Cover your DNS blind spot. Enhance your security visibility.

March 11, 2015

You have a DNS blind spot. Even if you keep DNS server logs, your visibility is incomplete and fragmented. This happens when you have multiple internet service providers, branch offices with direct-to-internet connections, or mobile employees that just forget to turn their VPN on.

It’s bad because your SIEM lacks domain-level visibility. This prevents you from seeing all devices — on and off the network — compromised by attacks or violating policies.

We’ll discuss how to:

  • Gain visibility across all devices connecting to the internet using a global recursive DNS service
  • Integrate your SIEM with cloud log storage to retain all DNS logs for as long as required
Previous Video
What’s missing in your network security stack? DNS
What’s missing in your network security stack? DNS

DNS is used by every device on your network. But are you leveraging it in your security stack? DNS can see ...

Next Video
DNS blind spot
DNS blind spot

In “The DNS Blind Spot,” Dan Hubbard, Chief Technology Officer at OpenDNS, discusses how DNS, together with...