Expert Speak
Why a Dedicated Hybrid DNS Solution is Vital?

Written by Ali Mehaidly, Solutions Architect, Middle East & Africa at Infoblox
According to Gartner, over 45 percent of IT spending will have shifted to the cloud by 2024 (up from 33 percent in 2020). Broader use of cloud and SaaS applications is driving greater investment in technologies that improve productivity, data security, and continuous business operations. The demands of a modern, distributed workforce require IT to prioritize agility, velocity, and scale. As a consequence, networks are shifting from a traditional architecture focused on headquarters and the data center to a distributed, edge-to-cloud architecture. To support the hybrid workplace, organizations need to be able to easily secure networks and unify management across cloud, HQ, and branch locations.
The hybrid workplace – where employees are mobile across on-site, home, and work-from-anywhere locations – is here to stay. In addition, organizations are undertaking other business imperatives like SaaS, cloud adoption, and IoT at a fast pace. To meet the requirements of workplace transformation, organizations must also transform their network’s capabilities.
But these transitions are not without challenges. As companies transform, infrastructure becomes more fragmented. IT teams struggle with the loss of control over core network services such as DNS, DHCP, and IP Address Management (IPAM), as remote users and cloud workloads rely on disparate DHCP, DNS systems. Limited visibility, difficulty in effectively managing devices in remote offices, and lack of security “everywhere” cause further concerns.
Why Dedicated DNS Security
Numerous organizations trust DNS, and the traffic is usually free to pass through company network firewalls. However, cybercriminals know this and abuse and attack DNS, making the protection of this critical service a high priority for organizations.
There is no perfect security tool that will fix all problems, but it is important to have tools that fill in the gaps left open by other tools. DNS, for example, can be used as a security control point to stop malicious attacks and to catch threats that would otherwise be missed by other security tools such as DNS tunneling/ data exfiltration, domain generation algorithms (DGAs), and lookalike domain attacks.
Threat investigators also rely on DNS because it detects malicious activity earlier in the kill chain than other security tools, reducing the burden on their perimeter defenses. It gives much-needed visibility into which devices are making requests to connect to malicious destinations – visibility that allows organizations to sever those connections and protect their entire infrastructure.
In fact, DNS and malware analysis are both regarded as the top tools used in identifying what data and systems the attacker got access to. DNS is also helpful to investigators when determining how much information the attacker got access to.
DNS should therefore be a key part of any organization’s security strategy as it protects firms from threats that other security tools might have missed and allows investigators to know which devices have requested connections to malicious destinations. DNS also helps accelerate incident response times, which makes threat resolution faster.
The internet is encrypted now; network analytics and visibility vendors informally reported to Forrester that between 72% and 95% of the traffic they’re seeing in corporate networks is encrypted. For many organizations, only metadata like DNS requests remain as visible cues available for real-time analysis. Security and risk professions will continue to embrace the tried-and-tested DNS firewalling and filtering techniques as a first line of defense against malware, phishing, and ransomware. Attackers know this and have been developing algorithms to generate pseudo-random domain names for the C2 operations, leading to an arms race that only AI will be able to fight in real-time.
Signature-based products like NGFW are critical to blocking or containing phishing attacks. But organizations might be missing a crucial element at a different layer of their security defenses: DNS. NGFWs allows administrators to apply policies to traffic, based not just on port and protocol, but also on applications and users accessing the network. However, the DNS protocol is typically not “inspected” by NGFW for malware, leaving the service vulnerable to malware. An NGFW is not a DNS server, and therefore, cannot interpret DNS queries and responses to detect malware that uses the DNS protocol. While some NFGWs may claim to have DNS security-related features, they are typically “bolted on” and lack the sophisticated visibility that DNS servers have into all the DNS requests and devices.
While a DNS firewall can stop malicious Internet connections before they occur at the DNS control plane, an NGFW must scan each of these connections individually, which is resource intensive and can drain its performance. NGFWs also do not offer protection to off-network devices or users, such as those working remotely, without a VPN, which adds latency. A DNS firewall can, making it much faster, more responsive, and effective at protecting end-users working both inside and outside of the organizational perimeter.
Because it’s based on DNS, a DNS firewall can be an ideal enforcement point for detecting any device that tries to call up a malicious domain. Moreover, since a DNS server is a default service in the network that is already protected by an NGFW, a DNS firewall can secure DNS connections quickly, easily, and at scale, without burdening the already busy NGFW.
Using a layered approach to security is critical as network perimeters continue to erode and confidential information is increasingly accessed through cloud services on public Wi-Fi networks. The best way to maintain a strong security posture is by integrating a DNS firewall with an NGFW. DNS firewalls can be installed as part of the standard DNS service, either on-premises or offered as a service via the cloud to complement and fill the gaps missed by NFGWs and other security tools.
Cyber Security
Addressing Challenges in Artificial Intelligence Security and Supply Chain Management

Written by Eng. Abdulaziz Al Nuaimi, Chief Security Officer, Huawei UAE (more…)
Expert Speak
Talking to the C-Suite About Cybersecurity

Written by Filippo Cassini, Global Technical Officer, SVP of Engineering at Fortinet (more…)
Cyber Security
The Human Factor: Why Cybersecurity is as Much About People as Technology

Global Entrepreneur Roman Ziemian explores why organisations must prioritise human awareness and culture to build a truly secure future. (more…)
-
Artificial Intelligence7 days ago
DeepSeek Popularity Exploited in Latest PyPI Attack
-
Artificial Intelligence1 week ago
SentinelOne to Spotlight AI-Driven Cybersecurity at LEAP 2025
-
Cyber Security4 days ago
Employees Are the First Line of Defense
-
News6 days ago
Sophos Completes Secureworks Acquisition
-
Homeland Security1 week ago
Daimler Truck Focuses on Growth in the Defence Sector
-
Cyber Security4 days ago
Proactive Threat Intelligence Can Keep Threats at Bay
-
Cyber Security3 days ago
Cloud and IoT Vulnerabilities Expose Smart Cities and Industrial Systems to Cyber Risks
-
Cyber Security1 week ago
Tenable Plans to Acquire Vulcan Cyber