Introducing KyberOS — Digital safety + Physical security in one platform.Learn more →
📱
🍎
🔒
🛡️
🌐
📚
🎓

iPadWebFilterThatActuallyWorks

Proxy-based filtering with full SSL inspection. Not DNS. Not browser extensions. Real HTTPS decryption that catches what others miss.

0+content categories filtered

DNS-Only Filters

GoGuardian, Securly, Lightspeed

Sees domain name onlyLIMITED
Can't read HTTPS contentBLIND
Proxy sites bypass easilyVULNERABLE
No URL path inspectionMISSING

KyberGate Proxy

Full HTTPS inspection

Full URL + path inspectionCOMPLETE
Decrypts HTTPS contentVISIBLE
Catches proxy bypass attemptsBLOCKED
Real-time page analysisACTIVE
THE PROBLEM

DNS filters can't see inside HTTPS

0%

of web traffic is now HTTPS — invisible to DNS filters

0%

of students know how to bypass DNS-only school filters

0K+

proxy bypass sites indexed and blocked by KyberGate

HOW IT WORKS ON iPAD

Built for iPad from day one

Proxy-based architecture designed specifically for Apple's ecosystem — MDM-deployed, supervised-device aware, and HTTPS-inspecting.

1

Proxy-Based iPad Filtering

Every request passes through KyberGate — not just DNS

Unlike DNS-only filters, KyberGate routes all iPad traffic through a forward proxy. This means full URL inspection, not just domain-level blocking. We see the complete request path — including encrypted HTTPS traffic — giving you visibility that DNS filters simply can't match.

iPad Proxy Traffic Flow
📱
iPad
PAC Config
🛡️
Proxy
KyberGate
🔍
Inspect
SSL/TLS
🌐
Internet
Filtered
All iPad traffic routed through KyberGate proxy — full visibility
2

Zero-Touch MDM Deployment

Push proxy profiles to every iPad in minutes

Deploy KyberGate's proxy configuration via your existing MDM — Jamf, Mosyle, ABM, or any MDM that supports mobileconfig profiles. The PAC file, CA certificate, and proxy settings are pushed silently. Students can't remove them on supervised devices.

MDM Profile Deployment
KyberGate_Proxy.mobileconfigDEPLOYING
iPad-0015th
iPad-0025th
iPad-0036th
iPad-0046th
iPad-0057th
iPad-0067th
0 devices6 devices
3

Full SSL/TLS Inspection

See inside HTTPS — catch what DNS filters miss

KyberGate's trusted CA certificate lets us decrypt, inspect, and re-encrypt HTTPS traffic in real time. This catches proxy bypass attempts, embedded game URLs, and evasion techniques that are completely invisible to DNS-only filters like GoGuardian or Securly.

SSL Inspection — HTTPS Decryption
Student visits https://proxy-site.com
TLS handshake intercepted by KyberGate CA
SNI: proxy-site.com → category: PROXY
Request body: destination=games.example.com
Deep inspection: embedded game URL found
>>> BLOCKED — Proxy bypass attempt <<<
InterceptingBlocked
4

Smart PAC Routing

Intelligent traffic routing — bypass what you trust

KyberGate's PAC file intelligently routes traffic: educational domains go direct for speed, while everything else passes through the proxy for inspection. Customizable per school, per grade level, per device group. Updated automatically via MDM.

PAC File — Routing Rules
function FindProxyForURL(url, host) {
if*.eduDIRECT// Educational — bypass
if*.google.comPROXY// Inspected via proxy
if*.youtube.comPROXY// Category filtered
if*.tiktok.comPROXY// Blocked category
if*.apple.comDIRECT// System updates
if*PROXY// Default — all traffic
}
PAC file auto-deployed via MDM — no manual config needed

iPad Filtering by the Numbers

KyberGate's iPad filtering performance

0+

Content Categories

<0ms

Proxy Latency

0

Proxy Regions

0%

SSL Inspection

COMPARISON

KyberGate vs iPad Filters

DNS-only filters see the envelope. KyberGate reads the letter.

FeatureKyberGateGoGuardianSecurlyLightspeedMosyle
Full URL Inspection
SSL/HTTPS Decryption
Proxy-Based Filtering
Real-Time Page Content Analysis
Game Detection Engine
Off-Campus Filtering
MDM Profile Deployment
Custom PAC Routing

GoGuardian, Securly, and Lightspeed use DNS-only filtering on iPads. Mosyle has basic content filtering built into MDM but lacks SSL inspection.

Why iPads Need Proxy Filtering

iPads don't support browser extensions — GoGuardian's agent can't run

iOS restricts VPN-based filtering to supervised devices only

DNS-only filters can't see HTTPS content on any platform

Students use iCloud Private Relay to bypass DNS filters

Proxy-based filtering works on supervised AND unsupervised iPads

PAC file deployment is natively supported by every MDM

KyberGate CA cert enables full SSL inspection on managed devices

Off-campus filtering works without a VPN tunnel

What DNS Filters Miss on iPad

HTTPS page content — can't see what's inside encrypted pages

Proxy bypass sites — students use web proxies to tunnel around DNS

Google Translate abuse — loading blocked sites through translate.google.com

Embedded iframes — games hidden inside Google Sites and Docs

URL path filtering — can't block specific YouTube videos

Search query analysis — can't see what students are searching for

WebSocket tunnels — real-time proxy bypass via websocket connections

iCloud Private Relay — Apple's built-in DNS bypass feature

Frequently Asked Questions

“We tried GoGuardian and Securly on our iPads — students bypassed both within a week using web proxies. KyberGate's proxy-based approach caught every single bypass attempt on day one. It's the only filter that actually works on iPad.”
M

Mark Rodriguez

Director of Technology, Westfield School District · 8,500 iPads

Filter Your iPads for Real

Deploy KyberGate on your iPad fleet in under 30 minutes. Proxy-based filtering, full SSL inspection, works with any MDM.

Works with Jamf Works with Mosyle Full SSL inspection Off-campus filtering