3 DNS monitoring methods

Using DNS Monitoring to Detect Network Breaches

Cover

Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. As a result, monitoring domain name system (DNS) data is an excellent way to determine if a network has been breached. All that remains is finding the right DNS monitoring methods.

In this e-guide, IT security expert Brad Casey shares the 3 DNS monitoring methods that he feels are the most effective, all of which should be easy for a security administrator to implement.

Access now to begin using DNS monitoring to detect network breaches.

Vendor:
Dyn
Posted:
18 Oct 2016
Published:
17 Oct 2016
Format:
PDF
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!