infoTECH Feature

October 10, 2014

Cloudmark Unveils Real-Time Software Solution to Stop DNS Threats

In recent years, there have been major security breaches in DNS infrastructure that compromise IP-based networks, which often brings down companies’ web-based communications in the process. DNS security has become a main concern of service providers, who are looking out for different ways to tackle and withstand the attacks, which can be expensive and complicated.

To help service providers to handle DNS security in a better way, Cloudmark (News - Alert), Inc., a specialist in security, protecting traffic, data and infrastructure from network threats, has announced its new Security Platform for DNS.

The new Cloudmark Security Platform for DNS software promises to safeguard DNS infrastructure and traffic from ever-evolving network threats. This solution serves as a secure, scalable platform that stops malicious attacks and threats that would further call for Internet outages, malware infections, security control bypass and sensitive or private data exfiltration.

In fact, the new Cloudmark Security Platform for DNS helps service providers and enterprises to get a clear picture about the DNS elements that are being used and misused.

Also, this solution offers the flexibility to be deployed as a standalone security solution or as an augmentation to the present security hardware and appliances. It runs real-time application layer behavior and content analysis to foresee threats. 

“In today’s security environment, organizations must go beyond traditional preventative measures to protect against botnets, malware, viruses and attacks. It’s crucial to have a layered defense that addresses vulnerabilities throughout a company’s infrastructure,” said Neil Cook (News - Alert), CTO, Cloudmark.

Neil Cook said that by addressing DNS threats, organizations can prevent costly damage to their network and their brand.

Built-in DDoS Attack Protection and mitigation features help users to avoid  DDoS attacks and  it also stops DNS tunnels to be used as bypass network access or security controls, form reverse tunnels allowing infiltration, or bypass Wi-Fi billing.

Users can also get alert once the threat is detected and this solution also integrates with third-party reporting tools such as HP ArcSight and Splunk (News - Alert).




Edited by Maurice Nagle
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers