Skip to content

Compliance

Simplify SDN Deployments of User Networks with End-to-End Automation

Access networks are evolving as enablers of digital transformation In these times of digital transformation and cloud migration that tend to lower the workload in enterprise-owned datacenters, there is one topic on which network teams are putting strong focus: the access network. Deploying an access network is still challenging nowadays. It requires preparation time, configuring equipments and services, manipulating multiple technologies, and coordinating with other teams. All these actions imply major delays. Viewed from other business lines in the enterprise,...

Telcos Have Everything to Lose from DNS Attacks

Last month, telco service provider O2’s service went down across the UK. Users were unable to make calls, texts, or surf the internet. The outage lasted just 40 minutes as priority repairs were made. However, thousands of angry tweets were sent to the company in a scene that caused the company damage to its reputation. O2 is not likely to forget this, and neither will its customers, both existing and those that could have been. The cause of this particular...

Finance Firms Losing the Most in Battle Against DNS Attacks

Some of the world’s largest banks, including Santander, Lloyds Banking Group and HSBC, were targeted by DDoS-for-hire cyber attack website Webstresser last year, which attempted to launch DDoS attacks on their systems. These attacks cost some institutions hundreds of thousands of dollars. DDoS attacks, which seek to exploit the functionality of accessible DNS resolvers, rendering the server and its surrounding infrastructure useless, are a daily headache for many businesses, but the financial sector feels the sting more than most. EfficientIP’s...

Secure Your Network with DNS: Episode 3 – Ensuring Security Through Integrity

This blog is the third of four episodes which help describe best practices for utilizing DNS to protect your overall network. End users most likely don’t care much about the domain name resolution process. It simply works – otherwise they feel their internet connection is broken. Yet, DNS is the key component of their network directing them to the service/content they expect to reach. But could they detect a trap if they were being routed by a fake traffic officer?...

Universities Need to be Schooled in DNS

Educators have a lot to learn when it comes to cyber security. Domain Name System (DNS) threats are not just limited to banks and logistic multinationals anymore. Universities and academic institutions are capturing the attention of fast-learning cyber criminals for three reasons: they deal with sensitive data, they are populated by carefree students and they tend to have smaller IT budgets than com/universities-dns/mercial organizations. EfficientIP’s 2018 Global DNS Threat Report highlighted cost per DNS-based attack soared 68% to $690,000 in...

APAC Businesses Need to Give DNS More Tender Loving Care

The US is undoubtedly home to some of the world’s most valuable tech companies and is worthy of wearing the tech crown. However, the Asia Pacific region (APAC) is often seen as the fastest growing tech market in the world, and some of its innovations and investments are becoming large enough to make even the US goliaths tremble. The APAC market is expected to grow at 6% this year according to Forrester, with India taking the lead. The region is...

How to Overcome SIEM Limitations for Network Security

SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often in order to achieve compliance with security standards. But SIEM can do better, by leveraging correlated security events to trigger alerts and appropriate reaction from SOC (Security Operations Center) teams. Effective SIEM deployment benefits from all specialized network security components. Just like a manager delegating tasks to expert members of its team, the SIEM should delegate part of the analysis...

European businesses must work harder to keep DNS protected

European organizations seem somewhat neglectful of their data. Perhaps the first thing that comes to mind, is British firm Cambridge Analytica, who misused 87 million Facebook users’ data. How businesses value customer data is reflected in not only how they use that data, but what they do to protect themselves from breaches to their networks. Compromising the DNS is a popular way to exfiltrate data out of an organization. So, what steps are businesses taking to secure their networks? In...

Protect your DNS, protect your data

For the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes and behavioral responses of Domain Name System (DNS) threats and their potential effects on businesses globally. This year, our report found an increase in the number and cost of DNS-based attacks on businesses globally, as well as a failure from organizations to adapt security solutions to protect against these new, network-based attacks that aim to exploit DNS security. While the...

Data Theft: Why Firewalls Alone Cannot Protect You

Who nowadays is not worried their data will be used without their permission? Recent major data breaches, from Equifax to Facebook have accentuated consumer fears, and the introduction of data protection laws across all continents (GDPR in Europe, for example) are stressing out Data Protection Officers. The one bright light is that enterprises are finally realizing that legacy systems alone are inadequate for preventing data theft, and so are turning to more holistic approaches involving, in particular, innovative solutions offering...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface