DNS Security Quickly Secures BYOD Networks with Simple Configuration

The iboss Cloud Platform includes the ability to protect networks by pointing DNS settings to the Platform. This is a great choice for protecting guest and BYOD networks where devices are not owned by the organization but protection from threats is still required.

Cloud DNS protection can easily be used to secure branch office locations without touching endpoints or re-configuring devices. The DNS settings of the network are changed to point to the Platform. When the iboss Cloud Platform receives a DNS query from the network, the query is run through the malware security stack to determine if the destination is malicious or the request represents malware command and control center traffic which indicates an infection.

The use of DNS protection is powerful for BYOD networks where guests are able to leverage Wifi provided by the organization but the devices being used are not owned by the organization. Because the devices will automatically use the network-provided DNS settings, any query made by the BYOD device will be forwarded to the Platform for protection.

Easily configure guest network settings so that devices automatically receive protection

The iboss Cloud Platform includes support for DNS-based protection in the cloud. This allows administrators to configure guest and BYOD networks to point to the Platform to extend web filtering and malware protection to devices not owned by the organization. Since the DNS settings of the BYOD network points to the Platform, it will distribute the protection to any device connected to the network. The configuration is painless and requires no configuration on the devices connected to the network. The settings are automatically transferred via DHCP to the devices attached to guest network.

Web Filtering and Malware Protection with reporting

Web filtering policies can be applied to prevent risky Internet access for any device on the guest network. Malware protection automatically extends to any device connected to the network as well. Since DNS queries are directed to the Platform, the queries are automatically run through threat feeds and through policy engines. If violations occur, the user is presented with a customizable page indicating access was restricted.

Web filtering policies can be applied to prevent risky Internet access for any device on the guest network. Malware protection automatically extends to any device connected to the network as well. Since DNS queries are directed to the Platform, the queries are automatically run through threat feeds and through policy engines. If violations occur, the user is presented with a customizable page indicating access was restricted.

Unique policies can be applied to each guest network

For each network configured for protection by iboss Cloud Platform, a unique default policy can be applied. This allows flexibility for different types of Wifi guest networks or offices. The guest or office network is mapped to the unique policy via its source IP and that policy is fully customizable by the network admin. This includes web filtering and malware controls.

Take the next step in shifting to the world’s largest security platform built for the future.

Sign up for a demo to see how the iboss Zero Trust Edge prevents breaches by making applications, data and services inaccessible to attackers while allowing trusted users to securely and directly connect to protected resources from anywhere.