Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure.

Description

Equip yourself with Plixer FlowPro to revolutionize your approach to network security. By gaining detailed insights into application usage, DNS activities, and beyond, you won't just react to threats; you'll proactively identify and eliminate them before they escalate. Harness the power of advanced analytics for an all-encompassing perspective on network behavior, which allows you to accurately anticipate and respond to potential risks. Strengthen your defenses against threats such as malware, data breaches, and DDoS attacks. FlowPro’s dedicated monitoring and analytical capabilities can detect irregularities in DNS protocols, adding valuable layers of preventive security. Prevent ransomware and malicious software from infiltrating your systems. Continuously monitor, identify, and disrupt connections to command and control servers, protecting your infrastructure against potential breaches. Moreover, gain clarity on encrypted traffic, enabling you to maintain a watchful eye on all network activities. With Plixer FlowPro, you can ensure that your network security remains robust and resilient against evolving threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure DNS
BlueCat Gateway
Citrix Analytics
CrowdStrike Container Security
EfficientIP DNS Blast
Exabeam
IBM QRadar SIEM
Infoblox Cloud Network Automation
LogRhythm SIEM
Microsoft 365
OpenText Core Behavioral Signals
Palo Alto Networks DNS Security Service
Palo Alto Networks VM-Series
SOLIDserver DDI
SentinelOne Singularity
Splunk Cloud Platform
VMware Cloud

Integrations

Azure DNS
BlueCat Gateway
Citrix Analytics
CrowdStrike Container Security
EfficientIP DNS Blast
Exabeam
IBM QRadar SIEM
Infoblox Cloud Network Automation
LogRhythm SIEM
Microsoft 365
OpenText Core Behavioral Signals
Palo Alto Networks DNS Security Service
Palo Alto Networks VM-Series
SOLIDserver DDI
SentinelOne Singularity
Splunk Cloud Platform
VMware Cloud

Pricing Details

$1000
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

DNSSense

Founded

2016

Country

United Kingdom

Website

www.dnssense.com

Vendor Details

Company Name

Plixer

Founded

1999

Country

United Kingdom

Website

www.plixer.com/products/flowpro/

Product Features

Product Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives