{"id":381,"date":"2019-12-15T18:53:39","date_gmt":"2019-12-15T10:53:39","guid":{"rendered":"https:\/\/dnsvault.net\/?page_id=381"},"modified":"2021-05-14T12:00:44","modified_gmt":"2021-05-14T04:00:44","slug":"intelligence-threat-protection","status":"publish","type":"page","link":"https:\/\/dnsvault.net\/?page_id=381","title":{"rendered":"Intelligence Threat Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"381\" class=\"elementor elementor-381\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e12e577 elementor-section-stretched elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"2e12e577\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38875ba\" data-id=\"38875ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22f1885a elementor-widget elementor-widget-heading\" data-id=\"22f1885a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intelligence Threat Protection<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-699d3834 elementor-widget elementor-widget-heading\" data-id=\"699d3834\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">For Cyber Threat Management<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49ef6c0b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49ef6c0b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6bb98290\" data-id=\"6bb98290\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1a2bfd elementor-widget elementor-widget-heading\" data-id=\"c1a2bfd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Control, Secure, and Analyse every aspect of the DNS performance<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec53770 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec53770\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d595fb0 card mx-2\" data-id=\"3d595fb0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28e35027 elementor-widget elementor-widget-heading\" data-id=\"28e35027\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Features<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65dea23c elementor-widget elementor-widget-text-editor\" data-id=\"65dea23c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>A holistic and unified platform that empowers admins to control, secure, and analyse every aspect of the DNS performance, security, agility and availability whether it is on premises, in data centres, or even in the cloud.<\/li><li>By automating essential processes, eradicating solution silos and integrating into your existing ecosystem, mitigating risk proactively, every aspect of DNS are in context and leveraging DNS data for a truly intelligence Threat Protection<\/li><li>Able to revolutionize the way DNS admins view the raw data of the DNS statistics and logs providing advanced threat intelligence protections<\/li><li>Automatically monitor DNS and related service health and status and can predictively adjust capacity based on needs<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a21dca1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a21dca1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-285c4252 card mx-2\" data-id=\"285c4252\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d815748 elementor-widget elementor-widget-heading\" data-id=\"3d815748\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Solutions<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22933cfd elementor-widget elementor-widget-text-editor\" data-id=\"22933cfd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Complete cyber attack investigation tools to address the potential cyber threat.<\/li><li>Alert system for any malicious attempt to damage or disrupt a computer network or system.<\/li><li>Monitor suspicious network activity, malicious code, viruses, Trojan horses, rootkits, unauthorized data transfers, phishing attack and exploited vulnerabilities.<\/li><li>Real-time Big Data driven situational awareness. Faster decision for expedient, damage limiting actions.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Intelligence Threat Protection For Cyber Threat Management Control, Secure, and Analyse every aspect of the DNS performance Features A holistic and unified platform that empowers admins to control, secure, and analyse every aspect of the DNS performance, security, agility and availability whether it is on premises, in data centres, or even in the cloud. By [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-381","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dnsvault.net\/index.php?rest_route=\/wp\/v2\/pages\/381"}],"collection":[{"href":"https:\/\/dnsvault.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dnsvault.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dnsvault.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dnsvault.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=381"}],"version-history":[{"count":4,"href":"https:\/\/dnsvault.net\/index.php?rest_route=\/wp\/v2\/pages\/381\/revisions"}],"predecessor-version":[{"id":1539,"href":"https:\/\/dnsvault.net\/index.php?rest_route=\/wp\/v2\/pages\/381\/revisions\/1539"}],"wp:attachment":[{"href":"https:\/\/dnsvault.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}