Users,
Bots and Malware
Corporate Firewall
C
orporate Netwo
rk
BAD
ACTORS
BAD
ACTORS
Spyware
& Viruses
Threat Blocked
CIRA D-Zone DNS Firewall
Ransomware
Malware
Command and
Control Servers
Phishing &
Pharming URLS
Detect
Real time and
historical analysis
of global DNS data
to detect security
threats
Feed
Policy enabled
recursive DNS
servers are
updated with
real-time threat
feeds
Enforce
Servers examine
DNS transactions
and block domain
and IP security
threats and
filtered sites and
categories
Report
Malicious activity
is identified and
reported
Mitigate
Locate and
quarantine
infected devices
D-Zone DNS Firewall
Uncover the malware
that’s already on your network -
and keep it from coming back!
At the core of any security solution is the data
and data science used to produce the threat
feed. By combining advanced data science
with visibility on 3% of global DNS traffic and
30% of global web traffic, Akamai’s threat
feed provides a powerful incremental layer of
protection.
Protection you can trust
•	 85% of threats detected were
undiscovered by others
•	 51% of zero-day malware is undetected
by anti-virus solutions
•	 14 minutes from detection to inclusion in
the cyberthreat feed
•	 Operated by CIRA, Canada’s registry
•	 24x7 premium support
Attackers deploy multiple
strategies—so should you
No single solution addresses all exploits.
Attackers will target the network, BYOD,
shadow IT, and more with multi-vector
strategies. The DNS layer is critical to your
defence in depth strategy:
•	 Effective, fast, low-cost
•	 Protects all devices with no additional
hardware or software
•	 An additive layer of protection with a
threat feed produced from internet traffic
Dynamic threat feed produced from
global DNS data – more than 100,000
malicious domains detected from
global DNS data and added to the
threat list daily.
Disable malware by disrupting
command and control – more than
90% of malware can be disabled at the
DNS level by disrupting communication
to command and control servers.
Full deployment in minutes –
protection for all devices and users
on the network with no hardware or
software to install.
Protection from phishing – new
phishing domains detected and added
to the block list in near real-time.
Customizable web content filtering
– enforce acceptable internet use
policies with easy-to-configure web
content filtering, customizable down to
individual URLs.
API integration – easy to integrate into
existing dashboards or SIEMs for policy
management, logs, alerts, etc.
Powered by AKAMAI
CIRA’s DNS Firewall is built using
Akamai’s industry-leading recursive
DNS technology and dynamic
cyberthreat feed.
See what you are missing
Almost every new customer
discovers malware on their
network that they didn’t know
they had.
Learn more and try!
Visit cira.ca/cybersecurity-services
or contact us to book a demo
at info@d-zone.ca
KeyFeatures

More Related Content

PPTX
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
PPTX
Network Situational Awareness using Tripwire IP360
PPTX
Tripwire Adaptive Threat Protection
PPTX
Cyber security issues
PPTX
Fingerprinting healthcare institutions
PPTX
Cyber Attack Survival: Are You Ready?
PPTX
Advanced Threat Protection
PPT
Safeguard your enterprise against ransomware
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
Network Situational Awareness using Tripwire IP360
Tripwire Adaptive Threat Protection
Cyber security issues
Fingerprinting healthcare institutions
Cyber Attack Survival: Are You Ready?
Advanced Threat Protection
Safeguard your enterprise against ransomware

What's hot (20)

PPTX
Cybersecurity
PPTX
WatchGuard - Security event juni 2016
PDF
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
PDF
The Art of Cyber War [From Black Hat Brazil 2014]
PPT
Port of seattle security presentation david morris
PPTX
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
PDF
InfoSecurity Europe 2014: The Art Of Cyber War
PPTX
ICS case studies v2
PDF
Advanced Threat Defense Intel Security
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PPT
Ethical Hacking and Penetration Testing
PPT
FireEye
PPTX
Incident Response: Validation, Containment & Forensics
PDF
Businessday okt 2016 - WatchGuard
PDF
Network Security - Defense Through Layered Information Security
PPTX
UTM (unified threat management)
PPTX
Firewall presentation
PDF
Supply Chain Attack Backdooring Your Networks
PPTX
Taking the battle to Ransomware with Sophos Intercept X
Cybersecurity
WatchGuard - Security event juni 2016
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
The Art of Cyber War [From Black Hat Brazil 2014]
Port of seattle security presentation david morris
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
InfoSecurity Europe 2014: The Art Of Cyber War
ICS case studies v2
Advanced Threat Defense Intel Security
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Ethical Hacking and Penetration Testing
FireEye
Incident Response: Validation, Containment & Forensics
Businessday okt 2016 - WatchGuard
Network Security - Defense Through Layered Information Security
UTM (unified threat management)
Firewall presentation
Supply Chain Attack Backdooring Your Networks
Taking the battle to Ransomware with Sophos Intercept X
Ad

Similar to D zone-firewall-datasheet (20)

PPTX
From liability to asset, the role you should be playing in your security arch...
PPTX
SonicWALL - Skytek - VnPro.pptx
PDF
Symantec Endpoint Suite
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PPTX
powerpoint presentation file for 25312.pptx
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PPTX
Cisco Umbrella and the benefits of using it
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Marlabs cyber threat management
PPTX
Two for Attack: Web and Email Content Protection
PDF
Pervasive Security Across Your Extended Network
PPTX
How to prevent Ransomware with Essential Firewall Practices?
PDF
Revolutionizing Advanced Threat Protection
PDF
Cisco amp for networks
PPT
Miben nyújt többet a Cisco ASA + FirePOWER Services?
PDF
Compliance made easy. Pass your audits stress-free.
PDF
Dns protection
PPTX
3 Reasons You Need Proactive Protection Against Malware
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PPTX
highend-srxseries-services-gateways-customer-presentation.pptx
From liability to asset, the role you should be playing in your security arch...
SonicWALL - Skytek - VnPro.pptx
Symantec Endpoint Suite
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
powerpoint presentation file for 25312.pptx
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cisco Umbrella and the benefits of using it
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Marlabs cyber threat management
Two for Attack: Web and Email Content Protection
Pervasive Security Across Your Extended Network
How to prevent Ransomware with Essential Firewall Practices?
Revolutionizing Advanced Threat Protection
Cisco amp for networks
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Compliance made easy. Pass your audits stress-free.
Dns protection
3 Reasons You Need Proactive Protection Against Malware
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
highend-srxseries-services-gateways-customer-presentation.pptx
Ad

Recently uploaded (20)

DOCX
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
DOC
EVC毕业证学历认证,北密歇根大学毕业证留学硕士毕业证
PDF
Presentation on cloud computing and ppt..
PDF
Microsoft-365-Administrator-s-Guide_.pdf
PDF
Public speaking for kids in India - LearnifyU
DOCX
Action plan to easily understanding okey
PDF
COLEAD A2F approach and Theory of Change
PPTX
Knowledge Knockout ( General Knowledge Quiz )
PPTX
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PDF
_Nature and dynamics of communities and community development .pdf
PDF
6.-propertise of noble gases, uses and isolation in noble gases
PPTX
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
PPTX
Bob Difficult Questions 08 17 2025.pptx
PPTX
Copy- of-Lesson-6-Digestive-System.pptx
PDF
Yusen Logistics Group Sustainability Report 2024.pdf
PPTX
Rakhi Presentation vbbrfferregergrgerg.pptx
PPTX
Unit 8#Concept of teaching and learning.pptx
PPTX
Sustainable Forest Management ..SFM.pptx
PPTX
Literatura en Star Wars (Legends y Canon)
PPTX
power point presentation ofDracena species.pptx
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
EVC毕业证学历认证,北密歇根大学毕业证留学硕士毕业证
Presentation on cloud computing and ppt..
Microsoft-365-Administrator-s-Guide_.pdf
Public speaking for kids in India - LearnifyU
Action plan to easily understanding okey
COLEAD A2F approach and Theory of Change
Knowledge Knockout ( General Knowledge Quiz )
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
_Nature and dynamics of communities and community development .pdf
6.-propertise of noble gases, uses and isolation in noble gases
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
Bob Difficult Questions 08 17 2025.pptx
Copy- of-Lesson-6-Digestive-System.pptx
Yusen Logistics Group Sustainability Report 2024.pdf
Rakhi Presentation vbbrfferregergrgerg.pptx
Unit 8#Concept of teaching and learning.pptx
Sustainable Forest Management ..SFM.pptx
Literatura en Star Wars (Legends y Canon)
power point presentation ofDracena species.pptx

D zone-firewall-datasheet

  • 1. Users, Bots and Malware Corporate Firewall C orporate Netwo rk BAD ACTORS BAD ACTORS Spyware & Viruses Threat Blocked CIRA D-Zone DNS Firewall Ransomware Malware Command and Control Servers Phishing & Pharming URLS Detect Real time and historical analysis of global DNS data to detect security threats Feed Policy enabled recursive DNS servers are updated with real-time threat feeds Enforce Servers examine DNS transactions and block domain and IP security threats and filtered sites and categories Report Malicious activity is identified and reported Mitigate Locate and quarantine infected devices D-Zone DNS Firewall Uncover the malware that’s already on your network - and keep it from coming back!
  • 2. At the core of any security solution is the data and data science used to produce the threat feed. By combining advanced data science with visibility on 3% of global DNS traffic and 30% of global web traffic, Akamai’s threat feed provides a powerful incremental layer of protection. Protection you can trust • 85% of threats detected were undiscovered by others • 51% of zero-day malware is undetected by anti-virus solutions • 14 minutes from detection to inclusion in the cyberthreat feed • Operated by CIRA, Canada’s registry • 24x7 premium support Attackers deploy multiple strategies—so should you No single solution addresses all exploits. Attackers will target the network, BYOD, shadow IT, and more with multi-vector strategies. The DNS layer is critical to your defence in depth strategy: • Effective, fast, low-cost • Protects all devices with no additional hardware or software • An additive layer of protection with a threat feed produced from internet traffic Dynamic threat feed produced from global DNS data – more than 100,000 malicious domains detected from global DNS data and added to the threat list daily. Disable malware by disrupting command and control – more than 90% of malware can be disabled at the DNS level by disrupting communication to command and control servers. Full deployment in minutes – protection for all devices and users on the network with no hardware or software to install. Protection from phishing – new phishing domains detected and added to the block list in near real-time. Customizable web content filtering – enforce acceptable internet use policies with easy-to-configure web content filtering, customizable down to individual URLs. API integration – easy to integrate into existing dashboards or SIEMs for policy management, logs, alerts, etc. Powered by AKAMAI CIRA’s DNS Firewall is built using Akamai’s industry-leading recursive DNS technology and dynamic cyberthreat feed. See what you are missing Almost every new customer discovers malware on their network that they didn’t know they had. Learn more and try! Visit cira.ca/cybersecurity-services or contact us to book a demo at info@d-zone.ca KeyFeatures