Infoblox has announced enhancements to its ActiveTrust Cloud offering that now leverages advanced analytics to expand detection of potential zero day threats and prevent the loss of data, adds the ability to distribute threat intelligence to other security products in the network and ensures that content on the network conforms to corporate policies.
In this latest release, organisations are able to strengthen their protection across their entire security ecosystem with advanced machine learning as well as distribute actionable threat intelligence across existing security solutions on the network.
“DNS is a target for common cyber-attacks such as DNS cache poisoning, DNS hijacking, and DNS spoofing,” said Jon Oltsik, senior principal analyst at ESG.
“To turn DNS into a first line of defence, enterprise DNS security offerings should include abundant functionality including strong detection/blocking capabilities, behaviour analytics (for detecting/blocking zero day and sophisticated attacks that can’t be detected using threat intelligence alone), a hybrid architecture (that protects on-premises and mobile/roaming users), aggregated and curated threat intelligence feeds, central management, and tight integration into the network and security infrastructure for better visibility and context.”
Delivered as a service, ActiveTrust Cloud is easy to configure and use without dedicated IT resources and protects devices everywhere—on the enterprise network, roaming, or in remote office/branch offices.
“We were looking to automate our monitoring and reporting processes to prevent potential ransomware or other types of cyberattacks from impacting our network,” said Ron Washburn, senior system administrator and network engineer for City University of Seattle. “We chose Infoblox’s cloud-based SaaS security solution to protect our data from being stolen and machines from becoming infected, while keeping our users safe. The licensing scheme also worked well with our organisation's needs and deployment of multi-use machines.”
“Because DNS sits in core of the network – it sees a lot of malicious activity first,” said Scott Fulton, executive vice president of products at Infoblox. “DNS should be an organisation's first line of defence as most ransomware and malware uses DNS at multiple points in the cyber kill chain.
“The data we collect provides essential context and visibility so IT admins can be alerted of any network anomalies, report on what assets/devices are joining and leaving the network and resolve problems faster.”