<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>When it comes to implementing security for your systems, of course, there are shortcuts you can take. But should you? Watch the video below as Paul walks you through the steps to protect your organization and your DNS with a PDNS implementation.</p> <!--more--> <p>&nbsp;</p> <div class="hs-embed-wrapper" data-service="youtube" data-responsive="true" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 853px; min-width: 256px; display: block; margin: auto;"><div class="hs-embed-content-wrapper"><div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.27%; margin: 0px;" data-mce-style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.27%; margin: 0px;"><iframe style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" xml="lang" src="https://www.youtube.com/embed/vSc-oiATDF8?rel=0" width="853" height="480" frameborder="0" allowfullscreen="allowfullscreen" data-mce-src="https://www.youtube.com/embed/vSc-oiATDF8?rel=0" data-mce-style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"></iframe></div></div></div> <p>&nbsp;</p> <p>There should be no shortcuts when it comes to protecting your security, your systems, your information, or your customers. There is too much information, the information is too invaluable, the damages can harm your business to where there is no coming back from it. Make sure you have the right tools in place to ensure that your systems are locked up tight so your customers can feel safe and you can rest at ease knowing your systems are secure.</p> <p>Don’t wait until it’s too late. Let <a href="/" rel="noopener"><span>ThreatST</span>OP</a> stop the threats before they reach your doorstep. Get in touch with one of our experts today to get you started. There’s no such thing as getting started too late, but there is such a thing as not starting at all!</p> <p>&nbsp;</p> <p style="font-weight: bold;">Learn More:</p> <p style="font-weight: normal;"><a href="/blog/protective-dns-pdns" rel="noopener" target="_blank">PROTECTIVE DNS SECURITY or PDNS: What You Need to Know</a><br><br><a href="/dns-defense-cloud" rel="noopener" target="_blank">DNS Defense Cloud</a><br><br><a href="/solutions/threatstop-dns-firewall-overview" rel="noopener" target="_blank">DNS Defense</a></p> <p style="font-weight: normal;">&nbsp;</p> <p style="font-weight: bold;">Video Transcripts</p> <p style="font-weight: bold;">Timestamps</p> <p style="font-weight: bold;"><span style="font-weight: normal;">0:00 Intro </span><br><span style="font-weight: normal;">0:05 Undesirable Content Forms</span><br><span style="font-weight: normal;">0:20 Steps To PDNS Implementation</span></p> <h2><span style="font-size: 16px;">0:05 Undesirable Content Forms</span></h2> <p>So how is this going to work? Well, the way it's going to work is that we're going to be able to take a look at incoming email SQL queries and web pages, and we're going to be able to pick out the bad guys, the ones I've colored here red. Why don’t we do that.&nbsp;<span style="font-weight: normal;"></span></p> <h2><span style="font-size: 16px;">0:20 Steps To PDNS Implementation</span></h2> <p>We'll talk about that but let's talk about a real PDNS implementation. These are the nitty-gritty details that kind of slow you down. The appropriate network, right criteria. Well, you might have to resegment your network. You don't have to deal with DHCP and DNS parameters. You don't know there's lots of organizations where people have come in and plugged in an access point into the network and there went the security of the network because all of a sudden there was an open access point that was there for convenience.&nbsp;<span style="font-weight: normal;"></span></p> <p>Knowing what's in your network is the first step. Getting the threat intelligence, again, there's a variety of sources for it. That's not the problem. The problem is being able to customize it to your environment and be able to get the continuous updates. Deploying the threat intelligence RPZ response policy zones is a semi-standard, but implementations vary a little bit. You have to process the results.</p> <p>You want to make sure that you don't export confidential info in the course of looking at the results. So if you ship your results off to a supplier to be examined and generate reports, well that means they know a lot about what's going on inside your network. That might or might not make you nervous, and then you got to incorporate what's learned.&nbsp;<span style="font-weight: normal;"></span></p> <p>Now you might sit back and say, well gee, this is all very complicated. I don't have the security staff and so forth and so on. The good news is that these tasks can, in some cases, be ignored, and in some cases, can be outsourced.</p> <p style="font-weight: bold;">&nbsp;</p></span>