The 2020 pandemic gave rise to a new type of remote work model that became very popular by virtue of its suitability for fulfilling employees’ needs.
Courtesy of DNSDome’s Roaming Client module, which provides cloud-based traffic analysis and security, the client’s DNS traffic will be analysed and DNS-layer protection will be granted to the client regardless of the network to which the device is connected.
With the conditions brought about by the pandemic, many employees, especially those in the IT industry, moved toward a remote working model. A number of working patterns began to appear: some preferred to connect to the internet and continue to work from their homes; some others opted for public Wi-Fi networks such as those in cafes, while others started to be on perpetual move through various cities and countries.
In this situation, people who work remotely cannot benefit from the security services that are deployed in their offices. Moreover, these people will probably store crucial information and files on their laptops/devices regarding their company. Therefore, they will be vulnerable to network hacking activities. If the client is connected to the internet in a public Wi-Fi, e.g. in a hotel, cafe, airport, they will be at the risk of sharing their connection with others and so their passwords and important data related to the company can be stolen by a man-in-the-middle (MIDM) attack.
In addition to the risks associated with network attacks, remote employees are vulnerable to phishing, e-mail spoofing, DNS spoofing, or any type of malicious activity on a large scale. Thus, if the device gets infected by any type of malicious activity, it would go unnoticed by the user and the company given the company’s inability to monitor the user’s traffic. What’s more, If the device becomes part of a botnet and carries out DGA domain requests, neither the company nor the user would be able to see and detect these requests.
In order to avoid the above-mentioned risks, remote workers are advised to use the Roaming Client module. This way, they will be able to connect to the Internet safely from public networks, as if they were connected to the Internet from the company’s office, thanks to the continued protection and monitoring provided by Roaming Client
The Roaming Client module is part of the DNSDome solution. First, you need to register on portal.dnssense.com
After registration, the local DNS servers should be directed to DNSSense’s DNS servers and the registered network’s public IP addresses be entered in the deployment section of DNSSense’s portal which can be reached on portal.dnssense.com. This process will take at most 10 minutes. Your DNS traffic will then be analysed and protected from malware by the DNSDome.
The Roaming Client module can be downloaded and deployed on devices that are part of the network on which DNSDome is deployed. This way, employees will be able to benefit from traffic analysis and protection regardless of the network to which they are connected. They may roam through the Internet safely without needing to connect to the enterprise network or to be physically present at the place where DNSDome is deployed.
Cyber security is a concept based on the security of digital assets. While enabling an information system to access data and information, it also covers all the security measures necessary to protect it from threats to the data and information in that system. Data threats can take many forms, such as cyber-attacks, data theft, and data modification.
The impact of the post-2020 pandemic has forever changed the world of enterprise security. Remote working, cloud-based technologies, and IoT concepts have changed the security structures of almost all enterprises.
DNSSense filters safe logs utilising template or custom rules. The EPS count is reduced by 95 percent as a result of this integration with the SIEM product, enabling you to save on the SIEM cost at the same rate.
Since 90% of a network’s traffic consists of secure traffic, the SOC teams do not need to analyze, compare and distinguish the malicious traffic among a huge number of logs. So this time-wasting process for SOC teams will be eliminated thanks to the filtration of DNSEye.