Roksit is now DNSSense

Time to start a new chapter!

We are delighted to announce our merger with our global operations’ brand, DNSSense, starting from April 10, 2023.

You can find all the information about Roksit at our new address, dnsssense.com

Welcome to the world of DNSSense!

Go to DNSSense
Detect malicious traffic on your network and get detailed reports.
Download and install DNSeye VM appliance
Get In Touch
Protect all your users at DNS level from harmful contents of the internet with the help of AI.
14 days free trial
Start Your Free Trial
Most advanced dynamic cyber threat intelligence for deep dive domain analysis.
No registration required
Get Your First Analysis

Download

Things of The Internet 2022 Global Cyber Domain Report

As roksit team, we are pleased to release this edition of our Cyber Threat Intelligence Report. All data is from the Roksit Cyber X-Ray® platform and is current (as of May 2022).
Download

Brochure

Roksit DNSEye Brochure
Download

Brochure

Roksit DNSEye Security Gap Brochure
Download

Brochure

Roksit DNSDome Brochure
Download

Reports and Analyzes Provided by DNSEye

In this document, the reports and analyzes provided by DNSEye will be explained.
Download

Case Study

Uskudar University Case Study
Download

Brochure

Roksit References
Download

Use Cases

Rule Based SIEM Integration

Save 95+ in DNS Log Processing Costs with Smart SIEM Integration
Download

Protecting Roaming Users

Protect users everywhere with advanced remote work security
Download

Detect DNS Tunnelling Attacks

Roksit uses heuristics and behavioural ways like impulsive increasing DNS query volumes or query numbers from per source IP to detect DNS Tunnelling.
Download

Detect Invisible Malicious Traffic

Approximately 85% of these domains do not have an IP address. Below is an example of a malicious traffic report found in a passive state.
Download

Detect Unblockable Malware Traffic on Your Network

DNSEye is focused on malicious software detection and response, infected device detection, the vulnerability analysis of security assets that exist in the network, and a detailed analysis of the whole network's DNS traffic regardless of its size.
Download

Find the Real Machine that Generates Malicious DNS Traffic

Client IP addresses vary, so they are not suitable for retroactive verification. They should be enriched with constant knowledge about computers and users.
Download

Collect Your DNS Log with Ease

Collecting DNS logs from different and distributed sources is very difficult. Although Companies spend time and effort to achieve this, a tiny part of them is successful.
Download

Defend From Firstly Seen Domains

The network is protected from Zero-Day attacks with Roksit’s ‘Positive Security Model’.
Download