DNS, DHCP & IP Address Management appliances
For Microsoft DNS & DHCP servers
For open source DNS & DHCP servers
Cloud-based visualization of analytics across DDI architecture
Manage multi-vendor cloud DNS servers centrally
RIR Declaration Management and Automation
Automated network device configuration and management
Centralized visibility over all your clouds
A single source of truth for your network automation
Why DDI is an Obvious Starting Point
DNS Threat Intelligence for proactive defense
Intelligence Insights for Threat Detection and Investigation
Adaptive DNS security for service continuity and data protection
Improve Application Access Control to prevent spread of attacks
Protect users and block DNS-based malware activity
Carrier-grade DNS DDoS attack protection
Optimize application delivery performance from the edge
for Proactive Network Security
Visibility, analytics and micro segmentation for effective Zero Trust strategy
Enable work from anywhere by controlling access, security and data privacy
Simplify management and control costs across AWS, Azure and GCP environments
Risk-free migration to reduce DDI complexity and cost
Move risk-free to improve performance, security and costs
Automate management, unify control and strengthen security of connected devices
Protect your network against all DNS attacks, data exfiltration and ransomware
Enable zero touch operations for network management and security
Improve resiliency, deployment velocity and user experience for SD-WAN projects
Integrated DNS, DHCP, IPAM services to simplify, automate and secure your network.
Simplify design, deployment and management of critical DDI services for telcos
Optimize administration and security of critical DDI services for healthcare
Simplify and automate management of critical DDI services for finance
Simplify and automate management of critical DDI services for higher education
Simplify and automate management of critical DDI services for retail
Simplify Management and Automation for Network Operations Teams
Elevate SecOps Efficiency by Simplifying Threat Response
Open architecture for DDI integration
Technology partnerships for network security & management ecosystems
Extend security perimeters and strengthen network defenses
Submit requests for temporary licenses
Submit access requests for EfficientIP knowledge platforms
Submit membership requests for EfficientIP Community
Strengthen Your Network Protection with Smart DNS Security
Customer-centric DDI project delivery and training
Acquire the skills needed to manage EfficientIP SOLIDserverโข
Identify vulnerabilities with an assessment of your DNS traffic
Test your protection against data breaches via DNS
Dedicated representation for your organization inside EfficientIP
Explore content which helps manage and automate your network and cloud operations
Read content which strengthens protection of your network, apps, users and data
Learn how to enhance your app delivery performance to improve resilience and UX
Why Using DNS Allow Lists is a No-Brainer
This enterprise-grade cloud platform allows you to improve visibility, enhance operational efficiency, and optimize network performance effortlessly.
Who we are and what we do
Meet the team of leaders guiding our global growth
Technology partnerships for network security and management ecosystems
Discover the benefits of the SmartPartner global channel program
Become a part of the innovation
The latest updates, release information, and global events
February 14, 2018 | Written by: Efficient IP | DNS Security, GDPR
Cyber SecurityData exfiltrationData protectionDNSGDPRMalwareRansomware
If you read the news, you may think the negative portrayal of General Data Protection Regulation in the media means the new regulation will be one of the worst edicts ever introduced. However, from your customerโs perspective, the new data law may look very different. GDPR is set to help organizations truly respect their customersโ information by protecting it from possible cyber breaches, often accomplished by hackers via the Domain Name System (DNS).
Industry research reveals it typically takes 99 days before a data breach is detected (FireEye M-Trends 2017). This means organizations have from today, 15th February – exactly 100 days before May 25th 2018 – to ensure they are GDPR compliant. Adhering to GDPR can bring brand and commercial benefits, and our new research reveals 72% of businesses worldwide are confident they have the right processes in place ahead of the regulation coming into force.
Perception is reality. It seems businesses have understood this urgency to look after their customers data ahead of the deadline and begun their preparations, spending up to $5 million per company so far, and 63% of them have already appointed a Data Protection Officer (DPO) according to our latest research.
The regulation has been framed around the location of the data subject, rather than the data controller or data processor, meaning this EU regulation has global impact. It is encouraging to see the US is the most confident about complying to the new rules and has spent more on average ($1,417,000) than the UK ($1,165,000) and Spain ($1,223,000), and nearly as much as France ($1,584,000) and Germany ($1,752,000).
The reporting element of GDPR requires notification to the supervisory authority within 72 hours of breach occurring if data has been stolen. At the moment, few companies are reporting breaches in public with only large-scale attacks reaching the general publicโs ears. Our 2017 survey data shows one-in-five (22%) of businesses worldwide has suffered a data exfiltration attack, and 18% have admitted to losing sensitive customer information. By notifying customers of any breach, regardless of scale or gravity, customers will have increased trust and loyalty to the company.
The number of data breaches last year proves legacy and current technology implemented are not working as well as they should, or as well as people think. A popular and relatively easy way for hackers to steal data is through data exfiltration by attacking the DNS Server.
A primary area to protect is DNS, as over 90% of current malware uses DNS (Cisco Security Report 2016). This is an easy vector for hackers to attack. As examples, the WannaCry and Petya ransomware attacks targeted different patches on network services that were not correctly secured. If hacked, the network service could be used as a vector of an attack because all legacy security solutions, such as firewalls, will be blind to exfiltration activity.
Around the world, 83% of organizations failed to apply all the necessary security patches, which made them vulnerable to future attacks. By first understanding how data can be accessed via DNS, businesses can better prevent more attacks from happening this year and remain compliant to data regulations like GDPR. More than one-in-three (38%) companies are putting top priority on DNS monitoring and analysis to help them comply with GDPR and protect them from emerging cyber threats.
Due to the billions upon billions of transactions occurring over a network at any time, exfiltrated data can be easily hidden amongst the normal operations of a DNS service. All customer-facing and internal applications use DNS, which means that most DNS servers are constantly busy. Requests used for DNS data exfiltration often go unnoticed, as they are blended in with the vast volume of traffic to appear like normal traffic.
The introduction of GDPR in May will be a major driving force for any business which holds data related to EU citizens to take greater care in safeguarding their customers’ data. In order to not only avoid heavy fines, but also strengthen brand reputation and customer trust, organizations should look to immediately fortify their cyber security strategies.
There is still room for improvement with 100 days to go to the GDPR deadline, but it is very encouraging to see the majority of businesses are confident they will comply in time. There is more to come from us on this subject.
When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.
Explore content highlighting the value EfficientIP solutions bring to your network
We use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site.