The main use case was to address business email compromise (BEC) issues. People were logging into websites using their company email addresses, causing problems. We were getting a lot of phishing emails, like someone asking for money. We found that this was happening while using Zoom images.
So, we use K7 to block all the websites which are not necessary. It has its own model to decide whether a website is trusted or not. If it's not a solid, stable website, you can't open it on your laptop.