Everyone has their theory or understanding of how to protect themselves against threats and what you should install on your computer regarding security systems. Watch this video as Paul talks you through a few brief things on how ThreatSTOP can help protect your computer.

 

 

There is no easy way or one way to protect your systems. Technology is forever evolving. Hackers are becoming more and more savvy and finding new ways to hack and steal information. To be honest, most people don’t take the time or have the time to be vigilant about where they surf the internet or what sites they visit. Having the right protection in place can save you time and the headache of your systems being hacked.

Let ThreatSTOP stop the threats before they reach you. Implementing a PDNS is step one. We can guide you to protecting your systems and your customer information and put your mind at ease. Don’t let the bad guys win. Contact us today while it’s not too late!

 

Learn More:

What DNS Security Does A Typical Enterprise Need?

DNS Defense Cloud 

DNS Defense 

 

Video Transcript

Timestamps

0:00 Intro
0:05 Paul Mockapetris’ Theory
0:58 Device Integrations
1:20 Cloud Integrations
1:28 DNS/DOH Arguments & The Future
0:05 Paul Mockapetris’ Theory

Okay, so I'm going to tell you my theory about all of this, and that is that most customers should outsource it because they lack the network expertise and they lack the 24 by 7 coverage and they don't want to know about what the latest threats are. They just want them blocked and evaluated. That's the customers.

Now you as network operators, you know their systems. You know their network. You may decide that this is a profitable thing for you to do. You have the clue, you have the expertise, you have the customer relationships, and customers wanna do this. I guess my closing message to you is while I prefer you take advantage of our solution and become our customers, you should be making the internet safer with protective DNS regardless.

0:58 Device Integrations
Our device integrations, one of the things that's nice, if you decide to change equipment, so all you have to do is go back to our menu and tell us. With the new servers you are, we integrate with all of these to start. There's more, it's not a problem about the fact that you might have different types. We can do that.

1:20 Cloud Integrations
Of course we can deploy it in the cloud as well.

1:28 DNS/DOH Arguments & The Future
And I think I'm going to close by just talking about some of the future questions here. There's this whole debate about DOH, which is the DNS tunneling through a secure https to a set of preferred providers. This is a complex subject. Browser manufacturers here are trying to get you to tunnel DNS queries over https and default to their selected providers. This makes doing protective DNS more difficult.

The other thing is that you can be sure that people like CloudFlare, who is in the business of delivering content, and CloudFlare is not alone. All the content providers content distribution networks are out there. They're not in the business of turning off the bad traffic that they have. They get paid per click so they really don't want to edit. They'll tell you that's freedom.

They'll also say that DNS privacy is security theater. I'm not going to deny that there are critics that say that. All I can say to you is it works in practice if not in theory. We have never deployed this and not found infections or things or customer concerns that don't need to be fixed.