Stop DNS Attacks

LookingGlass DNS Defender® threat mitigation appliances are carrier- and enterprise-grade DNS (Domain Name Services) protocol-specific firewalls that protect against DNS attacks, accelerate DNS performance, provide insight into DNS traffic, and deliver the flexibility you need to protect both your DNS and your entire enterprise from evolving threat actors.

Stop Embedded Malware Activation

DNS Defender appliances, as a component of LookingGlass Dynamic Threat Defense, stop malware from reaching command and control (C2) servers for instructions.  Carriers and enterprises have hundreds of recursive DNS servers that handle original DNS requests from clients. Clients get infected with malware. Most malware requires a DNS request to find a C2 server. Domain block lists on DNS Defender threat mitigation appliances installed between clients and recursive servers stops malware in its tracks: without a C2 server, malware is disabled. LookingGlass Dynamic Threat Defense provides automatic blocking by updating DNS Defender block lists at regular intervals with malware domains discovered by LookingGlass Virus Tracker.

THE PROVEN DNS PROTOCOL-SPECIFIC FIREWALL

LookingGlass™ DNS Defender is protocol-specific DNS firewall deployed with success defending large scale networks for many years, offering 7-layer security, enhanced performance, an open architecture, and actionable insight. It prevents lost revenue, intellectual property (IP), and productivity all while allowing you to keep your existing DNS infrastructure – no rip and replace.

MY DNS IS OUTSOURCED SO I DON’T NEED PROTECTION

If you think you’ve outsourced your DNS, talk to the people responsible for it. It’s easy to outsource your authoritative1 DNS servers, but you’ve almost certainly retained your recursive2 DNS servers. Your recursive DNS servers can have even more vulnerabilities than the authoritative servers you’ve outsourced. But more importantly, talk to us about how ScoutVision, DNS Defender, and your recursive servers working together blocks the activity of spear phishing attacks and advanced malware penetrating your organization.

DNS-Defender-7-layerSecurityBorder

DNS Defender 7-Layer Security

KEY DNS DEFENDER BENEFITS

1. BLOCKS MALWARE ACTIVATION

LookingGlass Dynamic Threat Defense automatically updates DNS Defender domain block lists provided by LookingGlass Virus Tracker based on global discovery of malware. Your organization is protected instantly from the experiences of IT shops around the world.

2. DEEP PACKET PROCESSING-BASED DNS DEFENSE

Patented Deep Packet Processing technology makes DNS Defender the only solution offering 10G performance and an open architecture to develop on-the-fly security countermeasures. Other solutions are limited to 1G and are built on fixed, proprietary platforms. Read the flexibility stories! 

3. ACCELERATES DNS PERFORMANCE

You can postpone DNS infrastructure upgrades with DNS Defender performance acceleration and server offload from a fast cache that answers DNS queries up to 10 times faster than DNS servers.

Flexible Appliance Choices

CS4KE-ULO

LookingGlass CS-4000E Appliance

The LookingGlass CS-4000E Deep Packet Processing Platform is a converged network application and computing solution enabling flexible and rapid responses to emerging threats and changing network conditions.

12-1195-CloudShield_127_CS-4000-118-web

LookingGlass CS-4000 Appliance

The LookingGlass CS-4000 Secure Deep Packet Processing platform is a key component of a cybersecurity defense solution holding the U.S. Director of Central Intelligence Directive (DCID) 6/3 Protection Level Five (PL5) accreditation.

Solving the Nonsense-Name Attack

Explore the Case Studies

Lightower Fiber Networks

Wind Telecomunicazioni SpA

 

Next Steps

1Authoritative Server: Authoritative name servers provide the addresses of your servers that the world actually needs to reach: your mail, web servers, and others you support.
2Recursive Server: Your recursive servers – properly deployed – answer DNS requests for applications within your organization. These requests are mostly for web browsers and smartphone apps but are used with other protocols too, like Telnet and FTP.
top