CLICK TO SECURE YOUR WORKFORCE
Free Phishing Attack Simulator

Today’s threats are evolving at an exponential rate with new methods for distribution, infection, infiltration, and evasion. These new techniques are continually overcoming traditional cyber defences. Famous attacks such as WannaCry, Not-Petya were based on eternal blue that evaded all pattern and signature-based security solutions relying on DNS to communicate to external command and control servers. With DNSCyte such attacks can be stopped.
The Internet is becoming ubiquitous, and we live in a hyper-connected world. DNSCyte has indexed 99.9% of the Internet, which includes more than 1.7 billion web sites and 350 million top-level domains growing daily. With this intelligence, DNSCyte protects global businesses and users blocking malicious activity, including zero-day attacks. DNSCyte handles the DNS requests from users and redirects malicious requests to a sinkhole providing a new layer of security with artificial intelligence. The platform provides protection from malicious software like ransomware, C&C, spyware and others.
Product Benefits



Web Filtering

DNS Security (all ports and protocols)


VISIBILITY
Monitor and control Internet access for your entire organisation.
Enable secure Internet browsing. Block malicious activity and zero days attacks even when users are off premises.
User behaviour analysis integrated to DNS baselining with machine learning and artificial intelligence for automated classification and blocking.
Enforce corporate compliance to acceptable use policy and enabler for external regulations.
Frictionless access, self-service and self-enrolment increasing business productivity.












Monitor and control Internet access for your entire organisation.
Enable secure Internet browsing. Block malicious activity and zero days attacks even when users are off premises.
User behaviour analysis integrated to DNS baselining with machine learning and artificial intelligence for automated classification and blocking.
Enforce corporate compliance to acceptable use policy and enabler for external regulations.
Frictionless access, self-service and self-enrolment increasing business productivity.
How It Works
Deploy in minutes without making any change to your physical infrastructure.
Simply enable DNS Forwarding or DNS Relay.
DNS Forwarding



Every device and user accessing Internet sends a DNS query to the DNSCyte DNS Server.



DNSCyte DNS Server forwards the request to the DNSCyte Threat Intelligence Service.



If the resolved domain name has malicious content or access to the page is blocked in the defined policy the user is redirected to a secure web page for notification.



Information about the requested page is reported.


DNS Relay & Integration With Local DNS Server Platforms



DNS debug logs from domain name controllers or other DNS Server’s are analysed by DNSCyte on premise module.



System forwards the request to the DNSCyte Threat Intelligence Service for classification ans security check.



Response coming from DNSCyte Threat Intelligence Service is used to permit or deny Access.



System can send the response to a SIEM with customized fields in Syslog format.


*Hardware required only if an on-premise DNS Server integration is required.
Bind DNS
Citrix Netscaler
Product Highlights
Classification Within Seconds
DNSCyte machine learning technology enables the classification of unknown traffic in seconds.
DNS Tunnelling Discovery
Discovery of DNS tunnelling is now easy with DNSCyte.
Whitelisting for Internet
Only permit categorised Internet traffic to enable strong protection for zero-day attacks.
Analysis of DNS Debug Logs
Identify the source of malicious traffic by enabling the automatic analysis of internal DNS Server logs.
Malicious Activity Prevention
Protect your network against ransomware, malware, phishing, and botnet threats. Stop malicious activity before it starts communication.
Cloud Based Realtime Reporting
Get real-time visibility and centralised reporting without any on-premise component.
Digital Forensics
In depth digital forensics for users, devices and processes by supporting Inline and out of band operation support.
We're member of



We're member of


