Products
dope.swg
→
Fly-Direct proxy directly on the endpoint, now with AI-powered DLP.
casb_neural
→
AI-driven data visibility and posture management.
Pricing
Resources
Resources
Blog
SWG & CASB Datasheet
DLP Datasheet
ChatGPT Datasheet
Claude Datasheet
Whitepaper
Comparison Chart
FAQs
Media
Press Kit
Newsroom
Awards
Podcast
Contact
Videos
Events
Upcoming
Past
Featured Story
Meet Dopamine DLP →
Endpoint Data Loss Prevention Powered by AI
Manage AI
About
Customers
Log in
Book a demo
Log in
X
in
li
It’s not that we’re mad at yesterday’s cybersecurity. Just disappointed. So we made it better. We made it easier.
We made it dope.
Made with
in California
© 2024 dope.security Inc.
[ menu ]
May 4, 2026
AI-Powered SSPM: CASB Neural Gets an Upgrade
You open your SSPM dashboard and see 340 third-party apps connected to your Microsoft 365 tenant. Where do you start? AI-powered SSPM insights turn raw OAuth data into prioritized, actionable risk decisions in under a minute.
AI Security
CASB
Product Updates
Shadow IT
March 26, 2026
Blocking Personal Claude Accounts: Cloud Application Control for Enterprise Claude Users
Claude went from an interesting demo to daily work tool fast. Your employees are using it on personal accounts your company has no visibility into. Here’s how dope.security’s Cloud Application Control fixes that.
SMB
Financial Services
Healthcare
How-To
Customer Stories
Product Updates
Comparisons & Alternatives
Threat Intelligence
Remote Work Security
Shadow IT
Compliance
Zero Trust
Cloud App Control
AI Security
Endpoint Security
DNS Filtering
CASB
Data Loss Prevention
Secure Web Gateway
Interviews
Thought Leadership
Design
User Experience
Case Studies
Company
Development
Technology Solutions
All Blogs
September 18, 2023
Interview: How to Become a CISO with Ty Sbano (Vercel)
Cybersecurity started as an underground vibe — cool, but once upon a time it was home to those who just weren’t that social, kind of nerdy, and just needed an escape to feel at home at 3AM (like me!)
September 14, 2023
Tips from Jedi Master Nico Popp, CPO of Tenable
Episode I: How to Be a Dope Product Manager
August 23, 2023
What is Shadow IT?
How to identify applications employees are using with Shadow IT. Employees always look for new ways to improve their productivity and efficiency, and, naturally, the newest applications haven’t been officially purchased by the company (yet).
July 26, 2023
dope.security Policy Update Interval is Instant 🤩
We've removed the pain of editing a policy on “Legacy” SWGs — AKA don’t wait an hour to update your policy anymore!
May 12, 2023
Managing Proxy SSL Inspection Breaking Applications
SSL inspection is a security feature of SWGs that enables them to decrypt SSL-encrypted traffic, scan it for potential threats, and re-encrypt it before forwarding the traffic to its destination.
March 22, 2023
GV (Google Ventures) joins the First-Class flight
From GV.com — In the past few years, we’ve seen significant disruptions to the traditional workplace and the tools that govern how work gets done.
Previous
Next
Categories
Secure Web Gateway
Data Loss Prevention
CASB
DNS Filtering
Endpoint Security
AI Security
Cloud App Control
Zero Trust
Compliance
Shadow IT
Remote Work Security
Threat Intelligence
Comparisons & Alternatives
Product Updates
Customer Stories
How-To
Healthcare
Financial Services
SMB
Technology Solutions
Development
Company
Case Studies
User Experience
Design
Thought Leadership
Interviews
Authors
Kunal Agarwal
Amar Jeer
Erica Remmele
Luis Diogo Couto
Vamshi Bachaneboina
Ashley Wu
Aidan Power
Ralph Depping
Harsh Divecha
Trending
Zscaler ZIA vs ZPA: What the Split Actually Means for Your Stack (and Bill)
Remote Browser Isolation in 2026: When It Actually Helps, and What an Agent-Based SWG Covers Instead
On-Device TLS Inspection: How to Decrypt Traffic Without Backhauling Through a Cloud Proxy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.