Blocks malicious website or destination, redirecting the user to a secure page
Continuous Monitoring
Monitors 24/7 to detect anomalies in functionality, user accessibility, traffic flows, and tampering.
Off-Network Protection
Supports agent-based DNS protection with individual endpoint devices on any network.
Guest Network Protection
Allows DNS filtering and protection for guest WiFi networks.
BYOD Protection
Supports bring-your-own-device (BYOD) users, supporting DNS protection across any device connected to a network or equipped with an agent.
Native DNS over HTTPS (DoH)
“DoH” is a protocol that facilitates DNS resolution via HTTPS. Native DoH functionality facilitates DNS over DoH using local agents to manage DNS requests, extending DoH beyond a single browser or network.
Functionality (3)
DNS Lookups
Associate information from various domains to identify associated parties and threats.
Threat Intelligence
Develops domain reputation by gathering contextual information related to web-based threats.
Advanced Traffic Filtering
Allows DNS routing to resolve requests across HTTP or HTTPs requests and/or covers IPv4 and IPv6 protocols.
Administration (5)
Whitelisting
The ability to green light a specific Domain or system to bypass the scanning process.
Policy Enforcement
Abilities to set DNS protection policy control standards including whitelisting, blacklisting, and application access.
Incident Reports
Produces reports detailing suspicious activity and anomalies related to networks and endpoints.
Domain Categorization
Allows administrators to group users and devices based on IP, Endpoint, or role.
Multi-Network Management
Allows centralized administration and control of DNS protection and policies across multiple networks.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.