility without disrupting users.
Policy enforcement works across remote and office-based employees from one console. The SWG protects against emerging phishing sites and unknown malware while admins control access to websites and cloud applications. Automated response and recovery features help minimize downtime when incidents do occur, and the forensic data supports post-incident analysis.
Customers highlight the centralized management portal as a major time-saver, especially for teams managing remote workforces across unreliable networks. The agent’s low-profile operation gets consistent praise from teams whose users work from client offices and on the move.
The criticism clusters around a few areas.
We think Check Point Harmony works best for organizations that want consolidated web, endpoint, and email protection without managing multiple vendors. If your threat model prioritizes advanced malware prevention and you value single-pane management, this covers a lot of ground. Based on our review, teams already in the Check Point ecosystem will get the most from the tight product integration, while multi-vendor environments should evaluate the third-party integration limitations first.
Cisco Umbrella is a cloud-delivered security service that provides DNS-layer security, firewall, and threat protection. It targets organizations wanting web protection without deploying dedicated hardware or managing complex proxy infrastructure.
Umbrella routes DNS requests through Cisco’s cloud, blocking malicious domains before user connections complete. We found the deployment straightforward compared to on premises appliances. Install a lightweight connector and you’re protecting traffic across your organization.
Threat intelligence integrates with Cisco’s broader security platform, including Talos research and sandboxing for unknown files. The reporting dashboard gives visibility into web activity and threat attempts across your network. Integration with identity providers enables policy enforcement based on user or group.
Customers appreciate the cloud-delivered model and straightforward deployment. The service integrates well with Cisco endpoint products. Reporting is detailed and actionable for security teams.
Some customers flag that DNS-based filtering misses certain threat categories without additional components. Performance can lag with some ISP configurations. Advanced features and incident response sit behind higher licensing tiers.
We think Cisco Umbrella is strongest for organizations that want fast DNS-layer protection with a clear upgrade path into full SSE. If you already run Cisco networking or security infrastructure, the ecosystem integration is a major advantage. Based on our review, teams running multi-vendor security stacks should evaluate the third-party firewall integration gap before committing.
The deployment model is the hook. Point your DNS forwarders to Cisco’s anycast IPs and you have immediate protection. We found this makes Umbrella one of the fastest SWGs to get running. DNS-layer filtering blocks malicious domains, crypto mining sites, and command-and-control traffic before a connection is even established. That proactive first line of defense works for users on and off the corporate network.
Beyond DNS, the full proxy capabilities inspect all web traffic with anti-virus, anti-malware, and content controls. The platform integrates tightly with Cisco’s broader ecosystem, including SD-WAN through Meraki and ZTNA through Duo Security. Domain reputation scoring feeds into third-party risk assessments, and whitelisting or recategorization requests typically turn around within 24 to 36 hours.
Customers praise the deployment simplicity and the stability of the platform. The reporting dashboards get positive marks for providing quick visibility into threat activity and network patterns. Integration with Cisco SD-WAN edge devices is a highlight for teams offloading security analysis from routers.
The consistent criticism targets the management console. Customers say it feels dated with limited UI improvements over the years, and some report it runs slowly. Advanced policy configuration requires expertise that less experienced admins may lack. Reporting customization is limited for deeper drill-downs. Customers also flag that there is no integration path with third-party next-gen firewalls like Palo Alto or Fortinet, creating blind spots when SSL decryption is in play. Pricing scales steeply for smaller organizations.
Cloudflare Gateway is a DNS-based secure web gateway that provides URL filtering, malware protection, and data loss prevention. It targets SMBs and distributed organizations wanting straightforward web security without complex infrastructure.
Cloudflare takes a different approach than proxy-based solutions. DNS-based filtering means you get web security without redirecting traffic through centralized infrastructure. We found the setup refreshingly simple-configure policies in the Cloudflare dashboard and you’re protecting traffic across your organization.
The threat intelligence is current, with real-time updates on phishing sites, malware, and zero-days. Admins set policies by identity, location, and risk level. Integration with Cloudflare’s broader security platform gives you additional controls around DDoS protection and WAF rules.
Customers consistently highlight the ease of deployment and management. Teams describe fast onboarding and intuitive policy configuration compared to enterprise-tier competitors.
The DNS-based approach has limitations for teams needing deep SSL inspection or handling sensitive data. Encrypted DNS blocks some filtering capabilities. Support quality varies, with some reporting slower response times during incidents.
We think Cloudflare Gateway is a natural fit for two audiences: SMBs that want free or low-cost SWG protection for small teams, and larger organizations already running Cloudflare infrastructure. If you need a performance-first gateway with strong DNS filtering and a path to full Zero Trust, this is worth evaluating. Based on our review, teams needing deep advanced security controls should budget for higher tiers where those capabilities unlock.
The performance story is the differentiator. Cloudflare’s global network means DNS filtering and threat protection happen close to the user, keeping latency low across locations. We found the policy building straightforward for core use cases: DNS filtering, granular security categories, and phishing and ransomware blocking all work with minimal configuration overhead. The dashboard centralizes DNS management, traffic routing, and security rules in one place, making changes quick and auditable.
Remote browser isolation adds another layer for high-risk browsing. The platform integrates with existing infrastructure and cloud services without heavy lift, and the rules engine and APIs give teams flexibility to customize behavior. For organizations already using Cloudflare for website protection, Gateway slots in naturally without adding new vendor relationships.
Customers praise the setup speed and intuitive dashboard for basic to mid-level configurations. Traffic visibility through logs and analytics helps teams monitor patterns and identify threats without deep manual investigation.
The friction shows up at the advanced tier. Customers say configuring WAF rules, bot management, and rate limiting gets complex quickly. Rule debugging in production scenarios is time-consuming, and it is not always clear why specific requests get blocked. Reporting and analytics depth is limited on lower-tier plans. Pricing jumps to access advanced features draw consistent criticism, and customer support responsiveness varies by plan level.
Forcepoint ONE SWG is the secure web gateway component of Forcepoint’s broader SSE platform, which bundles CASB, ZTNA, DLP, and remote browser isolation into a single cloud-native console. It targets organizations across government, healthcare, and finance that need strong data protection policies applied consistently across web, cloud, and endpoint channels.
Where most SWGs lead with threat detection, Forcepoint leans heavily into data loss prevention. The platform ships with over 190 pre-built data security policies that apply across cloud and endpoint devices, which gives you a faster path to compliance coverage than building rules from scratch. We found the DLP enforcement and insider threat detection to be the core strengths here, with UEBA capabilities that track user behavior across endpoint, email, network, and cloud channels.
The SWG itself protects against phishing pages, unsafe downloads, and compromised sites using remote browser isolation. It covers both mobile and desktop users regardless of location. The centralized console manages incidents, applies policies, and handles compliance workflows in one place. Risk scoring provides an organizational view of your overall threat posture and suggests improvement steps.
Customers praise the support team for hands-on implementation assistance and ongoing responsiveness. The dashboards and investigation views get positive feedback for helping teams spot risky activity without pulling logs from multiple sources.
The criticism is consistent though. Customers say the interface overwhelms new users and policy configuration requires extra steps that slow down initial setup. Report customization is limited, making audit and incident response exports harder than expected. Some customers report needing to redeploy appliances to resolve DLP and ZTNA issues. Pricing and licensing complexity also draws repeated criticism, particularly around unpredictable add-on costs. Active directory password changes take up to 15 minutes to sync, causing access delays.
We think Forcepoint ONE SWG works best for organizations where data protection and compliance are the primary drivers, not just threat blocking. If you need pre-built DLP policies across multiple channels with insider threat monitoring, this platform covers a lot of ground. Based on our review, smaller teams should factor in the setup complexity and plan for dedicated onboarding resources to get full value.
Fortinet FortiGate Web Filter is part of the FortiGate platform that provides inline web filtering, malware detection, and DLP controls. It targets organizations wanting integrated network and web security from a single vendor.
The FortiGate appliance consolidates firewall, VPN, and web filtering in one device. We found the integration streamlines operations compared to managing separate point solutions. Policy configuration happens through a single console that handles both network and web security rules.
SSL inspection provides deep visibility into encrypted traffic. Real-time threat feeds block known malware and phishing sites. The FortiGuard threat intelligence benefits from Fortinet’s research and threat community insights. Reporting across network and web security layers gives complete visibility.
Customers appreciate the consolidated approach and familiar FortiGate interface for teams already running Fortinet infrastructure. Deployment is straightforward for organizations with on premises network requirements.
Netskope’s Next Gen SWG is the web security layer of the broader Netskope One platform, covering cloud, web, and private app traffic from a single console. It targets mid-sized to large enterprises that need unified policy enforcement across web access, SaaS applications, and cloud environments with strong DLP built in.
We found the single-console approach is the standout here. You manage web access policies, cloud app controls, and SaaS security from one place with shared policy sets. That eliminates the duplication you get when running separate tools for each layer. The DLP engine lets admins manage website access, custom apps, and thousands of cloud applications under one framework.
URL filtering uses contextual understanding of content and risk ratings, not just static categories. The platform also provides real-time threat protection and advanced analytics through an add-on module with over 500 metadata attributes for web and cloud activity. Role-based policy customization lets you set different controls from trainees up to directors, which we saw as a practical fit for larger organizations with varied access needs.
Customers praise the unified visibility across cloud, web, and endpoint traffic. SOC teams highlight the real-time threat detection and DLP effectiveness in hybrid environments. Integration with existing security tools gets positive marks, and customer support is frequently called out as a strength.
The complaints center on initial setup complexity.
We think Netskope fits best if you need a single platform covering web security, cloud app controls, and DLP with deep analytics. If your team runs a hybrid environment and wants consolidated visibility without juggling multiple consoles, this is a strong contender. Based on our review, plan for dedicated resources during the initial deployment phase to get the most from the platform’s depth.
Palo Alto’s Prisma Cloud SWG is the web security component of the broader Prisma Access SASE platform. It delivers AI-powered protection against phishing, ransomware, and advanced web threats, with tight integration into Palo Alto’s DLP, CASB, and ZTNA capabilities. This is built for enterprises already invested in or willing to commit to the Palo Alto ecosystem.
The SWG layer covers advanced URL filtering, DNS security, malware analysis, user behavioral monitoring, and remote browser isolation. We found the WildFire threat intelligence integration is a key strength, pushing continuous updates that protect against emerging threats in real time. Sandboxing and AI-powered detection work together to catch zero-day attacks before they reach users.
Centralized management through Panorama or the Cloud Management Console gives you consistent policy enforcement across remote users, branch offices, and headquarters. The global cloud infrastructure keeps latency low across distributed locations, and the platform scales without requiring additional on-premise hardware. Integration with SD-WAN providers and identity platforms like Azure AD and Okta rounds out the connectivity picture.
Customers consistently praise the security depth and the quality of pre-sales and post-sales support from Palo Alto. Global enterprises report reliable performance with minimal latency across distributed points of presence.
The pain points are well-documented though. Customers flag a steep learning curve during initial setup, particularly around policy configuration and routing. Troubleshooting draws criticism for lacking diagnostic clarity. Bandwidth-based licensing frustrates some teams in high-throughput environments. Customers also note that deep integration with Palo Alto products creates vendor lock-in that makes future migration difficult.
We think Prisma Cloud SWG is strongest when deployed as part of the full Prisma Access stack rather than as a standalone gateway. If your organization already runs Palo Alto firewalls or is building toward a consolidated SASE architecture, this is a natural fit. Based on our review, teams outside the Palo Alto ecosystem should weigh the onboarding complexity and vendor commitment carefully before signing on.
Seraphic Security is a browser extension that hooks directly into the JavaScript engine to inspect and control browser activity in real time. It targets mid-sized to large enterprises that want browser-layer protection across corporate and BYOD devices.
What sets Seraphic apart is where it sits. Rather than filtering traffic at the network layer, it creates an abstraction layer between the browser’s JavaScript engine and all incoming code. That gives it visibility into operations that proxy-based tools miss entirely. We found the DLP controls particularly practical. You can disable copy and paste on sensitive sites, block specific domains, and enforce content filtering policies across your entire fleet.
The platform also scans continuously for malware, phishing sites, clickjacking, and zero-day exploits during active browsing sessions. It supports Chrome, Firefox, Edge, and Safari, plus desktop apps like Teams, Slack, and WhatsApp. Out of the box integrations with identity providers, EDRs, CDRs, and SIEMs mean it slots into existing stacks without heavy lift.
Customers consistently praise the deployment experience. The setup process is straightforward, and the product works across multiple installed browsers without extra intervention. Policy management is easy to modify as environments change. Support responsiveness gets regular praise.
We think Seraphic works best for organizations running 1,000 or more endpoints that need browser-native security without the cost and complexity of full SSE or RBI deployments. If your priority is locking down web-based threats and enforcing DLP at the browser layer across mixed device environments, this is a strong option. Based on our review, the deployment simplicity and stack integrations make it worth a serious look.
Skyhigh Security delivers a cloud-native secure web gateway as part of a broader SSE platform that bundles SWG, CASB, DLP, ZTNA, cloud firewall, and remote browser isolation into one console. It targets enterprises wanting to consolidate multiple security tools.
The consolidation story is the headline here. Where competitors often require separate products for ZTNA, CASB, CSPM, and SWG, Skyhigh packages everything into a single centralized tool. We found the SWG component strong on its own, with URL category-based blocking, application and activity controls, and remote browser isolation for risky sites. The global threat intelligence platform feeds real-time phishing protection across the stack.
Zero-day malware protection uses adaptive policy enforcement, and admins get granular application visibility alongside automated incident response. The platform also includes specific security controls for Office 365 environments and shadow IT discovery. We saw the management console praised for making log monitoring, troubleshooting, and policy configuration accessible without deep technical expertise.
Customers highlight the vendor and customer support as a strength, with responsive help during deployment and ongoing operations. The SWG documentation is also called out as clear and easy to follow.
On the other side, customers report challenges with the Mac endpoint agent installation process.
We think Skyhigh fits best if your organization wants a consolidated SSE platform rather than managing separate vendors for SWG, CASB, and DLP. If you already run a multi-vendor stack and only need a standalone web gateway, the broader platform may be more than you need. Based on our review, the all-in-one approach delivers real operational simplicity for teams ready to consolidate.
Zscaler Internet Access (ZIA) is a cloud-native secure web gateway that bundles SWG, CASB, DLP, and firewall capabilities into a single platform. It targets mid-sized to large enterprises that need consistent internet and SaaS security across distributed workforces.
ZIA routes all internet traffic through Zscaler’s global cloud, applying URL filtering, SSL inspection, malware sandboxing, and AI-powered threat detection before users connect. We found the zero-trust architecture is the real differentiator here. Every request gets analyzed in context before a connection is made, which eliminates the need for traditional VPNs or on premises hardware.
The AI-driven phishing detection identifies zero-day fake landing pages and automatically isolates suspicious sites using browser isolation. Admins configure dynamic, risk-based access policies from a single cloud console. The platform integrates with identity providers, SIEM, SOAR, and EDR solutions smoothly.
Customers praise the cloud deployment model for simplifying management across remote and on-site users. Centralized policy administration gets consistent positive feedback. The VPN-free access model is a frequent highlight for hybrid workforces.
However, customers flag complexity during initial policy configuration, particularly for teams new to the platform. Latency during peak times comes up regularly, and SSL inspection can degrade performance on slower networks. Legacy application integration requires extra configuration and exceptions.
We think ZIA is best suited for enterprises with large, distributed workforces that need centralized policy enforcement without maintaining on-premise infrastructure. If your environment is heavily cloud-first and you need a single platform covering SWG, CASB, and DLP, this is a proven option. Based on our review, smaller teams should evaluate whether the licensing cost and configuration complexity match their resources.
Evaluating SWG platforms requires understanding your deployment model, threat priorities, and operational capacity. Here’s the checklist of key questions.
Weight these criteria based on your environment. High-performance requirements favor browser-native solutions. Distributed workforces benefit from cloud-delivered platforms. Consolidation-minded organizations should evaluate bundled platforms. Organizations with strict compliance requirements need strong DLP and data residency controls.
Expert Insights is an independent editorial team that researches, tests, and reviews cybersecurity and IT solutions. No vendor can pay to influence our review of their products. Our Editor’s Scores are based solely on product quality. Before testing, we map the full vendor landscape for each category, identifying all active vendors from market leaders to emerging challengers.
We evaluated 11 SWG solutions across threat detection capability, deployment models, policy flexibility, performance impact, and integration depth. Each platform was tested against cloud-native, hybrid, and on premises access scenarios to understand where each excels. We assessed phishing detection, shadow IT visibility, SSL inspection performance, and how quickly policies could be configured and deployed.
Beyond hands on testing, we conducted extensive market research across the secure web gateway landscape and reviewed customer feedback and deployment case studies to understand where vendor claims diverge from operational reality. Our editorial and commercial teams operate independently. No vendor can pay to influence our review of their products.
This guide is updated quarterly. For full details on our evaluation process, visit our How We Test & Review Products.
Secure web gateway selection depends on your deployment model, threat priorities, and operational capacity for managing complexity.
For enterprises prioritizing zero-trust architecture with cloud-native delivery, Zscaler Internet Access delivers unified SWG, CASB, and DLP.
For browser-native threat detection that catches phishing in encrypted sessions, LayerX and Seraphic Security both work as standalone or add on top of existing gateways.
For organizations wanting consolidated platforms, Skyhigh Security bundles SWG, CASB, DLP, and ZTNA into one dashboard.
For SMBs wanting straightforward protection, Cloudflare Gateway delivers simple DNS-based filtering without infrastructure overhead.
Read the individual reviews above to dig into deployment models, threat detection capabilities, and the trade-offs that matter for your environment.
Secure Web Gateways (SWGs) play a crucial role in safeguarding users from malicious content encountered while browsing the web, including harmful websites and URLs. They empower administrators to establish detailed policies and prevents users from accessing harmful web applications. These solutions act as intermediaries between users and the internet, filtering web traffic at the application level.
Secure web gateways filter web traffic, checking for malicious code, risky URLs, and other threats. They also scan for malware and enforce admin policies, such as preventing users from accessing certain online material or applications. They will prevent unapproved uploads to cloud services.
Typically, internet traffic would be securely routed from individual devices or from routers to the SWG provider. The provider can then inspect traffic for malicious activity and ensure that it is in-line with corporate filtering policies. Harmful pages would be flagged as malicious, and users would be unable to access the website or download materials. There may also be additional security controls applied, such as data loss protection to prevent uploading of files. Remote browser isolation features will protect against harmful web-based content, without blocking user access to web pages altogether.
Key features of a secure web gateways include URL filtering, virus and malware protection, data loss protection, and web application controls. Many vendors offer their SWG alongside other key network security tools, including CASB (Cloud Access Security Broker), data loss/leakage protection, Zero Trust Network Access (ZTNA) and integrations with other security tools, such as XDR (extended detection and response), SIEM (security incident and event management), and SD-Wan.
URL filtering solutions can be deployed at either the network or endpoint level. They provide administrators with the ability to create filters and the policies that govern user access to web content. This includes the creation of allow/deny lists for specific web pages or domains, as well as categories of web pages (e.g., adult content). They also automatically restrict access to known malicious web pages.
Many modern web filters utilize intelligent filters powered by machine learning algorithms. These filters dynamically analyze content to block users from accessing phishing websites that may initially appear safe and genuine but are actually fraudulent pages. URL filtering tools offer granular controls for network administrators, allowing them to configure blocked and allowed domains, including specific URLs, if necessary, for different users and user groups. They also provide comprehensive reporting capabilities to monitor internet usage.
Joel is the Director of Content and a co-founder at Expert Insights; a rapidly growing media company focussed on covering cybersecurity solutions.
He’s an experienced journalist and editor with 8 years’ experience covering the cybersecurity space. He’s reviewed hundreds of cybersecurity solutions, interviewed hundreds of industry experts and produced dozens of industry reports read by thousands of CISOs and security professionals in topics like IAM, MFA, zero trust, email security, DevSecOps and more.
He also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted. Joel is driven to share his team’s expertise with cybersecurity leaders to help them create more secure business foundations.
Craig MacAlpine is CEO and Founder of Expert Insights. Before founding Expert Insights in August 2018, Craig spent 10 years as CEO of EPA Cloud, an email security provider that rebranded as VIPRE Email Security following its acquisition by Ziff Davies, formerly J2Global (NASQAQ: ZD) in 2013.
Craig is a passionate security innovator with over 20 years of experience helping organizations to stay secure with cutting-edge information security and cybersecurity solutions.
Using his extensive experience in the email security industry, he founded Expert Insights with the singular goal of helping IT professionals and CISOs to cut through the noise and find the right cybersecurity solutions they need to protect their organizations.