Verisign Intros Cloud-based DNS Firewall

Written by

Verisign has introduced its DNS Firewall, a managed, cloud-based service that offers protection from unwanted content, malware and advanced persistent threats (APTs), along with the ability to customize filtering.

“Defending against cyber-threats is not only critical, but increasingly difficult and expensive,” said Michael Kaczmarek, senior director of product management for Verisign’s recursive DNS service, in a blog. “Just a quick glance at today’s news headlines and it is clear that these threats present numerous challenges to internet users and the organizations that both serve and employ them.”

For example, in 2014, McAfee Labs observed a 75% year-over-year increase in new malware equating to 387 new threats per minute. Further, the Ponemon Institute estimates the average data breach costs large organizations $3.8 million per event.

The service employs real-time feeds from multiple sources, including Verisign’s own iDefense Security Intelligence Service feeds for in-depth country-specific and regional threats. It also makes use of Verisign’s patented bot-net detection algorithm feeds that predict a variety of potential threats, and threat indicator feeds from various third-party sources.

On the filtering front, it includes a variety of out-of-the-box content filters, including the ability to define customized white and black lists to tailor traffic navigation.

Also, organizations can identify affected devices inside the network border, without the need for individualized client installs.

The company said that the launch represents a new approach to firewalls. “Most solutions either require extensive investment or do not meet an organization’s constantly evolving needs,” said Kaczmarek. “Traditional, appliance-based security solutions can require organizations to shell out considerable amounts of money, both in up-front capital expenditure and in on-going maintenance fees. Conversely, many managed cloud-based offerings do not provide the critical capability to customize the solution based on an organization’s specific business environment and security needs. Finally, do-it-yourself (DIY) open-source solutions suffer from constant patching and maintenance problems.”

What’s hot on Infosecurity Magazine?