Securing Internet Traffic with Banyan

Protect users from unsafe internet resources via Banyan's Secure Web Gateway (SWG)

  • Updated on Jul 14, 2023
  • 3 minutes to read
  • Contributors

This article describes features that are only available in the Banyan Unlimited edition.


Banyan’s Internet Threat Protection (ITP) capability is designed to protect end-users from malicious websites, ransomware, or phishing attacks by examining internet traffic. Banyan’s ITP can also be used to enforce acceptable use policies (AUPs) by blocking specific categories of websites (such Gambling, Drugs, Adult Content, etc) and for data loss prevention (DLP) scenarios. Traditionally, Secure Web Gateway (SWG) functionality has been enforced in firewalls tied to a specific network; Banyan’s Internet Threat Protection, on the other hand, provides modern SWG functionality applied to users and devices no matter which network they are on.

Banyan’s ITP capability is implemented and applied in 3 stages, with functionality being automatically enabled or disabled based on the policies you assign to your users.

Stage Description
DNS-layer Security Evaluate domain for threats & acceptable use
URL Filtering Evaluate URL for unsafe web resources
Payload Inspection Scan HTTP payloads for malicious content & sensitive data

The flow diagram below depicts the different stages of Banyan’s Internet Threat Protection.



Traffic destined for Private Resources and Service Tunnels is automatically excluded from ITP policies; admins can add further org-specific exemptions as needed. DNS resolution and content inspection are carried out at the Banyan Global Edge Network, while URL filtering is performed primarily on the device. Enforcing Banyan ITP in this fashion allows security to be always-on but not always-inline, ensuring your users do not face any extra hops or network performance degradation while still enforcing all your organization’s security policies.

DNS-layer Security

DNS-layer Security allows admins to decide which domains, or categories of domains, they need to block. These domains are added to an ITP policy in Banyan, and the policy is then associated to a device or a group of devices.

These devices then update their name servers to point to Banyan’s name servers for all DNS traffic. The next time the device uses DNS, the request is sent to Banyan name servers, along with the device’s unique identifier. The name servers recognize the device based on its unique identifier and then match the device to the associated ITP policy.

Then, in real time, Banyan’s ITP policy categorizes the request(s) from the device, based on domain, and determines whether the request(s) should be blocked or allowed:

  • If the request is blocked, then the device receives a redirect to a block page (the messaging on the block page is configurable by the organization).
  • If the request is allowed, the device continues to the endpoint without any notification of evaluation.

What’s next

Read about how to create and manage ITP policies in Banyan to secure access to your networks.