sb-nz logo
Story image

Bringing security to the next-level of networking

11 Dec 2018

When it comes to cyber crime, you may have heard that Australia is now the second most targeted country in Asia and the eighth most targeted in the world.

Meanwhile, New Zealand is quickly becoming infamous for its ‘she’ll be right’ attitude toward cybersecurity and is notoriously slow at detecting when things do go wrong.

“Australia and New Zealand have booming, healthy economies and are early adopters of cloud services - that means more potential attack points, rather than safety behind a traditional perimeter firewall,” says Infoblox A/NZ and ASEAN managing director Ken Pohniman.

“Companies have invested hundreds of millions of dollars in the best perimeter defence via traditional firewall companies, which means that one of the most vulnerable parts of most networks now is DNS.”

DNS, or the domain name system, is part of the next-level networking system that keeps the internet, and every service that uses it, alive. This system is collectively known as DDI (DNS, DHCP, and IP address management.)

To secure the next-level network, you need next-level security.

As the market leader in all things DDI, with over 50% of the global market, Infoblox knows a thing or two about keeping your network protected at the highest level.

“If you get malware on your network - and that's usually a ‘when’, not an ‘if’ - once it gains access, the next step is to get the data out. Here, we can help in two ways.

“One is our threat intelligence about all these bad domain names, we can block them at a DNS level - if the malware can never find the IP address of that server, the malware can't contact its command and control centre, that's what we call a DNS firewall.

“The next is that we can prevent exfiltration of data via DNS. The very first sign of bad things happening on the network is a DNS query, it's the only way they get out. We are that DNS server, so we can help filter that and we notify other security systems. We are managing DNS queries and we’re managing the IP addresses, so we see everything that's going on in a network. That's incredibly valuable information to other security systems like vulnerability scanners.”

Whatever data you need to keep secure - and with the advent of more and more stringent privacy and breach legislation across the globe you do need to keep it secure - Infoblox can act as a line of defence in an area that is being exploited at an increasing rate.

With the growth of the hyper-connected world, SD-WAN, cloud-based platforms and IoT, the need for Next-Level Security which sits at a point above it all is more pressing than ever.

“With IoT, one of the key aspects around security is visibility, knowing who is doing what and where they're doing it. A company’s security expert can’t see every IoT device employees are bringing in - this is what we call ‘Shadow IoT’,” explains Pohniman.

“The beauty of the Infoblox solution is that we operate in the control plane and at the DNS level, and every single device in your network - smartwatch, phone, light bulb, refrigerator - is connected to the internet and so needs to use DNS to get to the outside world. That gives us this unique ability to have full visibility of what is in the network and who, or what, is talking to who.”

Click here to find out if your network is secure at the core to prevent attacks and plug vulnerabilities across the spectrum.

Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
NortonLifeLock introduces dark web monitoring to its security suite
Dark Web Monitoring Powered by LifeLock will be capable of monitoring the dark web, searching for over 120 personal identifiable information including email, physical address, phone number, driver licence number, credit card or bank account numbers and gamer tags.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
NZX CIO David Godfey to resign by year's end
"David has been in the business for more than a decade, and has been a great contributor over that time - including through the challenges we faced this year due to COVID and the more recent cyber attacks where he has shown wonderful calmness and support of his teams.”More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More