CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
SaaS DNS Security: Are you Protected?<br />
By Kanaiya Vasani, Executive Vice President, Products and Corporate Development at Infoblox<br />
Are Software as a Service (SaaS) security solutions truly the panacea they are publicized to be?<br />
The answer is, it depends on how the SaaS solution is architected. A majority of SaaS-only security<br />
solutions are “overlay” solutions that simply provide an additional layer of security on top of an enterprise’s<br />
existing network and security infrastructure. These overlay solutions are easy for the vendor to develop,<br />
but difficult for the customer to combine with other existing security solutions and derive value from. In<br />
contrast, a hybrid approach to security is one that tightly integrates SaaS solutions with an enterprise’s<br />
existing IT infrastructure and leverages SaaS capabilities to seamlessly extend and scale on-premise<br />
solution performance. With a hybrid solution, the vendor does the heavy lifting of seamless integration<br />
with existing infrastructure, thus providing a unified solution, which unlocks valuable context available<br />
from the on-premises infrastructure. Such context allows the hybrid solution to prioritize threats better. In<br />
addition, the unified solution enables sharing of data with broader security ecosystem for an efficient and<br />
optimized incident response.<br />
DNS as a Security Tool<br />
As enterprises gear up to handle the barrage of increasingly targeted and sophisticated cyber-attacks,<br />
security architects must take advantage of the visibility that each IT asset can provide. DNS is an<br />
excellent example of a scalable and pervasive network infrastructure protocol that offers unmatched<br />
visibility into network traffic patterns, malicious and otherwise. If used optimally, DNS can provide an<br />
affordable and scalable first line of defense for detection and mitigation of the vast majority of known<br />
threats. Behavioral analysis of DNS traffic can also serve as an “early warning system,” flagging potential<br />
zero-day threats in the network.<br />
116