We use cookies to make your experience better.
To comply with the new e-Privacy directive, you agree to the privacy policy and our use of cookies.
Palo Alto Networks DNS Security subscription, device, HA, renewal, PA-820 Threat intelligence 1 license(s)
SKU
PAN-PA-820-DNS-HA2-R
Login for pricing
Out Of Stock - Contact for availability
DNS Security subscription, device, HA, renewal, PA-820
Category: Antivirus Security Software
| SKU | PAN-PA-820-DNS-HA2-R |
|---|---|
| Manufacturer | Palo Alto Networks |
| Availability | No |
40% More DNS Threat Coverage Than Any Other Available Solution
The Domain Name System (DNS) is wide open for attackers. Its ubiquity and high traffic volume make it
easy for adversaries to hide malicious activity. The Palo Alto Networks Unit 42 Threat Research team identified
that 85% of malware uses DNS to initiate commandand-control (C2) procedures. Attackers can also abuse DNS using a multitude of techniques to deliver malware and exfiltrate data. Unfortunately, security teams often lack basic visibility into how threats use DNS that would enable them to respond effectively. Current approaches lack automation; drown you in uncoordinated data from independent tools; or require changes to DNS infrastructure that can not only be bypassed, but also require continual maintenance. It’s time to take back control of your DNS traffic.
The Domain Name System (DNS) is wide open for attackers. Its ubiquity and high traffic volume make it
easy for adversaries to hide malicious activity. The Palo Alto Networks Unit 42 Threat Research team identified
that 85% of malware uses DNS to initiate commandand-control (C2) procedures. Attackers can also abuse DNS using a multitude of techniques to deliver malware and exfiltrate data. Unfortunately, security teams often lack basic visibility into how threats use DNS that would enable them to respond effectively. Current approaches lack automation; drown you in uncoordinated data from independent tools; or require changes to DNS infrastructure that can not only be bypassed, but also require continual maintenance. It’s time to take back control of your DNS traffic.
| License | |
|---|---|
| Type | Threat intelligence |
| License quantity | 1 license(s) |
| Software type | Subscription |
| Features | |
|---|---|
| Suitable for | Firewall |
| Compatibility | PA-820 |
| Type | Threat intelligence |