As a large corporation, it is important to protect your organization, your customers, and the data stored within. Watch this video to learn more from Paul about PDNS from ThreatSTOP and how we’re taking a proactive approach to protection.

 

There are constant threats to our security and data. It’s important to keep security up-to-date and the most current firewalls to protect against security breaches. One slip within your systems could open the floodgates to stolen data, malware, and much more.

Let ThreatSTOP stop the threats before they stop you. We offer a variety of programs and software modeled to fit the needs of your organization. Don’t wait until it’s too late. Chat with one of our knowledgeable experts today, and get protected.

 

Learn More:

What DNS Security Does A Typical Enterprise Need?

DNS Defense Cloud 

DNS Defense 

 

Video Transcript

Timestamps

0:00 Intro
0:05 ThreatSTOP PDNS For Large Corporations
2:22 Comprehensive Integrations 
2:39 Cloud Integrations

0:05 ThreatSTOP PDNS For Large Corporations

So what that looks like is shown here schematically, we have about 900 plus threat intelligence feeds. Some of them are public domain, and some of them are from places like the US government. DHS has a threat feed that they distribute, and if you're qualified to receive it, you can use it. It's free, but again, you have to be U.S infrastructure. There are commercial sources like Falcon, threat intelligence from Crowdstrike, or the farsight new domain feeds. But there's literally hundreds of these. 

One of the more interesting ones that we're going to get to is the geo-blocking database. So if you want to say I don't want to accept any traffic from Russia, you can do that. If you want to say I don't want traffic from Iran, you can do that. 

Geo-blocking is not a Panacea because lots of times these nation-state actors will come through websites in, you know, U.S colleges, whatever, but what you can do is you can shut the door to a lot of their regular attacks and make life more difficult for them, and basically a lot of security is making sure that you make it difficult for your adversary.

The threat intelligence gets accumulated in our database and is spread through automatic policy updates. You can do that to your router, your firewall, your DNS servers. You can do it to the cloud. One of our services creates laugh rules for Amazon. So if you're running a website there, you probably don't want to spend a lot of time servicing requests for somebody that's just trying to break into the website. So you can turn off their access, save money, spend less money serving people that aren't real customers. We can deploy to the laptop if you'd like, run a DNS server in your laptop. 

2:22 Comprehensive Integrations 

Again, these integrations are comprehensive. I'm not going to go through all of these, but you know, you could probably find most of your equipment on this chart and this is not complete, but it does show that we do have the integration ready to go for a wide variety of devices and manufacturers. 

2:39 Cloud Integrations

Cloud integrations are also there if you use any of these cloud providers. We're ready to set you up, help you run.