Home / Industry

Reducing the Risks of BYOD with Nominum's Security Solution

In previous posts, Pat Barnes has discussed the risks associated with BYOD, and a DNS-based approach for reducing those risks. Essentially this approach consisted of making use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. Finding these C&C domains is something Nominum does quite well.

Nominum researches and continually discovers botnet C&C domains. Nominum offers the Network Protection Service, which provides a proprietary feed of botnet related and other malicious command and control (C&C) domains. To produce the industry's best network protection feed, Nominum has established a dedicated security research team that is responsible for data collection, correlation and analysis and implementation of network protection algorithms. By virtue of Nominum's global footprint, processing more than one trillion queries daily, Nominum is in a unique position to offer a truly real-time, adaptive, global feed of C&C domains. The security team uses this data and a variety of techniques and inputs, such as traffic pattern analysis, malware reverse engineering and nameserver reputation, to derive the this feed. This feed is pushed to Nominum's Vantio Caching DNS engine residing in-network, which then uses the feed to block and monitor C&C domains.

Recently, we introduced our Security Intelligence application, which provides in-network reporting on the monitoring and blocking efforts of the Network Protection service feed. Some of the benefits of this new application include:

  • In-network threat reporting that doesn't require sending data off the customer's network;
  • Visibility into the most prevalent and highest priority threats on a network helps prioritize security operations' workload;
  • Ability to search for infected users by IP address or network range helps identify and assist infected subscribers and businesses;
  • Detailed threat information for all infected users helps identify the risks to subscribers and aids remediation efforts;
  • Effective security monitoring while being unobtrusive on network resources.

If you would like to learn more about the Network Protection service and the Security Intelligence application, contact us at sales@nominum.com.

About Nominum

Nominum

Nominum is the innovation leader in DNS software and Internet Activity Applications. The company's Vantio™ CacheServe software powers the Internet for the world's largest CSPs in 40 countries. Vantio™ ThreatAvert software arms CSP's with the power to stop the spread of inside threats such as botnets and DNS-based DDoS amplification attacks that could impact network availability and reputation. Nominum's N2 applications enable CSP's marketing and customer care teams to leverage subscribers' Internet Activity to better engage, build brand loyalty, improve marketing ROI, and open up new business models. Nominum is a global organization headquartered in Redwood City, CA. (Learn More)

Related topics: Access Providers, Cyberattack, DNS, Malware, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Continuing to Work in the Public Interest

Verisign Named to the OTA's 2014 Online Trust Honor Roll

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

Dyn Acquires Internet Intelligence Company, Renesys

Tips to Address New FFIEC DDoS Requirements

Smokescreening: Data Theft Makes DDoS More Dangerous

Introducing getdns: a Modern, Extensible, Open Source API for the DNS

Why We Decided to Stop Offering Free Accounts

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

Tony Kirsch Announced As Head of Global Consulting of ARI Registry Services

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

Dyn Acquires Managed DNS Provider Nettica

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Why Managed DNS Means Secure DNS

SPECIAL: Video Interviews from NamesCon 2014 in Las Vegas

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

DotConnectAfrica Attends Transform Africa 2013 Summit in Rwanda

Sponsored Topics