Depends on the firewall and mainly the infosec team. But most just use a transparent proxy for outbound 80/tcp and 443/tls which just blocks based on sites one is visiting via some combo of greylists, whitelists, blacklists, and iblocklist.
ix.io is one of a few that’s not on that block list because googlebot does not know what to do with it.
with the exception of whitelisting known traffic, egress control is basically a losing game. Some corps actually have a good handle on knowing what their traffic looks like, and can pull off said whitelisting. However it’s far from the norm.
no, the filters a service like these alternatives to pastebin operates for are different than productivity filters. Productivity filters are somewhat going out as most users use social media from their phones anyway, and they cause a lot of operation problems for the benefits achieved.
The systems that inspect traffic for security purposes operate under a category of tools known as Data Loss Prevention (DLP) as well as various forms of IDS systems meant to detect malicious traffic. The goal is to prevent the exfiltration, both intentional and unintentional, of protected data.