DNS is the cornerstone of the Internet yet rarely is given a second thought when it comes to securing it against attacks and exploitation by malware. In 2013, Internet attacks against DNS servers grew 200%; and malware exploitation of DNS enabled major security breaches (e.g. NY Times, Facebook, etc.). If your DNS services are down or slowed, business revenue and productivity are impacted. Identification and mitigation is difficult because DNS applications don’t provide enough visibility into attacks and exploits. Additionally, traditional practices of over provisioning server capacity and manually maintaining blacklists no longer apply as it’s not possible to keep up with evolving threats.
In this webinar, Infoblox will share insights on how to secure external and internal DNS services against Internet-based attacks and malware exploitation. Centralized visibility on attacks and infected clients combined with automatic updates against evolving threats and malicious domains enable businesses to secure their DNS services.
RecordedFeb 20 201438 mins
Your place is confirmed, we'll send you email reminders
Jonathan Abbe, Security Product Managerment, Infoblox; Sam Kumasarmy, Senior Product Marketing, Infoblox
If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that means, you end up with gaps in your view of the threat intelligence and your defense across your infrastructure.
Join us for an upcoming webinar and learn how Infoblox Threat Intelligence Data Exchange (TIDE) can help you:
• Get what you need: Easily create threat intelligence data feeds to combine Infoblox’s high-quality data with the data you already have.
• Easily deploy data: Obtain, manage and distribute data across your infrastructure from a centralized point.
• Prevent malicious activity: Deploy threat intelligence directly within Infoblox DNS Firewall and other security technologies.
The developed world's global Internet registries have officially depleted their supply of free IPv4 addresses. IPv6 is not just the future—it’s already here (65% of Verizon’s traffic is over IPv6!). Some organizations even have their IPv6 allocations already. But since a single site assignment in IPv6 contains 1 trillion, trillion, addresses (or 279 trillion Internets!), designing an effective plan can be both intimidating and unnecessarily time consuming. With that many addresses, where do you start? Join us for this webinar as Tom Coffeen, Infoblox IPv6 evangelist and O'Reilly author of IPv6 Address Planning, discusses how to design, deploy, and successfully adopt an effective IPv6 addressing plan. Both IPv4 exhaustion and IPv6 adoption are real and happening now. Take the first step to realizing an effective IPv6 address plan and adoption strategy, and watch this webinar today.
More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
Cybercriminals are bypassing conventional security tools and increasingly using DNS — a business-critical but rarely protected service — to execute APTs, infect devices, and exfiltrate data. In 2014, according to Ponemon Institute, data breaches cost an average of $159 per record, impacting companies like eBay, JPMorgan Chase, and Sony Pictures. Can you afford to be next? Find out why you should be worried about APTs that exploit DNS — and how to defend your network.
Cricket Liu, Chief Infrastructure Officer, Infoblox; Dr. Paul Vixie, Chairman & CEO, Farsight Security Inc.
The Domain Name System (DNS) is a key building block of internet communications, which is fast becoming one of the top cyberattack vectors for external attacks on the infrastructure. In addition, APT and malware use DNS to connect to malicious domains or botnet controllers. Listen in as Cricket Liu, Chief Infrastructure Officer of Infoblox, and Dr. Paul Vixie, CEO of Farsight Security, present on common vulnerabilities and attack surfaces, different types of DNS threat vectors, as well as security strategies and configuration techniques to help mitigate risk. Don’t miss this opportunity to hear from the industry’s leading DNS thought leaders on the pivotal role DNS plays in securing the world’s digital infrastructure, watch now!
DNS is business-critical and an easy target for attack and exploitation. Daily news headlines tell of businesses hit hard by DNS-based DDoS attacks—stories about angry customers, lost revenue, and damaged reputations. In 2013, DNS-based attacks increased by 216%! With Forrester estimating the cost of a 24-hour outage at $27 million, can you afford to take your chances? Watch this webinar to hear Cricket Liu, author of DNS and BIND, share insights on why you should be worried about DNS-based DDoS attacks—and how you can make your DNS servers into their own best defense.
Cricket Liu, Chief Infrastructure Officer, Infoblox & John Pescatore, Director, SANS Institute
The Domain Name System (DNS) is a critical protocol in internet communications and is increasingly being focused on by hackers to launch advanced targeted attacks. Securing DNS assets is often overlooked in organizations efforts to protect IT infrastructures, since most legacy security technologies do not address the DNS security gap. As a result, man-in-the-middle attacks and denial-of-service attacks that severely impact business are common but are also easily avoidable. To change the present situation, network, data center and security experts as well as practitioners and executives need a better understanding of this threat and techniques to combat it. Watch this webinar to hear from the industry’s leading DNS thought leaders on how the Critical Security Controls are used to address these risks.
Corporate network complexity is growing beyond the reach of historically available tools. The need for accurate and dynamic IPAM is ever-growing. The IP address is the single, unique identifier for every object on the network, be it physical or virtual. The ranges of IP addresses define the networks themselves. Today’s need for IPAM goes beyond IP address tracking and allocation. With the ever-increasing size of today’s network, keeping track of multiple types of data pertaining to the devices connected across the network becomes increasingly complex. Watch this this webinar to gain insights into the evolution of IPAM and how this benefits enterprise IT teams.
If you’ve ever ventured into the network wilderness equipped only with manual processes, you know how challenging it can be to slog through a morass of unforeseen issues, one by one. While we applaud your pluck and fortitude, we’d like to suggest some innovative strategies.
Part 2 of the 2-part series will illustrate how Infoblox can help you use network automation to reduce costs, increase efficiency, and prevent human error. By using Infoblox NetMRI to intuitively manage layer-2 and layer-3 network devices, you’ll experience the joys of automated discovery and visualization, change and configuration management, and compliance and policy validation, enabling you to run a highly dynamic network infrastructure and ensure success.
Managing core network services in dynamic enterprise environments is a daunting task. In many organizations, data is created and maintained by different teams at different times with different data-collection objectives. IT teams using disparate tools and data sources burden the OPEX budget with inefficient workflow processes, less-than-optimal resource utilization, and an ever-looming risk of introducing errors. Network insight changes all of that.
Watch this webinar to see how Infoblox Network Insight can help you effectively manage your core network services with unprecedented visibility to the IPAM solution and enables integrated workflows that are shorter, more accurate, and based on authoritative data.
Arya Barirani, VP Product Marketing, Infoblox; John Kindervag, VP Principal Analyst, Forrester Research
The Domain Name System (DNS) is one of the fastest-growing vectors for online security threats, and most companies are not doing enough to secure their DNS. Watch our guest John Kindervag, Forrester Research’s expert in network security, and Arya Barirani of Infoblox share insights on: the current state of IT security, the importance of DNS and how vulnerable it really is, and best practices for managing DNS security.
If you've ever ventured into the network wilderness equipped only with manual processes, you know how challenging it can be to slog through a morass of unforeseen issues, one by one. While we applaud your pluck and fortitude, we'd like to suggest some innovative strategies. Part 1 of a 2-part series will illustrate how the latest technology in network automation can help you reduce costs, increase efficiency, and prevent human error.
Your enterprise needs a single repository where all data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronized. This actionable information enables your network team to quickly allocate and track the ever-growing network landscape and enables faster troubleshooting. Business data related to network resources helps bind together the logical network construct and the reality of your IT resources. Watch this webinar to see how Infoblox IPAM provides rich information that gives you centralized visibility and management of every network resource, advancing the concept of IP resource management.
DNS attacks have risen by 216% over the last year alone, which can have disastrous results. Businesses have incurred losses in revenue, customer satisfaction, productivity, and sensitive data because of them.
Cricket Liu, author of DNS and BIND, will be discussing the latest strategies to help you combat threats to your DNS infrastructure. He’ll share insights on how your name servers can disrupt communication between malware and command-and-control servers, as well as different types of attack vectors such as DDoS, cache poisoning, and amplification.
Keeping up with IP addresses and DNS records in your virtual environment can be a struggle. View this webcast to learn how Infoblox Trinzic® DDI plus VMware vCloud Automation Center can help you automatically scale services, reduce time to value, and utilize IT resources more efficiently.
Support your next-generation virtual data center by using vCloud Automation Center with Trinzic DDI to automatically provision and deprovision virtual-machine IP addresses in minutes. You’ll also get a chance to hear from a customer deploying Infoblox and VMware solutions in a production environment reaping significant operational benefits.
Srikrupa Srivatsan, Sr. Product Marketing Mgr. & Peter Rizk, Business Development Mgr.
Based on a recent survey conducted by Infoblox, more than 60% of IT administrators said they need an automated solution for IPAM/DNS for the cloud. In a private cloud, the compute and storage provisioning is automated but most of the time, IT still does the network provisioning for virtual machines manually. This is time consuming, error prone and takes focus away from higher value projects. Watch this webinar to learn how Infoblox enables full DDI automation in the datacenter with industry leading cloud orchestrators.
Rick Bylina, Sr. Product Marketing Manager, Infoblox
Bring your own device (BYOD) has a great effect on improving employee efficiency and reducing capital expenditure. At the same time, IT departments are challenged to maintain control and security in regards to corporate data. Watch this webinar to learn how Infoblox can detect all devices attempting to access your network, enforce corporate device policy, protect your network against malware and report on all BYOD activity.
Hear why enterprises today need more than they’re getting from the DNS and DHCP utilities that come bundled with Microsoft Servers. We’ll explore the process and benefits of implementing enterprise-grade DDI to enhance Microsoft services. Learn how you can achieve all these enhancements—with a solution that is 100% compatible with Microsoft roles and features.
Infoblox delivers Actionable Network Intelligence to enterprises, government agencies, and service providers around the world. As the industry leader in DNS, DHCP, and IP address management (DDI), Infoblox provides control, security, and analytical capability from the network core, empowering thousands of organizations to pursue the big initiatives driving business success today—next-generation data centers, security, compliance, and digital transformation—and achieve business outcomes such as increased efficiency and visibility, reduced risk, and better customer experience.