TCPWave IPAM Approach To PDNS

Strengthening security posture and safeguarding networks with protective DNS

TCPWAVE

Minimize risks and maximize efficiency with TCPWave's DDI solution.

Paul Mockapetris's invention of the Domain Name System (DNS) in 1983 did not initially consider its security implications. As technology evolved, the system became vulnerable to exploitation, leading to attacks on targets utilizing this infrastructure. Over time, various security frameworks and standards have been implemented to address these vulnerabilities. One of the recent cybersecurity best practices recommended by the National Security Agency (NSA) and Cybersecurity Infrastructure Security Agency (CISA) is the adoption of Protective DNS (PDNS) solutions.

PDNS is a defensive measure that examines DNS queries to identify potential threats and takes appropriate preventive measures. By leveraging the existing DNS protocol and architecture, PDNS mitigates potential damages caused by malware attacks and malicious operations. Securing DNS interactions between clients and servers is a critical aspect of internet security. Users often mistype domain names, unintentionally accessing malicious websites instead of their intended destination. Malicious actors also employ phishing techniques, embedding malicious links within emails. Furthermore, compromised devices can be controlled remotely, leading to data exfiltration. Rapidly detecting and preventing resolution of domain names associated with harmful content safeguards individual users and enterprises.

Enhanced Security Posture

Enhanced Security Posture

  • By implementing a centralized threat management system that collects data inputs from multiple global contributors, organizations can elevate their security posture and overall level of protection.
Instant Blocking of Malicious Queries

Instant Blocking of Malicious Queries

  • PDNS ensures that known malicious queries are blocked instantly upon their addition to the threat intelligence list. This proactive approach prevents potential security breaches.
 Outbound DNS Traffic Control

Outbound DNS Traffic Control

  • Empower administrators with RPZ policies to control outbound DNS traffic, ensuring informed decisions on recursive searches for malicious domains.
Protective DNS Domain Classification
  • Phishing

    Domains used in social engineering techniques to obtain sensitive information by posing as trustworthy entities. PDNS protects users from accidentally accessing potentially malicious links, including typosquats or look-alike domains.

  • Malware Distribution and Command & Control (C2)

    Websites known to host malicious content or serve as command and control infrastructure for malware. PDNS can block and alert on known malicious connection attempts.

  • Domain Generation Algorithms (DGA)

    Websites with programmatically generated domain names used by malware to evade static blocking. PDNS identifies and tags domains associated with known DGA attributes, providing protection against advanced malware.

  • Content Filtering

    PDNS can categorize domains based on specific content categories that violate an organization's access policies. While an ancillary benefit, this capability helps identify and block domains that pose a risk to the environment.

tcpwave
tcpwave
Actions
  • PDNS servers respond to malicious requests in the following ways:

    NXDOMAIN

    The client does not receive an IP address to connect to.

  • NODATA

    The requested name exists, but the type does not match.

  • PASSTHROUGH

    The DNS server cascades the response back to the client, even if the requested domain appears malicious. Administrators may use this policy to meet specific business requirements.

  • REDIRECT

    The client is redirected to another domain, which can serve as a warning page indicating an attempt to access something malicious.

Protective DNS Solutions from TCPWave
  • Threat Intel Integration

    Integration with leading threat intelligence providers to collect data feeds

  • Robust Firewall Defense

    Effective firewall capabilities that detect and block threats, data exfiltration, phishing attempts, ransomware, and advanced threats such as DGA and look-alike domains.

  • CEF Audit Logs

    Production of audit log files compliant with the Common Event Format (CEF) standard, facilitating processing by Security Information and Event Management (SIEM) systems.

  • Accelerated Threat Response

    Support for forwarding logs to security systems like IBM QRadar, Splunk, and Apache Flume, enabling quick threat detection and response.

tcpwave

TCPWave's security solution empowers customers to manage and modernize their enterprise-grade solutions while minimizing risks. To experience a quick demonstration, please contact the TCPWave Sales Team.