No-cost, secure, and high-performance DNS

//No-cost, secure, and high-performance DNS

No-cost, secure, and high-performance DNS

Domain Name Servers (DNS) are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because although domain names are easy for people to remember, computers or machines access websites based on IP addresses.

TechBento DNS brings together cyber threat intelligence about malicious domains from variety of public and private sources and blocks access to those malicious domains when your system attempts to contact them.  When you use TechBento DNS, attackers and malware cannot leverage the known malicious domains to control your systems, and their ability to steal your data or cause harm will be hindered.

TechBento DNS is an effective and easy way to add an additional layer of security to your infrastructure for free. We are offering this to any customer with CloudBento infrastructure OR Cisco Meraki MX-series firewalls. 

How can we get started?

TechBento DNS actively monitors and checks domains accessed by your users.  Here is what you need to do to get started:

  • Verify you are eligible (you must have Cisco Meraki MX firewalls OR our CloudBento services)
  • Open a request from our support system via this link.
  • Advise your users that new security is being implemented and make sure you read (and understand) the next section.

In turn, we’ll activate TechBento DNS on your servers or routers and notify you the change took place.

The most important bit about implementation…

DNS monitoring and security happens outside of your network. If a website is blocked due to assumed malicious content, you may not receive a warning. Should your users experience trouble with accessing certain websites after TechBento DNS is activated on your router, they must know to visit our support portal and submit the full web address along with the error message or behavior so we can investigate it. All requests concerning white/black listing are dependent on our vendors and have no associated SLA guarantee.

 

 

By | 2019-07-12T13:43:25-05:00 April 2nd, 2018|Categories: Blogs|

Cybersecurity

Cybersecurity means protecting electronic devices and electronically stored information. Cybersecurity is a component of information security and addresses protection and restoration of information technology within an organization. All organizations are different and thus require different levels or protections. Likelihood is the chance that a threat will affect a business and serves as a guide in determining what protections should be put into place.

Readiness

Strategic thinking is at the heart of information security and each organization needs to meet demands of adequate security. Any company, big or small, should be capable of doing an inventory of all information technology assets and analyzing risks. For small organizations this can be as simple as understanding each asset’s confidentiality, integrity, and availability needs; rating it’s importance to the business and acceptable recovery points and time windows; and allocating resources for methodical solutions to the most important parts.