<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Everyone has their theory or understanding of how to protect themselves against threats and what you should install on your computer regarding security systems. Watch this video as Paul talks you through a few brief things on how ThreatSTOP can help protect your computer.</p> <!--more--> <p>&nbsp;</p> <div class="hs-embed-wrapper" data-service="youtube" data-responsive="true" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 853px; min-width: 256px; display: block; margin: auto;"><div class="hs-embed-content-wrapper"><div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.27%; margin: 0px;" data-mce-style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.27%; margin: 0px;"><iframe style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" xml="lang" src="https://www.youtube.com/embed/kln-IEcb_vM?rel=0" width="853" height="480" frameborder="0" allowfullscreen data-mce-src="https://www.youtube.com/embed/kln-IEcb_vM?rel=0" data-mce-style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"></iframe></div></div></div> <p>&nbsp;</p> <p>There is no easy way or one way to protect your systems. Technology is forever evolving. Hackers are becoming more and more savvy and finding new ways to hack and steal information. To be honest, most people don’t take the time or have the time to be vigilant about where they surf the internet or what sites they visit. Having the right protection in place can save you time and the headache of your systems being hacked.</p> <p>Let <a href="/" rel="noopener">ThreatSTOP</a> stop the threats before they reach you. Implementing a PDNS is step one. We can guide you to protecting your systems and your customer information and put your mind at ease. Don’t let the bad guys win. Contact us today while it’s not too late!</p> <p>&nbsp;</p> <p style="font-weight: bold;">Learn More:</p> <p><a href="https://app.hubspot.com/content-detail/2548414/blog-post/83153035008/performance" rel="noopener">What DNS Security Does A Typical Enterprise Need?</a></p> <p><a href="https://www.threatstop.com/dns-defense-cloud" rel="noopener" target="_blank">DNS Defense Cloud</a>&nbsp;</p> <p><a href="https://www.threatstop.com/solutions/threatstop-dns-firewall-overview" rel="noopener" target="_blank">DNS Defense</a>&nbsp;</p> <p>&nbsp;</p> <p style="font-weight: bold;">Video Transcript</p> <p style="font-weight: bold;">Timestamps</p> <p>0:00 Intro<br>0:05 Paul Mockapetris’ Theory<br>0:58 Device Integrations<br>1:20 Cloud Integrations<br>1:28 DNS/DOH Arguments &amp; The Future<br>0:05 Paul Mockapetris’ Theory</p> <p>Okay, so I'm going to tell you my theory about all of this, and that is that most customers should outsource it because they lack the network expertise and they lack the 24 by 7 coverage and they don't want to know about what the latest threats are. They just want them blocked and evaluated. That's the customers. <br><br>Now you as network operators, you know their systems. You know their network. You may decide that this is a profitable thing for you to do. You have the clue, you have the expertise, you have the customer relationships, and customers wanna do this. I guess my closing message to you is while I prefer you take advantage of our solution and become our customers, you should be making the internet safer with protective DNS regardless.<br><br>0:58 Device Integrations<br>Our device integrations, one of the things that's nice, if you decide to change equipment, so all you have to do is go back to our menu and tell us. With the new servers you are, we integrate with all of these to start. There's more, it's not a problem about the fact that you might have different types. We can do that.<br><br>1:20 Cloud Integrations<br>Of course we can deploy it in the cloud as well. <br><br>1:28 DNS/DOH Arguments &amp; The Future<br>And I think I'm going to close by just talking about some of the future questions here. There's this whole debate about DOH, which is the DNS tunneling through a secure https to a set of preferred providers. This is a complex subject. Browser manufacturers here are trying to get you to tunnel DNS queries over https and default to their selected providers. This makes doing protective DNS more difficult. <br><br>The other thing is that you can be sure that people like CloudFlare, who is in the business of delivering content, and CloudFlare is not alone. All the content providers content distribution networks are out there. They're not in the business of turning off the bad traffic that they have. They get paid per click so they really don't want to edit. They'll tell you that's freedom.<br><br>They'll also say that DNS privacy is security theater. I'm not going to deny that there are critics that say that. All I can say to you is it works in practice if not in theory. We have never deployed this and not found infections or things or customer concerns that don't need to be fixed.<br><br></p></span>