Details
From proxy frameworks like Ultraviolet and Scramjet to game aggregators, Google Sites, shared links on platforms like Replit, and even extension-less sessions, students are using a range of methods to bypass filtering and access blocked content.
Bypass is constantly adapting, and stopping it requires more than a single layer of protection. In this session, we’ll talk about a layered approach to maintain coverage across devices, networks, and sessions.
You’ll learn:
- How common bypass paths like aggregators, Google Sites, new domains, and shared links can be detected and blocked
- How cloud proxy enforcement, dynamic categorization, and policy controls work together to close gaps other layers might leave open
- How real-time detection identifies proxy behavior at execution, including JavaScript activity and tunneling methods
Date
May 12
Time
10:00 am - 11:00 am CDT