There are a few steps you can take to implement a PDNS. Watch this video as Paul walks you through one simple step to get started today.

 

 

As mentioned before, the importance of having security is night and day when it comes to protecting your systems. There are many security measures you can take and many steps to implement them. But with this one simple step, you can implement PDNS on your systems easily.

Don’t wait to start protecting yourself. Let ThreatSTOP stop the threats before they become a problem. Get in touch with one of our experts today and find out more about how we can protect you and your information.

 

Learn More:

What DNS Security Does A Typical Enterprise Need?

DNS Defense Cloud 

DNS Defense 

 

Video Transcript

Timestamps

0:00 Intro
0:05 A Simple PDNS Implementation

0:05 A Simple PDNS Implementation

The real simplest, the simplest protected DNS implementation is to pick your favorite open recursive service, like 9999, and just configure a point at it. All that's happening is it's downloading stuff to block. You don't have to have people looking at the threat intelligence, you just trust them. You don't have to deploy, you know, you don't have to do anything. 

You change two settings and you got a bunch of protective DNS, not nearly as much as you might hope for. You don't know whether or not you're infected. You just hope it's blocking stuff and it's some protection for no effort, you can go there if you want.