Make malicious DNS activities visible with AI-powered analysis.
Get to know the advanced features of Roksit closely and protect your organisation from the threats of the cyber world!
Time to start a new chapter!
We are delighted to announce our merger with our global operations’ brand, DNSSense, starting from April 10, 2023.
You can find all the information about Roksit at our new address, dnsssense.com
Welcome to the world of DNSSense!
Get to know the advanced features of Roksit closely and protect your organisation from the threats of the cyber world!
Roksit DNSEye has been a major improvement over our security. The team was able to show all the benefits of the product with the POC. Security gap report was the key fact to start using the product as it shows what malicious connections went through from other devices. Integration with other security devices also help us to close these gaps easily.
Roksit helped us to get more visibility in our network. Before it was a great challenge to pinpoint an infected device we found from the DNS logs. With Roksit it takes a moment to find the infected machines. SIEM integration also allowed us to analyse DNS traffic with almost no extra EPS. It feels good to know that our DNS traffic is also protected.
Roksit DNSEye has had a profound impact on my business. It has allowed me to gain greater visibility into my network traffic and detect threats much more quickly. The solution has also helped me make informed security and performance decisions, resulting in a more secure and efficient network. I am extremely grateful for the positive impact that Roksit DNSEye has had on my business.
Why Should We Use DNS Level Protection?
Since the DNS Layer is at the bottom of the application layer. So, malicious traffic can be blocked at the DNS level before it starts. In addition, DNS is used by all protocols like HTTP, HTTPS, SMTP, and IoT. DNS traffic provides information about the application layer and your entire network.
Moreover, some malicious traffic can only be detected and prevented by DNS level protection. For example, 80% of malware domains currently do not have an IP address. Malware requests that do not have an IP address can only be detected in the DNS log. Or DNS tunnelling can only be prevented by DNS level protection.
Why is DNS visibility important?
With DNS level protection, you can prevent the attacks but cannot detect the actual machine that generates the malicious traffic. Client IP addresses vary, so they are not suitable for retroactive verification. They should be enriched with constant information about computers and users. DNS visibility lets you detect the device and user that generates related DNS queries. These actual device and user information is very important for SOC teams.
What Is The “Security Gap” Feature?
The “Security Gap” feature reports malicious traffic that the existing security devices (UTM Firewall, Proxy, DNS Firewall, etc.) cannot detect.
Security Gap simulates connecting to the malicious domain to test the security in the network by 3 different ways, Which are;
1- Test with DNS query from existing DNS server
2- Test with Http/Https request via the proxy server
3- Tests to reach a malicious domain with direct connection HTTP/HTTPS through Gateway.
DNSEye VM appliance in your network sends a malicious connection request to Roksit's cloud-based malicious simulation service, with a specific metadata.
Security Gap = Blocked, malicious traffic is blocked;
When Roksit's simulation service does not get the metadata, which means the malicious connection is blocked by the security, it is reported as the attack is blocked along with the information about which device (Proxy or UTM) successfully blocked the malicious traffic.
You Claim that You Categorize Better Than Other Companies. How Can You Prove This?
We use Cyber X-Ray, our own 100% artificial intelligence-based domain categorization platform. We monitor and store the entire internet historically and relationally up to five years back. We are so confident in this matter that we have added a feature called "Security Gap" to our "DNSEye" product. The "Security Gap" feature gives you a report that shows the malicious traffic your security devices miss. Thanks to this feature, you can easily see our added value to your company. In addition, we provide domain categorization services to the three firewall manufacturers in the world.
Can Roksit Detect Phishing Domains?
Yes. Thanks to its native AI classification platform, Roksit detects and blocks the domains used in phishing attacks in a short time.
What Is Your Licencing Model?
The products are sold with a one or three years ethical license. The number of licenses is the number of devices has access to the internet.
Can I Buy the Products Separately, or Are They All Purchased at Once?
“DNSEye”, “DNSDome”, and “Cyber X-Ray” are different products and can be purchased separately or together.