Roksit is now DNSSense

Time to start a new chapter!

We are delighted to announce our merger with our global operations’ brand, DNSSense, starting from April 10, 2023.

You can find all the information about Roksit at our new address, dnsssense.com

Welcome to the world of DNSSense!

Go to DNSSense
Detect malicious traffic on your network and get detailed reports.
Download and install DNSeye VM appliance
Get In Touch
Protect all your users at DNS level from harmful contents of the internet with the help of AI.
14 days free trial
Start Your Free Trial
Most advanced dynamic cyber threat intelligence for deep dive domain analysis.
No registration required
Get Your First Analysis
Solution by need

Protecting Remote and Roaming Clients

Problem

With the pandemic conditions, many people (especially in information technologies) have shifted to a remote working model. More and more people use their home broadband or public wi-fi to work. There is also a group of nomad professionals that are constantly travelling while working remotely.

The biggest cyber threat for companies is neither ransomware nor spam. The most significant threat factor for corporate networks is human error. And remote working exposes corporate networks to far more cyber threats than working in an office environment.

First, employees must be connected to the office network via VPN to ensure security. Connecting to the corporate network via VPN is not secure enough because it depends on an individual's discretion. The remote employee may choose not to connect to the VPN or forget, or the device may be used by an unauthorised person(child, spouse, friend, and-so-on.). However, even though people use the VPN meticulously for business use, they can also use the work computer for non-work purposes with the comfort of not being in the office. In this case, they might deliberately not connect to the VPN.

Public networks are another reason why remote working is more dangerous than working from a corporate network. Unauthorized individuals can gain access to files on network-connected devices or steal information with attacks such as "man in the middle" and "devil twins”, or other sniffing methods can be used to monitor incoming and outgoing packages. In addition to these risks, if the remote personnel's computer becomes infected, the employee and the company are unaware of it worsens all the effects and possible damages since organizations cannot monitor and analyze remote user's traffic unless connected to a VPN.

Roksit's Solution

Roksit Roaming Client Module is a feature of the Cloud-based DNSDome solution that provides DNS-layer protection and analyses DNS traffic on the device on which it is installed, regardless of the network being connected. The Roaming Client is the ideal solution for avoiding the risks associated with remote working previously mentioned. With Roksit Roaming Client, the cyber threat protection and monitoring continue outside the office as if the device were in the office. Remote workers can now securely connect to the internet at home or in public networks (café, airport, hotel) even when they are not connected to VPN, thanks to the Roaming Client.

Roaming Client features include :

  • It protects employees even if they are not connected to a VPN.
  • It takes no more than 10 minutes to deploy.
  • It encrypts DNS traffic using a method developed by Roksit. As a result, it does not have the drawbacks of DOH (DNS over HTTPS).
  • It can be easily managed remotely via the portal.
  • Kernel level protection prevents Roaming Client from being stopped or uninstalled without authorisation.
  • Instant traffic can be monitored with a maximum delay of 2 seconds for anywhere in the World.
  • Machine-based policies can be implemented for controlling and monitoring.
  • It also protects iOS and Android mobile devices, and it works on both Windows and Mac OS as well.