A recent DNS security survey revealed that 46 percent of the respondents had been victims of data exfiltration and 45 percent had been subject to DNS tunneling—often used as a method of exfiltrating data—through DNS port 53.
With hackers using DNS to circumvent next-generation firewalls, IDSs, and IPSs, security teams need to shift their focus to DNS—a pathway which is often left open but can be used as an ideal point for blocking data exfiltration attempts.
This white paper explains how DNS can be used as a transport protocol for infiltration of rogue software and exfiltration of data. It also explains how Infoblox DNS Threat Analytics detects and automatically blocks attempts to exfiltrate data via DNS—without the need for endpoint agents or additional network infrastructure. Available as an option with Infoblox DNS Firewall and Infoblox Internal DNS Security, DNS Threat Analytics features:
Complete the form below to instantly download this white paper.