Top Compliance Options: IP Defense, DNS Security, AWS WAF

Presented by

Paul Mockapetris, Chief Scientist at ThreatSTOP

About this talk

Maintaining compliance, whether to government sanctions or to other best practices standards, is a challenge to any business with an internet presence. Enforcement covers all aspects of internet-facing infrastructure, including firewalls, DNS servers, and cloud applications. Watch this video as the team from ThreatSTOP describes some of the top compliance options available today. IP Defense IP defense is the act of using firewalls or routers as filters based on IP addresses. Using IP defense allows your business to know when an infected device begins beaconing for instructions. Your business can then take immediate action to clean or reconfigure the infected machine. IP Defense is vital because it blocks both inbound and outbound attacks. DNS Security Content distribution networks, or CDNs, allow multiple websites to share the same set of IP addresses. This can be a problem for those businesses that block IP addresses because they are related to inappropriate or unsafe content. DNS security blocks domain names rather than IP addresses. Because of this, your business does not have to block needed information in order to safeguard against ransomware attacks just because both occupy the same IP. AWS WAF Businesses and individuals may choose to host websites on Amazon Web Services, or AWS. Amazon offers a service called WAF, which is short for Web Application Firewall. WAF provides an additional layer of protection that allows businesses to apply security policies and rules on their Amazon-hosted websites. Organizations must take cybersecurity seriously. However, many businesses do not have the time, knowledge, equipment, or staff to carry out accurate compliance options. This is where ThreatSTOP comes in. ThreatSTOP will help your company by protecting DNS, working with AWS WAF and defending your network at all times. ThreatSTOP can even customize security to fit your unique needs. Are you ready to stop the threats? Call ThreatSTOP!
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (40)
Subscribers (278)
ThreatSTOP was started in 2009 with a mission: Give organizations of any size the same cybersecurity protection that Fortune 1000 companies have. Few companies have the resources to curate threat intelligence feeds and update network devices to block real-time threats. ThreatSTOP automates network security, converting the latest threat data into enforcement policies, and blocking attacks before they become breaches.