Last updated on September 25, 2020.
BlueCat Threat Protection adds an additional layer of security for all devices across all applications to defend against malware, botnets and other attacks
TORONTO – May 28, 2014 – Recent well-publicized attacks have demonstrated that both traditional mobile devices and non-traditional devices such as Point of Sale (POS) systems are increasingly being targeted by malware, botnets and other attacks. To combat these growing threats that are pervasive to all devices, BlueCat, a leading provider of IP Address Management solutions, has released BlueCat Threat Protection for DNS/DHCP Server. BlueCat Threat Protection stops malicious activities in DNS before they can reach business-critical applications or data. The solution creates a ‘DNS firewall’ that blocks devices from ever accessing a known malicious site or host by providing rapid, cloud-delivered threat data updates to customers’ DNS infrastructure.
For more information on BlueCat Threat Protection or to request a demo please visit:
Leveraging DNS to Secure the Business
The growth in the number and type of new devices connecting to the network has exposed holes in typical enterprise security. Security solutions tend to focus on particular devices or protocols and cannot provide a broad-based solution that covers all devices and applications. All devices use the Domain Name System (DNS) to connect to applications and sites. BlueCat Threat Protection provides an additional layer of defense against malicious Internet content and infected devices.
“The explosion of network-connected devices is exposing businesses to new security threats and risks,” says Andrew Wertkin, CTO, BlueCat. “Not only do our customers need to secure traditional devices such as a desktops, laptops, smartphones and tablets, but also non-traditional devices including VoIP, Point-of-Sale systems, security cameras and RFID. The Domain Name System is a critical component of any defense in depth security strategy. BlueCat has delivered a DNS Firewall that is connected to up-to-the-minute cloud-delivered threat data and centrally controlled and orchestrated by our BlueCat Address Manager IPAM solution. Threat Protection provides additional value to our customers without having to purchase or maintain additional appliances.”
Lawrence Orans and Jeremy D’Hoinne of Gartner write that, “The traditional defense in depth components are still necessary, but are no longer sufficient in protecting against advanced targeted attacks and advanced malware.” 1
BlueCat Threat Protection Empowers Enterprises to:
- Secure the business by stopping malicious activities in DNS before they can reach business-critical applications or data.
- Leverage core network services to add a new layer of security across all connected devices, both traditional and non-traditional.
- Take action based on up-to-the-minute data about known sources of malicious content including malware, botnets, exploits, viruses and spam delivered by the hosted BlueCat Security Feed.
- Configure policies to allow threat requests to be blacklisted, black-holed, redirected or whitelisted.
BlueCat Threat Protection can be quickly and easily added to existing BlueCat customers’ DNS servers or can be purchased as a stand-alone solution to quickly and easily augment the DNS infrastructure companies already have in place. The solution can also be integrated with leading SIEM solutions including IBM QRadar and HP ArcSight via pre-built connectors for immediate notification of a security risk.
BlueCat IP Address Management, DNS and DHCP solutions provide the foundation to build elastic networks that scale to match the ever-changing and unique demands on your infrastructure. We enable the reliability of your core network services and securely connect the people, physical devices, virtual machines and applications that drive your business. Enterprises and government agencies worldwide trust BlueCat to solve real business and IT challenges – from device on-boarding for BYOD to network consolidation and modernization to managing and automating virtualization, cloud and the Internet of Things.
PR and Community Manager, BlueCat
T: 1. 416.646.8400 ext. 308
1 Lawerence Orans and Jeremy D’Hoinne, “Five Styles of Advanced Threat Defense,” Gartner, August 20, 2013.
EMA research found that cloud, automation, and security are the three primary drivers behind investing time or money in DDI technology. What drives you?
EMA research found three distinct stages of DDI maturity, with 65% of enterprises realizing the value of a full-stack DDI solution. Is yours one of them?
DDI maturity enables cloud migration, enhances security and resiliency, and accelerates network automation.
Integrity portfolio identified as flexible, scalable, automated, and supported by safe, secure migrations.