DNSCYTE

DNSCyte is a cloud based security platform based on DNS filtering. The system utilises global cyber threat intelligence and machine learning to block threats and targeted attacks in real time.

Today’s threats are evolving at an exponential rate with new methods for distribution, infection, infiltration, and evasion. These new techniques are continually overcoming traditional cyber defences. Famous attacks such as WannaCry, Not-Petya were based on eternal blue that evaded all pattern and signature-based security solutions relying on DNS to communicate to external command and control servers. With DNSCyte such attacks can be stopped.

The Internet is becoming ubiquitous, and we live in a hyper-connected world. DNSCyte has indexed 99.9% of the Internet, which includes more than 1.7 billion web sites and 350 million top-level domains growing daily. With this intelligence, DNSCyte protects global businesses and users blocking malicious activity, including zero-day attacks. DNSCyte handles the DNS requests from users and redirects malicious requests to a sinkhole providing a new layer of security with artificial intelligence. The platform provides protection from malicious software like ransomware, C&C, spyware and others.

Product Benefits

Stop Zero-Day attacks
Pre & Post infection protection

Web Filtering
DNS Security (all ports and protocols)
Next Generation protection using Machine learning & Artificial Intelligence
 VISIBILITY
Monitor and control Internet access for your entire organisation.

 PROTECTION
Enable secure Internet browsing. Block malicious activity and zero days attacks even when users are off premises.

 AUTOMATION
User behaviour analysis integrated to DNS baselining with machine learning and artificial intelligence for automated classification and blocking.

 COMPLIANCE
Enforce corporate compliance to acceptable use policy and enabler for external regulations.

RETURN ON INVESTMENT & TCO
Frictionless access, self-service and self-enrolment increasing business productivity.

 VISIBILITY
Monitor and control Internet access for your entire organisation.

 PROTECTION
Enable secure Internet browsing. Block malicious activity and zero days attacks even when users are off premises.

 AUTOMATION
User behaviour analysis integrated to DNS baselining with machine learning and artificial intelligence for automated classification and blocking.

 COMPLIANCE
Enforce corporate compliance to acceptable use policy and enabler for external regulations.

RETURN ON INVESTMENT & TCO
Frictionless access, self-service and self-enrolment increasing business productivity.

How it works

Deploy in minutes without making any change to your physical infrastructure.

Simply enable DNS Forwarding or DNS Relay.

?

DNS Forwarding

The DNSCyte Forwarding service handles all DNS requests for identification and categorisation of Internet traffic. DNSCyte redirects malicious requests to a preferred sinkhole IP Address. This enables malicious traffic to be redirected away from the internal network to a controlled destination for remediation.

Every device and user accessing Internet sends a DNS query to the DNSCyte DNS Server.

DNSCyte DNS Server forwards the request to the DNSCyte Threat Intelligence Service.

If the resolved domain name has malicious content or access to the page is blocked in the defined policy the user is redirected to a secure web page for notification.

Information about the requested page is reported.

Hardware Requirements: No hardware is required for this mode of operation.
R
Configure devices in the network to use DNSCyte DNS Servers. Necessary configuration changes are based on how DNS is configured within the organisation.
R
If a local DNS server is used, DNSCyte should be defined as the forwarder DNS on the local DNS Service.
R
When using a public DNS Service, configure the DNSCyte IP Addresses as the DNS Server in the DHCP settings.

DNS Relay & Integration With Local DNS Server Platforms

DNSCyte DNS Relay is a VMWARE/Hyper-V based image provided to discover the source of the malicious traffic. DNS relay is a DNS Server that is installed on the corporate network receiving DNS queries before the local DNS Server then forwarding them to the local DNS Server after analysis.

DNS debug logs from domain name controllers or other DNS Server’s are analysed by DNSCyte on premise module.

System forwards the request to the DNSCyte Threat Intelligence Service for classification ans security check.

Response coming from DNSCyte Threat Intelligence Service is used to permit or deny Access.

System can send the response to a SIEM with customized fields in Syslog format.

Hardware Requirements: A virtualised appliance with VMWARE ESX or Microsoft Hyper-V with 12 virtual cores, 24 GB RAM and 250 GB HDD for up to 10,000 users.
*Hardware required only if an on-premise DNS Server integration is required.​
DNSCyte can also integrate with the following platforms in identifying the source of the malicious traffic without relaying the DNS traffic:
R
Windows DNS
R
Bind DNS
R
Citrix Netscaler
R
F5
R
Infoblox

Product Highlights

Classification Within Seconds

DNSCyte machine learning technology enables the classification of unknown traffic in seconds.

DNS Tunnelling Discovery

Discovery of DNS tunnelling is now easy with DNSCyte.

Whitelisting for Internet

Only permit categorised Internet traffic to enable strong protection for zero-day attacks.

Analysis of DNS Debug Logs

Identify the source of malicious traffic by enabling the automatic analysis of internal DNS Server logs.

Malicious Activity Prevention

Protect your network against ransomware, malware, phishing, and botnet threats. Stop malicious activity before it starts communication.

Cloud Based Realtime Reporting

Get real-time visibility and centralised reporting without any on-premise component.

Digital Forensics

In depth digital forensics for users, devices and processes by supporting Inline and out of band operation support.

CloudCyte is a zero-trust security platform for protecting on-premise and remote users 24/7.
R
Integrated platform with an unprecedented level of simplicity, scalability, and threat discovery.
R
Complete protection by securing Internet and e-mail activity for the end-user.
R
Simple deployment with no maintenance overhead.
R
Better interaction with the end-users for increased awareness.
CloudCyte provides free phishing attack simulator up-to 250 users and free trial of all features for thirty days.
We're member of