DNSEye detects malicious traffic on your network, and reports whether this traffic can be blocked by your other security devices.
Which SIEM Products Do You Have Integration With?
In addition to our direct integration with products such as IBM Qradar, Microsoft Archsight, and SPLUNK, We also have integration into any of your SIEM products that send data in SYSLOG format.
Why is DNS visibility important?
With DNS level protection, you can prevent the attacks but cannot detect the actual machine that generates the malicious traffic. Client IP addresses vary, so they are not suitable for retroactive verification. They should be enriched with constant information about computers and users. DNS visibility lets you detect the device and user that generates related DNS queries. These actual device and user information is very important for SOC teams.
Which DNS Products Do You Read With the “DNSEye” Product?
Microsoft DNS Server, Linux BIND Server, F5, CITRIX Netscaler, Efficient IP, Bluecat And common type of DNS servers
What Is The “Security Gap” Feature?
The “Security Gap” feature reports malicious traffic that the existing security devices (UTM Firewall, Proxy, DNS Firewall, etc.) cannot detect.
Security Gap simulates connecting to the malicious domain to test the security in the network by 3 different ways, Which are;
1- Test with DNS query from existing DNS server
2- Test with Http/Https request via the proxy server
3- Tests to reach a malicious domain with direct connection HTTP/HTTPS through Gateway.
DNSEye VM appliance in your network sends a malicious connection request to Roksit's cloud-based malicious simulation service, with a specific metadata.
Security Gap = Blocked, malicious traffic is blocked;
When Roksit's simulation service does not get the metadata, which means the malicious connection is blocked by the security, it is reported as the attack is blocked along with the information about which device (Proxy or UTM) successfully blocked the malicious traffic.
What Are the Advantages of Your Smart SIEM Integration?
Instead of forwarding all DNS data to SIEM, we can only forward domain queries for malicious domains to the SIEM product with real user and machine information. In this way, we can reduce the number of correlations required in the SIEM device and the number of EPS by 95%+. This reduction provides a significant reduction in the license cost of the SIEM product.