{"id":3304,"date":"2015-06-23T21:23:20","date_gmt":"2015-06-23T21:23:20","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3304"},"modified":"2020-05-06T10:30:11","modified_gmt":"2020-05-06T17:30:11","slug":"the-ins-and-outs-of-dns-protection","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/","title":{"rendered":"The Ins And Outs Of DNS Protection"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3310\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/ins-and-out.jpg\" alt=\"\" width=\"597\" height=\"411\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out-300x206.jpg 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/p>\n<p>Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in. That hasn\u2019t changed, but now they have to worry about good data getting carried out.<\/p>\n<p>Unfortunately, the mission-critical Domain Name System (DNS) infrastructure \u2013 the one IT teams support and the enterprise can\u2019t live without \u2013 is used increasingly as an attack surface, and traditional security solutions aren\u2019t built to protect it.<\/p>\n<p>Worse still, it is under attack from two directions. Outside-in threats include DNS DDoS, exploits, reconnaissance and DNS hijacking. Inside-out threats can come from malware infected endpoints or from malicious insiders communicating with bad domains to exfiltrate data. According to a recent\u00a0<em>SC<\/em>\u00a0magazine article, 46% of enterprise IT decision makers surveyed saw data exfiltration happen via DNS.<\/p>\n<p>You can use the unique position of DNS in the network to turn DNS from a vulnerability to a security asset, and plug a critical gap in your defense-in-depth strategy. Join us at 10:00 a.m. PT on Tuesday, June 30th\u00a0for a one-hour webinar entitled \u201cSecuring DNS On Two Fronts,\u201d during which we\u2019ll discuss in detail:<\/p>\n<ul>\n<li>External attacks that slow down or crash external DNS servers<\/li>\n<li>Inside-out threats to data and infrastructure<\/li>\n<li>Two complementary DNS security approaches that protect your DNS on both fronts<\/li>\n<\/ul>\n<p>Click\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1012312\/A3AF695137B7835B7C2CFD2E1713DB6F\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>\u00a0to register.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in. That hasn\u2019t changed, but now they have to worry about good data getting carried out. Unfortunately, the mission-critical Domain Name System (DNS) infrastructure \u2013 the one IT teams support and the enterprise can\u2019t live without \u2013 is used [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":3310,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,151,16,15],"class_list":{"0":"post-3304","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-dns-protection","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Ins And Outs Of DNS Protection<\/title>\n<meta name=\"description\" content=\"Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ins And Outs Of DNS Protection\" \/>\n<meta property=\"og:description\" content=\"Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-23T21:23:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"The Ins And Outs Of DNS Protection\",\"datePublished\":\"2015-06-23T21:23:20+00:00\",\"dateModified\":\"2020-05-06T17:30:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/\"},\"wordCount\":224,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ins-and-out.jpg\",\"keywords\":[\"DNS\",\"DNS Protection\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/\",\"name\":\"The Ins And Outs Of DNS Protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ins-and-out.jpg\",\"datePublished\":\"2015-06-23T21:23:20+00:00\",\"dateModified\":\"2020-05-06T17:30:11+00:00\",\"description\":\"Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ins-and-out.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ins-and-out.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-ins-and-outs-of-dns-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Ins And Outs Of DNS Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Ins And Outs Of DNS Protection","description":"Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/","og_locale":"en_US","og_type":"article","og_title":"The Ins And Outs Of DNS Protection","og_description":"Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/","og_site_name":"Infoblox Blog","article_published_time":"2015-06-23T21:23:20+00:00","article_modified_time":"2020-05-06T17:30:11+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"The Ins And Outs Of DNS Protection","datePublished":"2015-06-23T21:23:20+00:00","dateModified":"2020-05-06T17:30:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/"},"wordCount":224,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg","keywords":["DNS","DNS Protection","Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/","url":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/","name":"The Ins And Outs Of DNS Protection","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg","datePublished":"2015-06-23T21:23:20+00:00","dateModified":"2020-05-06T17:30:11+00:00","description":"Network security experts just can\u2019t win. For years, their goal was to keep malware from getting in.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ins-and-out.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-ins-and-outs-of-dns-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"The Ins And Outs Of DNS Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3304"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3304\/revisions"}],"predecessor-version":[{"id":3311,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3304\/revisions\/3311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3310"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}