theDocumentId => 1279200 OpenDNS Cuts Through Security Noise Overload to ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

7/8/2014
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

OpenDNS Cuts Through Security Noise Overload to Pinpoint Targeted Attacks

New Functionality Provides Insights to Prioritize Incident Response, Using Context From Predictive Intelligence Based on Global Traffic Patterns

SAN FRANCISCO, July 8, 2014 - OpenDNS, a leading provider of cloud-delivered security, today announced that it has launched new capabilities to protect enterprises from targeted attacks. By serving more than 50 billion requests a day from users in over 160 different countries, OpenDNS is uniquely positioned to monitor malicious traffic during the earliest stages of emerging attacks. With this new context, enterprises now have visibility into the targeted nature of an attack by comparing their traffic to activity on the entire OpenDNS Global Network. OpenDNS also provides predictive intelligence about the infrastructure of the attackers’ networks—before they launch a new attack. This capability enables OpenDNS customers to preemptively block bad network connections before they can do damage.

According to Gartner, Inc.: “Most security teams cannot detect and react fast enough to targeted attacks with the tools they have. However, there is an emerging market of dedicated solutions that can enable security teams to more thoroughly prevent, detect and respond to sophisticated attacks.”

OpenDNS is hosting the webinar, “Combat Targeted Attacks,” on July 16 at 10am PT, 1pm ET. To learn more or to join the discussion on this new OpenDNS solution, please click here.

OpenDNS Cuts Through the Noise

High-volume, single-stage attacks typically pose relatively lower risk to an organization and can distract a company from more critical issues that need immediate attention. The “noise” generated by these high-volume incidents amplifies the difficulty of detecting the most damaging attacks—those that are multi-staged and highly targeted. OpenDNS provides security teams with the context and visibility needed to detect emerging, targeted attacks, significantly reducing discovery and remediation time. Here’s how it works:

 

1.    OpenDNS reports on all security activity in real-time and provides the ability to view global, Internet-scale security insight on a per event basis.

 

2.    This reporting functionality allows organizations to easily identify threats with a large global traffic footprint as well as those that are being exposed for the first time. These serve as early indicators that a company may be the target of an emerging or ongoing attack.

 

3.    To simplify investigation and remediation efforts, OpenDNS pinpoints which devices, networks and users sent requests to the malicious domain in question.

 

4.    Finally, this global context can be used to predict and prevent future targeted threats by exposing and blocking inactive malicious infrastructure that is being prepared to launch new attacks.

“Enterprises today are challenged to keep up with the volume of attacks that are targeting their networks. Not only is the efficacy of today’s security tools declining, but when they do identify a threat they lack the context that is critical to blocking it,” said Dan Hubbard, CTO of OpenDNS. “The ability to determine the relevance and prevalence of an attack is key to prioritizing response, remediating infected hosts, and understanding the scope of the threat.”

Availability

These capabilities are available immediately as part of the OpenDNS Umbrella security service. Subscription pricing is based per user, per year. Try it today—sign up for a free trial— https://signup.opendns.com

 

Resources

Umbrella Product Overview: http://bit.ly/1nkmmGh

Security Insight Screenshot: http://bit.ly/1lWtNWg

 

About OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

 

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.