{"id":13322,"date":"2026-04-15T07:55:09","date_gmt":"2026-04-15T14:55:09","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=13322"},"modified":"2026-04-14T12:18:55","modified_gmt":"2026-04-14T19:18:55","slug":"protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/","title":{"rendered":"Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security"},"content":{"rendered":"<p>For years, internet service providers have offered a range of consumer security services. These have typically focused on the endpoint and the home: secure residential gateways, parental controls and bundled antivirus or identity protection services.<\/p>\n<p>What they have not historically done is treat the network itself as the primary enforcement point for security.<\/p>\n<p>That is now changing.<\/p>\n<p>Cybercrime has industrialized. Online fraud and scams are no longer edge cases. They are everyday risks for consumers. At the same time, governments, once cautious about intervening in internet traffic, are increasingly expecting networks to play a more active role in protecting users.<\/p>\n<p>This is where <strong>Protective DNS (PDNS)<\/strong> is gaining momentum.<\/p>\n<p>According to the latest <a href=\"https:\/\/insights.infoblox.com\/resources-research-report\" target=\"_blank\">HardenStance Briefing: Telco Strategies for Consumer Security<\/a> report, PDNS is now the fastest-growing consumer security service offered by ISPs. It leverages a control point telcos already operate at scale, DNS, to stop threats before a connection is ever established, without requiring any change in user behavior.<\/p>\n<h3>A Natural Enforcement Point<\/h3>\n<p>Protective DNS applies threat intelligence directly to DNS queries, preventing users from resolving domains linked to malicious activity or unlawful content.<\/p>\n<p>Because every online interaction begins with DNS, it creates a universal enforcement point. Whether a user clicks a link, installs an app or connects a device, DNS is involved.<\/p>\n<p>By embedding intelligence at this layer, telcos can block:<\/p>\n<ul class=\"list-spacing\">\n<li>Phishing and scam domains<\/li>\n<li>Malware distribution sites<\/li>\n<li>Command-and-control infrastructure<\/li>\n<li>Illegal or regulated content<\/li>\n<\/ul>\n<p>All of this happens transparently, without requiring software on the device or any action from the user. Security becomes part of the network itself.<\/p>\n<p>HardenStance notes that telcos are increasingly combining endpoint protection, router-level controls and network-based security, with DNS emerging as a critical layer in that architecture.<\/p>\n<h3>Why DNS, and Why Now?<\/h3>\n<p>DNS is not a new technology, but its role is evolving.<\/p>\n<p>From a technical standpoint, it is already ubiquitous and highly scalable. From a business standpoint, it sits at the intersection of two growing pressures.<\/p>\n<p>The first is regulatory. Governments are introducing requirements around content blocking, online safety and cybercrime prevention, areas where DNS provides an efficient enforcement point.<\/p>\n<p>The second is commercial. Consumers are increasingly concerned about scams, fraud and identity theft, creating demand for services that provide meaningful protection.<\/p>\n<p>HardenStance forecasts steady growth in telco investment in consumer security, with spending expected to reach over <strong>$600 million<\/strong> by the end of the decade, reflecting both rising demand and increasing regulatory pressure.<\/p>\n<p>This combination is turning DNS into more than infrastructure. It is becoming a platform for consumer security services.<\/p>\n<h3>Regulation Is Raising the Stakes<\/h3>\n<p>The shift toward Protective DNS is being accelerated by changes in government policy.<\/p>\n<p>Countries such as Ukraine, Estonia and Latvia have already implemented national PDNS services. In the United Kingdom, initiatives like the National Cyber Security Centre\u2019s (NCSC) Share and Defend and legislation such as the Online Safety Act reflect a broader move toward active intervention.<\/p>\n<p>The scale of the problem is driving this shift.<\/p>\n<p>Global scams are estimated to cost as much as <strong>$1 trillion annually<\/strong>,<sup>1<\/sup> with fraud accounting for a significant proportion of all crime in some markets. In the United Kingdom, for example, fraud represents around 40 percent<sup>2<\/sup> of all reported crime.<\/p>\n<p>Against this backdrop, expectations are changing. Networks are no longer seen as neutral conduits. They are increasingly expected to act as a line of defense.<\/p>\n<h3>From Obligation to Opportunity<\/h3>\n<p>For telcos, this creates a strategic choice.<\/p>\n<p>They can take a reactive approach, implementing controls only when mandated. But this turns security into a cost center, adding operational burden without creating differentiation or revenue.<\/p>\n<p>They can participate in government-led initiatives, which may ease access to threat intelligence but still leave the telco responsible for delivery and ongoing costs.<\/p>\n<p>Or they can take a more proactive path: using DNS as the foundation for consumer security services that not only meet regulatory requirements, but exceed them.<\/p>\n<p>This is where PDNS becomes compelling. It offers a way to turn compliance into capability, and capability into opportunity.<\/p>\n<h3>The Intelligence Challenge<\/h3>\n<p>The success of this approach depends on one critical factor: threat intelligence quality.<\/p>\n<p>Low-quality or generic feeds introduce false positives, miss emerging threats and ultimately erode trust. At carrier scale, accuracy and coverage are non-negotiable.<\/p>\n<p>What\u2019s required is DNS-native threat intelligence designed specifically to analyze how cybercriminal infrastructure operates and evolves.<\/p>\n<h3>Disrupting Cybercrime at Scale<\/h3>\n<p>Modern cybercrime is not a collection of isolated attacks. It is an ecosystem.<\/p>\n<p>Domains used for scams, phishing and malware are created and discarded at high velocity. These are the disposable assets that victims encounter.<\/p>\n<p>But beneath them sits a shared, persistent infrastructure that enables cybercrime to operate at scale.<\/p>\n<p>At Infoblox, this infrastructure has been attributed to distinct DNS threat actors, groups that build and operate the systems that underpin large-scale cybercrime. These actors provide the ecosystem that allows campaigns to be launched, scaled and repeated with high efficacy.<\/p>\n<p>This infrastructure does more than deliver malicious content. It enables attackers to profile victims in real time, increasing success rates while also obfuscating activity from security researchers and traditional defenses.<\/p>\n<p>The rise of AI-driven scams is accelerating this further, enabling attackers to scale operations and refine targeting in ways that traditional defenses struggle to match.<\/p>\n<p>DNS sits at the center of this ecosystem.<\/p>\n<p>By analyzing DNS activity at scale, it becomes possible to identify not just individual domains, but the infrastructure patterns and threat actors behind them. This enables a shift from reactive blocking to proactive disruption.<\/p>\n<p>At Infoblox, this has been described as targeting the \u201cdrone factory\u201d of cybercrime: not just the outputs, but the machinery and operators that produce them.<\/p>\n<p>For telcos, this is a critical shift. It means protection is no longer about chasing individual threats. It is about degrading the infrastructure that enables them.<\/p>\n<h3>Unlocking the Value of DNS Data<\/h3>\n<p>Telcos already possess one of the most valuable datasets in cybersecurity: DNS telemetry at scale.<\/p>\n<p>Historically underutilized, this data can enhance detection, improve accuracy and contribute to broader intelligence ecosystems. It also creates an opportunity for telcos to move beyond consuming intelligence to generating it.<\/p>\n<p>If data is the \u201cnew oil,\u201d DNS data is one of the richest untapped reserves.<\/p>\n<h3>What Comes Next<\/h3>\n<p>The direction of travel is clear.<\/p>\n<p>Cybercrime is growing in scale and impact. Governments are increasing expectations. Consumers are demanding better protection.<\/p>\n<p>Protective DNS sits at the intersection of these forces.<\/p>\n<p>What was once limited to a small number of large operators is now expanding globally, with telcos in both developed and emerging markets adopting DNS-based security at scale.<\/p>\n<p>For telcos, the opportunity is significant, but so is the risk of inaction.<\/p>\n<p>Those that move early can define the market, build differentiated services and strengthen their role in the digital ecosystem. Those that wait may find themselves implementing security under pressure, with limited ability to compete.<\/p>\n<p>DNS is no longer just infrastructure.<\/p>\n<p>It is becoming the platform for consumer security.<\/p>\n<h3 class=\"footnotes\">Footnotes\/References<\/h3>\n<ol class=\"footnotes-listing\">\n<li>GASA Global State of Scams Report: $1T Lost to Scams. Harris, Robert. Feedzai. November 16, 2024. <a href=\"https:\/\/www.feedzai.com\/blog\/gasa-global-state-of-scams-report-1t-lost-to-scams\/\" target=\"_blank\">https:\/\/www.feedzai.com\/blog\/gasa-global-state-of-scams-report-1t-lost-to-scams\/<\/a><\/li>\n<li><a href=\"https:\/\/www.feedzai.com\/resource\/global-state-of-scams-report-2024\/\" target=\"_blank\"><strong>https:\/\/www.feedzai.com\/resource\/global-state-of-scams-report-2024\/<\/strong><\/a> Crime in England and Wales: year ending September 2025. Office for National Statistics (ONS) Centre for Crime and Justice. January 29, 2026. <a href=\"https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/crimeinenglandandwales\/yearendingseptember2025\" target=\"_blank\">https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/crimeinenglandandwales\/yearendingseptember2025<\/a><\/li>\n<\/ol>\n<style>\n.code-format {\nfont-family: 'Courier New';}.image-caption {    font-size: 12px;}.list-spacing li{margin-bottom:20px}ol.list-spacing > li::marker {    font-weight: 700;}.entry-content ul.list-spacing ul > li {    list-style-type: square;}h3.footnotes{font-size:18px;}.footnotes-listing{font-size:14px;}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Protective DNS<\/span>: Why Telcos Are Turning to DNS as the Platform for Consumer Security');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, internet service providers have offered a range of consumer security services. These have typically focused on the endpoint and the home: secure residential gateways, parental controls and bundled antivirus or identity protection services. What they have not historically done is treat the network itself as the primary enforcement point for security. That is [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":13323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[739,151,740],"class_list":{"0":"post-13322","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-pdns","9":"tag-dns-protection","10":"tag-protective-dns","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protective DNS: Why Telcos Are Using DNS for Consumer Security<\/title>\n<meta name=\"description\" content=\"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protective DNS: Why Telcos Are Using DNS for Consumer Security\" \/>\n<meta property=\"og:description\" content=\"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T14:55:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Protective DNS: Why Telcos Are Using DNS for Consumer Security\" \/>\n<meta name=\"twitter:description\" content=\"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security\",\"datePublished\":\"2026-04-15T14:55:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/\"},\"wordCount\":1217,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/telcodns-blog-thumbnail.jpeg\",\"keywords\":[\"PDNS\",\"DNS Protection\",\"Protective DNS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/\",\"name\":\"Protective DNS: Why Telcos Are Using DNS for Consumer Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/telcodns-blog-thumbnail.jpeg\",\"datePublished\":\"2026-04-15T14:55:09+00:00\",\"description\":\"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/telcodns-blog-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/telcodns-blog-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protective DNS: Why Telcos Are Using DNS for Consumer Security","description":"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/","og_locale":"en_US","og_type":"article","og_title":"Protective DNS: Why Telcos Are Using DNS for Consumer Security","og_description":"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/","og_site_name":"Infoblox Blog","article_published_time":"2026-04-15T14:55:09+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_title":"Protective DNS: Why Telcos Are Using DNS for Consumer Security","twitter_description":"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security","datePublished":"2026-04-15T14:55:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/"},"wordCount":1217,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg","keywords":["PDNS","DNS Protection","Protective DNS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/","url":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/","name":"Protective DNS: Why Telcos Are Using DNS for Consumer Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg","datePublished":"2026-04-15T14:55:09+00:00","description":"Protective DNS is reshaping consumer security. Discover why telcos are leveraging DNS to block threats, prevent fraud and meet rising regulatory demands.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/telcodns-blog-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/protective-dns-why-telcos-are-turning-to-dns-as-the-platform-for-consumer-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=13322"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13322\/revisions"}],"predecessor-version":[{"id":13325,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13322\/revisions\/13325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/13323"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=13322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=13322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=13322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}