Nominum and Damballa Look to Increase DNS Security
February 26, 2013
By Jody Ray Bennett, TMCnet Contributing Writer
Today, Yahoo Finance reported that “Damballa announced a strategic partnership is Nominum (News - Alert) to deliver a tightly integrated version of the companies’ security offerings.”
The partnership represents two of the network security industry’s largest and most widely used companies, creating a one-stop solution for network professionals to monitor the safety of their networks.
Nominum’s N2 Platform offers network providers the ability to monitor a large amount of DNS data exchanges and generate reports help the providers to determine potentially hazardous subscribers. Once identified, the system can stop other users from connecting to the infected and contain the infected user from sending attacks to other users in the network.
The addition of the Damballa software will allow the Nominum platform to automatically detect the users infected with malware, making the network safer by eliminating infections more quickly.
The N2 Platform is capable of handling trillions of DNS connections daily, making its system highly expandable for continuously growing networks. The Damballa ISP monitoring software is compatible with PC, Mac, iOS Android (News - Alert) and UNIX-based networks for easy integration with limited system requirements.
The versatility of the Damballa system will allow it to easily be added to networks already running the N2 Platform – a big selling feature for the complete package now being offered by the merger.
Damballa is confident that its real-time detection solution will be able to significantly reduce the amount of data theft in its networks.
The consumer end has been historically responsible for network infection, either on purpose or by visiting other networks and returning with an unknown malware running in the background of their device. The potential for stopping malware from spreading by locking users out of network access is good, but the continuously evolving world of malicious software will make complete network security almost impossible.
Edited by Braden Becker
Article comments powered by
|