-
Top Security Report #1: DNS Top RPZ Hits
This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2, part 3, part 4, part 5, part 6, part 7 DNS Top RPZ Hits Similar to top report #2, the DNS Top RPZ Hits report helps deliver data protection and malware…
-
Top Security Report #2: Malicious Activity by Client
This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2, part 3, part 4, part 5, part 6 Malicious Activity by Client Our top #2 report drives data protection and malware mitigation by showing which clients have the…
-
Top Security Report #3 - DNS Top Tunneling Activity
This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2, part 3, part 4, part 5 DNS Top Tunneling Activity Similar to report #4, the DNS Top Tunneling Activity report enables data protection and malware mitigation…
-
Top Security Report #3 - DNS Top Tunneling Activity
This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2, part 3, part 4, part 5 DNS Top Tunneling Activity Similar to report #4, the DNS Top Tunneling Activity report enables data protection and malware mitigation…
-
Top Security Report #4 - Tunneling Traffic by Category
This blog discusses the report #4 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2, part 3, part 4 Tunneling Traffic by Category This report is another security report that addresses data protection and malware mitigation. It lists DNS…
-
Top Security Report #5 - Top Malware & DNS Tunneling by Client
This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2, part 3 Top Malware & DNS Tunneling by Client Accessed through the security dashboard, this report requires Active Trust/Active Trust Cloud. It provides…
-
Top Security Report #6 - Threat Protection - Top Rules by Source
This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts: part 1, part 2. Infoblox Out-of-the-Box Report Threat Protection - Top Rules by Source This report lists the top source IP addresses that trip each threat rule as identified…
-
Top Security Report #7: DNS Top NXDOMAIN – NOERROR
This blog discusses the report #7 in a series of seven top security reports that can help you defend against bad actors. Please see the part 1 of this series here. Top Security Report #7: DNS Top NXDOMAIN – NOERROR Top report #7 is a favorite among network and security admins because it shows the source and patterns of…
-
Top 7 Security Reports that Help You Win against Bad Actors - Part 1
This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility & Make You a Better Manager and Why You Need Reporting & Analytics with Query Logging. In this installment, I’m going to share the Top 7 Security Reports that Help You Level the Playing Field…
-
Infoblox TIDE now integrates with DNS Server, Windows 2016
Enterprise Security Needs are Changing Rapidly The manner in which employees work in global organizations has changed drastically over the years. Employees are less often stuck in their company building that is behind the corporate network a firewall and much more likely to be working remotely, from home, coffee shops, or…