3 DNS monitoring methods

Using DNS Monitoring to Detect Network Breaches

Cover

Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. As a result, monitoring domain name system (DNS) data is an excellent way to determine if a network has been breached. All that remains is finding the right DNS monitoring methods.

In this e-guide, IT security expert Brad Casey shares the 3 DNS monitoring methods that he feels are the most effective, all of which should be easy for a security administrator to implement.

Access now to begin using DNS monitoring to detect network breaches.

Vendor:
Dyn
Posted:
18 Oct 2016
Published:
17 Oct 2016
Format:
PDF
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.