Cloud-Based Threat Prevention

Cloud Shield is VeloGuardian's cloud-based security engine. It inspects all traffic passing through the VeloGuardian network in real time, applying multiple layers of protection to keep you safe from online threats.

Because Cloud Shield operates in the cloud, there's nothing to install or maintain on individual devices. Security policies are applied automatically based on each user's profile, and threat databases are updated continuously without any action from your IT team.

What Cloud Shield Protects Against

Cloud Shield provides several layers of security, all working together:

  • Malware — Files and payloads are scanned in real time. Malicious content is blocked before it reaches your devices, providing protection beyond traditional endpoint antivirus.
  • Ransomware — Known ransomware distribution networks and payloads are identified and blocked at the network level.
  • Phishing — Cloud Shield identifies and blocks phishing websites that attempt to steal credentials and sensitive information.
  • Botnets — If a device on your network becomes compromised, Cloud Shield prevents it from communicating with command-and-control servers, stopping the attack from spreading.
  • Unauthorized applications — Application filtering lets you control which apps can access the internet, preventing data leakage and enforcing acceptable use policies.

How Cloud Shield Works

When a device running VeloGuardian connects to the internet, the traffic follows this path:

  • Step 1: The device creates an encrypted WireGuard tunnel to the VeloGuardian network.
  • Step 2: All traffic passes through Cloud Shield, where it is inspected against threat databases, content categories, and security policies.
  • Step 3: Clean traffic is forwarded to its destination. Malicious or policy-violating traffic is blocked and logged.
  • Step 4: The response travels back through Cloud Shield and the encrypted tunnel to the device.

This entire process happens in milliseconds. Users experience no noticeable delay, but every request is checked for threats.

Privacy by Design

Cloud Shield does not log, store, or inspect the contents of your data. Security filtering operates at the network metadata level — domains, URLs, file hashes, and traffic patterns are analyzed to identify threats, but your actual data remains private.

VeloGuardian does not include third-party analytics or advertising in its apps or security pipeline. Your traffic data is never sold or shared.

Always Up to Date

Cloud Shield's threat databases are updated continuously from multiple intelligence sources. New malware signatures, phishing domains, and botnet indicators are added in real time — no manual updates, no scheduled scans, no gaps in coverage.

Related Resources

Protect Yourself with Cloud Shield

Get started with VeloGuardian and let Cloud Shield handle the threats.

Get Started