Share this
NEW! Automatically Export DNS Data for Analysis and Compliance
by Kory Underdown on Jun 7, 2022 12:00:00 AM
More than 70% of cyberattacks involve the Domain Name System (DNS) layer.
Additionally, the ability to ingest, correlate, search, and action data from across the entire enterprise and cloud attack surface is becoming increasingly more important.
Announcing DNSFilter’s newest feature: Data Export
Data Export automates the process of exporting query log data from DNSFilter’s AI-powered DNS security solution to Splunk and Amazon S3 buckets. S3 can then be used as an intermediary for SIEM and SOAR products of your choice.
With Data Export, data is exported in near real time and analyzed alongside additional security events and data sources to provide visibility across enterprise environments and respond to threats.
Benefits of Data Export include:
- Automated export: Security teams no longer need to manually export DNS layer data into a security monitoring solution. More than 25 categories of query log data including domain name, request address, server address, and more are automatically exported, saving significant time and resources.
- Long-term search: Finding hidden threats requires the ability to continuously run new analysis on historical data. Data Export allows security teams to retain and analyze historical DNSFilter data in their security monitoring solution.
- Single pane of glass: DNSFilter data can be aggregated alongside all endpoint, cloud workload, and additional enterprise data sources to correlate events and take action in a single location.
Data Export is available to all Basic, Pro, & Enterprise plans for $.25 per user, per month. For more information on how to use Data Export in your organization, join us for the Data Export 101 webinar.
Share this
Categories
- Featured (267)
- Protective DNS (23)
- IT (15)
- IndyCar (9)
- Content Filtering (8)
- AI (7)
- Cybersecurity Brief (7)
- IT Challenges (7)
- Public Wi-Fi (7)
- Deep Dive (6)
- Malware (4)
- Roaming Client (4)
- Team (4)
- Compare (3)
- MSP (3)
- Machine Learning (3)
- Phishing (3)
- Ransomware (3)
- Staying Ahead of Cyber Threats (3)
- Tech (3)
- Anycast (2)
- Events (2)
- Tech Stack (2)
- Secure Web Gateway (1)

The Growing Threat of Malicious Domains in Cybersecurity
As cybercriminals continue to evolve their tactics, domain-based attacks like cybersquatting, typosquatting, and other malicious domains have become a significant threat to businesses and individuals alike. These attacks are designed to exploit trust, impersonate brands, and mislead users into handing over sensitive information—often resulting in financial losses, data breaches, and reputat...

Your firewall is working hard… but not smart. And cybercriminals love that.
Like a bouncer at the club with a clipboard—great at stopping the obvious troublemakers that aren’t on the list, but completely oblivious to unknown threats. They excel at blocking unauthorized access through known ports and protocols, but they often overlook a critical vulnerability: DNS traffic and what’s on the other side of a link. This oversight allows cybercrimina...

Introduction: The AI Cybersecurity Arms Race
Artificial intelligence (AI) has transformed the cybersecurity landscape—both for defenders and attackers. While AI-powered cybersecurity solutions offer advanced threat detection, AI-driven cybercrime is evolving at an alarming rate, automating attacks that are more sophisticated, evasive, and dangerous.