Skip to content

Videos

Integrating IT Processes Using IP Data Lakes

Follow Meg & Tom on their IT adventures in this episode focusing on central repository, IP source of truth and automation. Learn why integrating multiple data and enrich these with metadata helps automation, increase efficiency and transform the I&O usages.

See Also

Improving Application Access Control using Client Query Filtering

The Zero Trust approach intends to control which device can access which application, domains and services. Only using authentication opens the door to malware attacks. Deny-listing does not discriminate between clients and limiting access to specific devices at network level is very complex and costly using routers or firewalls. Granular control of which client can access which applications, domains and services requires filtering at the client level also called microsegmentation. In this video, you will learn how Client Query Filtering...

Helping SOCs Remediate Threats More Easily with DNS Security

Follow Meg & Tom on their IT adventures in this episode focusing on DNS events provided to SOC for optimized analysis and forensics. Sending only valuable events rather than all DNS logs is really important for SIEM tools and SOC teams, it avoid costs for analyzing and overwhelming flows for teams to manage.

See Also

Hacking Demo #4 Keylogger

Fourth educational video in our series on malicious hacking, where you will discover how to protect users and infrastructures against DNS-based malware.

See Also

Hacking Demo #3 Data Exfiltration

As the DNS protocol is authorized to go from the inside of the network to the Internet, some have found a way to use it to silently exfiltrate valuable data. Malware installed on a victim’s computer can use the DNS protocol to send the data using a simple encoding mechanism that requires nothing more than access to a recursive DNS server. Data Exfiltration via DNS can be very discrete- sending a few packets per day- or extremely intense- sending thousands...

Hacking Demo #2 Command & Control

This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection vector is an email attachment that a user opens. Once the malware installed on the victim’s computer, the DNS protocol is used to exchange information through standard requests and responses with the central CnC server. As DNS is a protocol authorized to cross all security...

Hacking Demo #1 Mail Infection

This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and can begin performing exfiltration, cryptomining or any other malicious activity. EfficientIP DNS Firewall helps to filter these bad behaviors, knowing that most (>90%) application access starts with a DNS query.

See Also

Improve Disaster Recovery Planning with DNS GSLB

Follow Meg & Tom in their IT adventures in this episode focusing on how a DRP can be a simple operation to prepare and execute with an Edge DNS GSLB solution. While application data controllers (ADC) are capable of distributing application traffic towards servers within the data center, a global server load balancing (GSLB) solution enhances this to cover multi-data center strategies. DNS combined with GSLB offers an easy and efficient way to simplify the required network operations. EfficientIP application...

Fighting Malware with DNS Security

Follow Meg & Tom in their IT adventures in this episode focusing on combating malware security risks and ransomware attacks. DNS should be leveraged, as it sees all client traffic intent.

See Also