BlueCat Threat Protection adds an additional layer of security for all devices across all applications to defend against malware, botnets and other attacks
TORONTO – May 28, 2014 – Recent well-publicized attacks have demonstrated that both traditional mobile devices and non-traditional devices such as Point of Sale (POS) systems are increasingly being targeted by malware, botnets and other attacks. To combat these growing threats that are pervasive to all devices, BlueCat, a leading provider of IP Address Management solutions, has released BlueCat Threat Protection for DNS/DHCP Server. BlueCat Threat Protection stops malicious activities in DNS before they can reach business-critical applications or data. The solution creates a ‘DNS firewall’ that blocks devices from ever accessing a known malicious site or host by providing rapid, cloud-delivered threat data updates to customers’ DNS infrastructure.
For more information on BlueCat Threat Protection or to request a demo please visit:
Leveraging DNS to Secure the Business
The growth in the number and type of new devices connecting to the network has exposed holes in typical enterprise security. Security solutions tend to focus on particular devices or protocols and cannot provide a broad-based solution that covers all devices and applications. All devices use the Domain Name System (DNS) to connect to applications and sites. BlueCat Threat Protection provides an additional layer of defense against malicious Internet content and infected devices.
“The explosion of network-connected devices is exposing businesses to new security threats and risks,” says Andrew Wertkin, CTO, BlueCat. “Not only do our customers need to secure traditional devices such as a desktops, laptops, smartphones and tablets, but also non-traditional devices including VoIP, Point-of-Sale systems, security cameras and RFID. The Domain Name System is a critical component of any defense in depth security strategy. BlueCat has delivered a DNS Firewall that is connected to up-to-the-minute cloud-delivered threat data and centrally controlled and orchestrated by our BlueCat Address Manager IPAM solution. Threat Protection provides additional value to our customers without having to purchase or maintain additional appliances.”
Lawrence Orans and Jeremy D’Hoinne of Gartner write that, “The traditional defense in depth components are still necessary, but are no longer sufficient in protecting against advanced targeted attacks and advanced malware.” 1
BlueCat Threat Protection Empowers Enterprises to:
- Secure the business by stopping malicious activities in DNS before they can reach business-critical applications or data.
- Leverage core network services to add a new layer of security across all connected devices, both traditional and non-traditional.
- Take action based on up-to-the-minute data about known sources of malicious content including malware, botnets, exploits, viruses and spam delivered by the hosted BlueCat Security Feed.
- Configure policies to allow threat requests to be blacklisted, black-holed, redirected or whitelisted.
BlueCat Threat Protection can be quickly and easily added to existing BlueCat customers’ DNS servers or can be purchased as a stand-alone solution to quickly and easily augment the DNS infrastructure companies already have in place. The solution can also be integrated with leading SIEM solutions including IBM QRadar and HP ArcSight via pre-built connectors for immediate notification of a security risk.
BlueCat IP Address Management, DNS and DHCP solutions provide the foundation to build elastic networks that scale to match the ever-changing and unique demands on your infrastructure. We enable the reliability of your core network services and securely connect the people, physical devices, virtual machines and applications that drive your business. Enterprises and government agencies worldwide trust BlueCat to solve real business and IT challenges – from device on-boarding for BYOD to network consolidation and modernization to managing and automating virtualization, cloud and the Internet of Things.
PR and Community Manager, BlueCat
T: 1. 416.646.8400 ext. 308
1 Lawerence Orans and Jeremy D’Hoinne, “Five Styles of Advanced Threat Defense,” Gartner, August 20, 2013.
Customer situation brief on SUNBURST/Solorigate
Learn more about the attack via the SolarWinds Orion platform and how BlueCat products use DNS to help protect customers against compromises like it.
On the road to platform hardening, consider a STIG
Security Technical Implementation Guides standardize security configuration on networks, servers, and devices. BlueCat uses them and you can, too.
IT pros debate: Who should own DNS in the cloud?
Six networking pros dig into who should own DNS in the cloud during the third Critical Conversation on Critical Infrastructure hosted in Network VIP.
Flexibility and security can co-exist for the Red Cross
American Red Cross CISO Vikas Mahajan discusses flexible security strategies for front-line operations and his roadmap for moving toward a SASE model.