DNS (Domain Name System) is the phone book of the Internet. Computers use IP addresses to communicate across networks. Humans prefer names to numbers in the computing world, and DNS is used to map this connection. For instance, a domain name may be www.cloudcyte.com, and this translates to 188.8.131.52.
There are two types of DNS Servers. The first type, authoritative DNS, enables organisations to identify their presence on the Internet with a domain name. The domain name is mapped to an IP address on the DNS Server to allow Internet users to access the organisation’s web site and other services available online.
The second type of DNS Server is recursive DNS. Recursive DNS is a middle-man between the Internet users and the Authoritative DNS server.
When a user types an Internet address(URL) like www.cybercyte.com in their web browser, the address is sent to a recursive DNS server for resolution. The recursive DNS server then identifies the authoritative DNS Server, learns the IP address of the requested URL and responds. Without a recursive DNS, users cannot access any resource on the Internet.
Secure DNS is a recursive DNS Service based on global cyber threat intelligence and machine learning to block threats and targeted attacks in real-time.
DNSCyte is the secure DNS technology offered by CyberCyte. DNSCyte monitors and controls any access to the Internet enabling safe Internet browsing. Ability to block malicious activity and identify zero-day attacks even when users are off the premise is a significant feature of the solution.
User behaviour analysis is integrated into DNS baselining with machine learning and artificial intelligence for automated classification and blocking.
The system can enforce corporate compliance to acceptable use policy and act as an enabler for external regulations.
Classification Within Seconds
DNSCyte machine learning technology enables the classification of unknown traffic in
DNS Tunnelling Discovery
Malicious Activity Prevention
Protect the network against ransomware, malware, phishing, and botnet threats. Stop malicious activity before it starts communication.
Whitelisting for Internet
Analysis of DNS Debug Logs
Identify the source of malicious traffic by enabling the automatic analysis of internal DNS Server logs.
Cloud-Based Realtime Reporting
In-depth digital forensics for users, devices and processes by supporting Inline and out of band operation support.
Filter, categorise and audit DNS requests from users and devices for securing the Internet traffic.
In addition to our intelligence, we use a combination of paid and open source feeds all fed into our big data platform.
DNSCyte for Office 365 & Exchange enables the discovery of malicious activity in e-mail messages.
We're member of
We're member of