News

Infoblox addresses DNS cybersecurity blind spot

Infoblox has announced significant enhancements to its ActiveTrust Cloud offering that now leverages advanced analytics to expand detection of potential zero day threats and prevent the loss of data, adds the ability to distribute threat intelligence to other security products in the network and ensures that content on the network conforms to corporate policies.

Scott Fulton, Infoblox

In this latest release, organisations are able to strengthen their protection across their entire security ecosystem with advanced machine learning as well as distribute actionable threat intelligence across existing security solutions on the network.

Most Internet communications rely on DNS, however DNS is often not sufficiently secured which creates vulnerabilities that can be exploited for data exfiltration and spreading malware. Over 91 percent of malware uses DNS to communicate with C&C servers, lock up data for ransom or exfiltrate data. Existing security controls, such as firewalls and proxies, rarely focus on DNS and associated threats – leaving organisations vulnerable to highly aggressive, rapidly proliferating attacks.

“DNS is a target for common cyber-attacks such as DNS cache poisoning, DNS hijacking, and DNS spoofing,” said Jon Oltsik, Senior Principal Analyst at ESG. “To turn DNS into a first line of defense, enterprise DNS security offerings should include abundant functionality including strong detection/blocking capabilities, behavior analytics (for detecting/blocking zero day and sophisticated attacks that can’t be detected using threat intelligence alone), a hybrid architecture (that protects on-premises and mobile/roaming users), aggregated and curated threat intelligence feeds, central management, and tight integration into the network and security infrastructure for better visibility and context.”

Delivered as a service, ActiveTrust Cloud is easy to configure and use without dedicated IT resources and protects devices everywhere—on the enterprise network, roaming, or in remote office/branch offices.

“Because DNS sits in core of the network – it sees a lot of malicious activity first,” said Scott Fulton, executive vice president of products at Infoblox. “DNS should be an organization’s first line of defense as most ransomware and malware uses DNS at multiple points in the cyber kill chain. The data we collect provides essential context and visibility so IT admins can be alerted of any network anomalies, report on what assets/devices are joining and leaving the network and resolve problems faster.”

 

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines