Explosion of Connected Devices Exposes Holes in IT Security

TORONTO – May 28, 2014 – Recent well-publicized attacks have demonstrated that both traditional mobile devices and non-traditional devices such as…

BlueCat Threat Protection adds an additional layer of security for all devices across all applications to defend against malware, botnets and other attacks

TORONTO – May 28, 2014 – Recent well-publicized attacks have demonstrated that both traditional mobile devices and non-traditional devices such as Point of Sale (POS) systems are increasingly being targeted by malware, botnets and other attacks. To combat these growing threats that are pervasive to all devices, BlueCat, a leading provider of IP Address Management solutions, has released BlueCat Threat Protection for DNS/DHCP Server. BlueCat Threat Protection stops malicious activities in DNS before they can reach business-critical applications or data. The solution creates a ‘DNS firewall’ that blocks devices from ever accessing a known malicious site or host by providing rapid, cloud-delivered threat data updates to customers’ DNS infrastructure.

For more information on BlueCat Threat Protection or to request a demo please visit:

https://bluecatnetworks.com/products/bluecat-threat-protection/ 

Leveraging DNS to Secure the Business

The growth in the number and type of new devices connecting to the network has exposed holes in typical enterprise security. Security solutions tend to focus on particular devices or protocols and cannot provide a broad-based solution that covers all devices and applications. All devices use the Domain Name System (DNS) to connect to applications and sites. BlueCat Threat Protection provides an additional layer of defense against malicious Internet content and infected devices.

“The explosion of network-connected devices is exposing businesses to new security threats and risks,” says Andrew Wertkin, CTO, BlueCat. “Not only do our customers need to secure traditional devices such as a desktops, laptops, smartphones and tablets, but also non-traditional devices including VoIP, Point-of-Sale systems, security cameras and RFID. The Domain Name System is a critical component of any defense in depth security strategy. BlueCat has delivered a DNS Firewall that is connected to up-to-the-minute cloud-delivered threat data and centrally controlled and orchestrated by our BlueCat Address Manager IPAM solution. Threat Protection provides additional value to our customers without having to purchase or maintain additional appliances.”

Lawrence Orans and Jeremy D’Hoinne of Gartner write that, “The traditional defense in depth components are still necessary, but are no longer sufficient in protecting against advanced targeted attacks and advanced malware.” 1

BlueCat Threat Protection Empowers Enterprises to:

  • Secure the business by stopping malicious activities in DNS before they can reach business-critical applications or data.
  • Leverage core network services to add a new layer of security across all connected devices, both traditional and non-traditional.
  • Take action based on up-to-the-minute data about known sources of malicious content including malware, botnets, exploits, viruses and spam delivered by the hosted BlueCat Security Feed.
  • Configure policies to allow threat requests to be blacklisted, black-holed, redirected or whitelisted.

BlueCat Threat Protection can be quickly and easily added to existing BlueCat customers’ DNS servers or can be purchased as a stand-alone solution to quickly and easily augment the DNS infrastructure companies already have in place. The solution can also be integrated with leading SIEM solutions including IBM QRadar and HP ArcSight via pre-built connectors for immediate notification of a security risk.

About BlueCat

BlueCat IP Address Management, DNS and DHCP solutions provide the foundation to build elastic networks that scale to match the ever-changing and unique demands on your infrastructure. We enable the reliability of your core network services and securely connect the people, physical devices, virtual machines and applications that drive your business. Enterprises and government agencies worldwide trust BlueCat to solve real business and IT challenges – from device on-boarding for BYOD to network consolidation and modernization to managing and automating virtualization, cloud and the Internet of Things.

Media Contact:

Courtney Senior
PR and Community Manager, BlueCat
T: 1. 416.646.8400 ext. 308

E: csenior@bluecatnetworks.com

 

1 Lawerence Orans and Jeremy D’Hoinne, “Five Styles of Advanced Threat Defense,” Gartner, August 20, 2013.

Get in touch

We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.

Read more

Everything you need to know about shadow IT

When users implement their own solutions behind the IT team’s back, that’s shadow IT. Learn about the risks and how to manage and reduce it with BlueCat.

Read more
How an agency IT chief innovated amid bureaucracy

Government IT innovation isn’t easy, but Chad Sheridan did it at the USDA by removing silos, earning top-level buy-in, and moving to a product mindset.

Read more
Lexmark CIO & CTO on recognizing the right use cases for AI

Lexmark CIO & CTO Vishal Gupta wades through the murk surrounding AI, explaining what tech organizations should know when deciding whether to adopt it.

Read more
NSA and CISA: Protective DNS key to network defense

U.S. cyber agencies now point to protective DNS as a defense strategy, confirming what BlueCat already knew: DNS is critical to detecting network threats.

Read more

Products and Services

From Core Network Services to multicloud management, BlueCat has everything you need to build the network you need.

Learn more

Read our blog

Our blog covers all the latest developments in network management, cybersecurity and DNS, with expert insights and opinions.

Our Blog