Infoblox releases free-to-download demo of DNS Firewall
Solution provides 60 days of malware detection through downloadable software, vendor says
Infoblox has introduced a free, DNS-based evaluation product to help find difficult-to-detect malware on enterprise networks.
The Infoblox DNS Firewall Virtual Evaluation provides 60 days of malware detection through a downloadable software, which the vendor said is easy for network admins to install and operate.
Infoblox said that the product can receive updates of new and emerging malicious domains every two hours to help networks stay current on identified malware sources. The evaluation product can use the updated information to detect and report on suspicious activity within a network, the vendor explained.
After the 60-day evaluation period, customers can opt to purchase the full version of the Infoblox DNS Firewall which, in addition to detecting malware, can also block malware communications and provide information about infected end-points making malicious queries, Infoblox said.
Infoblox said that almost every advanced persistent threat (APT) uses the domain name system (DNS) to ‘call home' for instructions from their command and control servers. The vendor said that DNS is can make for an ideal choke point detecting malware communications that slip past other security solutions.
"DNS is too valuable to be vulnerable," said David Gee, executive vice president of marketing at Infoblox.
"It's easy for security vendors to spread doom and gloom, but it's often hard for them to prove their point. We're confident the Infoblox DNS Firewall Virtual Evaluation will find malware on most enterprise networks - with minimal effort by network administrators - at no cost and with no obligation."
Infoblox said that the world of networking and security can now be divided into two groups - those who know their networks are infected with malware, and those who don't acknowledge their networks are compromised. The vendor cited a recent research project by Cisco, which found that 100% of the networks evaluated had suspicious traffic going to web sites that host malware.