New Cyber Defense Brand DeepSeas to Unite Newly Acquired Commercial Managed Threat Services Business from Booz Allen Hamilton with Security On-Demand. Learn More

ADVANCED DNS PROTECTION

First line of defence for threats on the internet

IDPS On-Demand

CISCO POWERED SECURITY

Nothing Kills Attacks Earlier than DNS-Layer Security

Security On-Demand’s IDPS On-Demand helps organizations protect against threats before they happen. Attackers are more frequently using the internet’s Domain Name Service (DNS) to hide and perpetuate attacks. By enforcing security at the DNS layer, this service stops threats before they ever reach your network or endpoints. Security On-Demand’s Advanced DNS Protection is built upon Cisco’s Umbrella proxy service along with unique protection enhancements provided by SOD’s ThreatWatch 5.0 Analytics Platform that provides advanced threat correlation, user target visibility, and identification of where the malware is hiding.

By analyzing and learning from internet activity patterns, IDPS automatically uncovers attacker infrastructure staged for current and emerging threats, and proactively blocks requests to malicious destinations before a connection is even established or a malicious file downloaded. Our IDPS service can also stop compromised systems from exfiltrating data via command & control (C2) callbacks to the attacker’s botnet infrastructure, over any port or protocol. Unlike appliance-based approaches, our proprietary cloud security platform protects devices both on and off the corporate network, and unlike agents, our IDPS Advanced DNS layer protection extends to every device connected to the network – even loT.

IDPS is easy and fast to deploy and depending upon your package, includes a mix of the protections described below.

MONITORING AND BLOCKING FEATURES:

AS PART OF THE SERVICE, SOD PROVIDES:

IDPS ON-DEMAND

By analyzing and learning from internet activity patterns, it automatically uncovers attacker infrastructure staged for current and emerging threats, and proactively blocks requests to malicious destinations before a connection is even established or a malicious file downloaded.

FOR MORE INFORMATION, DOWNLOAD OUR SERVICE OVERVIEW.

WE LOOK EVERYWHERE TO FIND ALL THE THREATS