SlideShare une entreprise Scribd logo
1  sur  13
TitanHQ – 2017
Stop Malware
Before it stops you..
Agenda
•
Network
Threat
Challenges
•
•
How DNS
Protection
Helps
Why
WebTitan?
•
How DNS
Protection
Works
Summary
• • Benefits
• Q&A
2 Public
Network Threat Challenges
67%
experience
multi-vector
attacks
95%
experience
application
layer attacks
21%
experience
50+ attacks /
month
60%
see APT as
the #1 threat
3 Public
Your DNS infrastructure can be threatened by attackers.
Networks exploited by:
- Fast Flux DNS
- Drive by downloads
- Phishing
- Botnet Command and Control
Primary DNS Risks
Dom•in Narne
Registrar
For a fee, keeps
your "d ot-com "
or ''dot•org"
namefor you
Botnet Malware
• APTs
•
• DNS Changer Trojans
• Ransomware
DNS
Liveseverywhere
on theInternet ,
and tells all
Internet users
which web host
to talk to for
which domain
name inquiry
WHAT
IS
DNS?
Requests
yoursite.org
Customer
For a fee, keepsyour websfte
filesc1ndcod,e andpresents
it to Internet usersasappropriate
• Web users
5 Public
Web Threats Are Increasing
85°/o+
6 Public
Web Filtering Can Present Challenges
7 Public
What Successful Companies Are Doing
Securing their DNS
connection
Choosing DNS-based
solutions
Testing 2-3 vendors
Simplifying policies
8
Deploying an accurate web filter
Public
WebTitan Cloud - Complete DNS Protection
Stops DNS attacks by protecting the DNS connection
Filters high-risk sites with zero latency
Enforces acceptable web access
Gives visibility of web access /usage
Helps maintain staff productivity
Lowers risk, infections, and remediation costs
Reduces the number of malware threats
that infect the network by up to 90%
WebTitan Cloud - KeyFeatures
No hardware or software to install
Block malware, ransomware and viruses
Customisable Block Page
Multiple locations
Ondemand drill down reporting
Real-time categorisation of over 500 million websites,
6 billion web pages, in 200 languages.
100% coverage of the Alexa 1 million most visited websites.
Tablet
Laptop
Phone
Blocked
Yes/ No
DNSRequesttoWTC2
3 WTCchecks policy
4
1 UsersRequestWebsite
Wifi
-----------------D-N-S----------------------------A-c-ce-s-s-Request Point
Internet Safe Browsing Environment
“We block millions of websites per month and estimate that the average
user encounters 3 malicious links per day” - Neil Farrell, CTO, TitanHQ
We detect up to 60,000 malicious sites EVERY DAY
A purpose built solution to offer robust control and protection
to users, while being extraordinarily easy to set up and manage.
Why WebTitan Cloud DNS Filtering?

Contenu connexe

Tendances

IPv6 Threat Presentation
IPv6 Threat PresentationIPv6 Threat Presentation
IPv6 Threat Presentation
johnmcclure00
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
jgrahamc
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
John Jefferies
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
INFOTIME
 

Tendances (20)

What is ddos attack
What is ddos attackWhat is ddos attack
What is ddos attack
 
Kipp berdiansky on network security
Kipp berdiansky on network securityKipp berdiansky on network security
Kipp berdiansky on network security
 
IPv6 Threat Presentation
IPv6 Threat PresentationIPv6 Threat Presentation
IPv6 Threat Presentation
 
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksDDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacks
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Cloudflare Argo - Overview
Cloudflare Argo - OverviewCloudflare Argo - Overview
Cloudflare Argo - Overview
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
The Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksThe Anatomy of DDoS Attacks
The Anatomy of DDoS Attacks
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
 
Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
 
Cyber-Security Product
Cyber-Security ProductCyber-Security Product
Cyber-Security Product
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 

Similaire à DNS Security WebTitan Web Filter - Stop Malware

abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
Yankmo
 
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemInfoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Jennifer Nichols
 

Similaire à DNS Security WebTitan Web Filter - Stop Malware (20)

DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
 
DDosMon A Global DDoS Monitoring Project
DDosMon A Global DDoS Monitoring ProjectDDosMon A Global DDoS Monitoring Project
DDosMon A Global DDoS Monitoring Project
 
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemInfoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
 
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuDefeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam ObszyńskiPLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Clean dns enus
Clean dns enusClean dns enus
Clean dns enus
 
CleanDNS_enUS
CleanDNS_enUSCleanDNS_enUS
CleanDNS_enUS
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
Clean dns enus
Clean dns enusClean dns enus
Clean dns enus
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 

Plus de Dryden Geary

Plus de Dryden Geary (11)

Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
Making ArcTitan Email Archiving work with office365
Making ArcTitan Email Archiving work with office365Making ArcTitan Email Archiving work with office365
Making ArcTitan Email Archiving work with office365
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
WebTitan for Service Providers, Web Filtering for Service Providers
WebTitan for Service Providers, Web Filtering for Service Providers WebTitan for Service Providers, Web Filtering for Service Providers
WebTitan for Service Providers, Web Filtering for Service Providers
 
SpamTitan Cloud - email anti-spam and email filtering for business
SpamTitan Cloud - email anti-spam and email filtering for business SpamTitan Cloud - email anti-spam and email filtering for business
SpamTitan Cloud - email anti-spam and email filtering for business
 
ArcTitan Cloud - Email Archiving Solution
ArcTitan Cloud - Email Archiving Solution ArcTitan Cloud - Email Archiving Solution
ArcTitan Cloud - Email Archiving Solution
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
 
How Web Filtering For Wifi Works
How Web Filtering For Wifi WorksHow Web Filtering For Wifi Works
How Web Filtering For Wifi Works
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
 
How Cloud Web Filtering Works - Web Titan Cloud For WiFi
How Cloud Web Filtering Works - Web Titan Cloud For WiFi How Cloud Web Filtering Works - Web Titan Cloud For WiFi
How Cloud Web Filtering Works - Web Titan Cloud For WiFi
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

DNS Security WebTitan Web Filter - Stop Malware

  • 1. TitanHQ – 2017 Stop Malware Before it stops you..
  • 3. Network Threat Challenges 67% experience multi-vector attacks 95% experience application layer attacks 21% experience 50+ attacks / month 60% see APT as the #1 threat 3 Public
  • 4. Your DNS infrastructure can be threatened by attackers. Networks exploited by: - Fast Flux DNS - Drive by downloads - Phishing - Botnet Command and Control
  • 5. Primary DNS Risks Dom•in Narne Registrar For a fee, keeps your "d ot-com " or ''dot•org" namefor you Botnet Malware • APTs • • DNS Changer Trojans • Ransomware DNS Liveseverywhere on theInternet , and tells all Internet users which web host to talk to for which domain name inquiry WHAT IS DNS? Requests yoursite.org Customer For a fee, keepsyour websfte filesc1ndcod,e andpresents it to Internet usersasappropriate • Web users 5 Public
  • 6. Web Threats Are Increasing 85°/o+ 6 Public
  • 7. Web Filtering Can Present Challenges 7 Public
  • 8. What Successful Companies Are Doing Securing their DNS connection Choosing DNS-based solutions Testing 2-3 vendors Simplifying policies 8 Deploying an accurate web filter Public
  • 9.
  • 10. WebTitan Cloud - Complete DNS Protection Stops DNS attacks by protecting the DNS connection Filters high-risk sites with zero latency Enforces acceptable web access Gives visibility of web access /usage Helps maintain staff productivity Lowers risk, infections, and remediation costs Reduces the number of malware threats that infect the network by up to 90%
  • 11. WebTitan Cloud - KeyFeatures No hardware or software to install Block malware, ransomware and viruses Customisable Block Page Multiple locations Ondemand drill down reporting Real-time categorisation of over 500 million websites, 6 billion web pages, in 200 languages. 100% coverage of the Alexa 1 million most visited websites.
  • 12. Tablet Laptop Phone Blocked Yes/ No DNSRequesttoWTC2 3 WTCchecks policy 4 1 UsersRequestWebsite Wifi -----------------D-N-S----------------------------A-c-ce-s-s-Request Point Internet Safe Browsing Environment
  • 13. “We block millions of websites per month and estimate that the average user encounters 3 malicious links per day” - Neil Farrell, CTO, TitanHQ We detect up to 60,000 malicious sites EVERY DAY A purpose built solution to offer robust control and protection to users, while being extraordinarily easy to set up and manage. Why WebTitan Cloud DNS Filtering?