Services Compliance About Us Customers Contact Us
SK|EN
Back to Services
07 — DNS Protection

DNS Protection (Whalebone)

Every malware communicates over DNS. Whalebone blocks malicious domains at the DNS layer — before an attack even launches. No agents on devices, no added latency.

DNS-layer
Protection before the first packet
Agentless
No changes to devices required
Threat Intel
One billion indicators per day
What's Included

DNS Protection Covering Your Entire Network

We deploy Whalebone Immunity directly into your DNS infrastructure — no agents on devices, no latency, with instant visibility into all DNS communication on the network.

Whalebone Immunity Deployment
Configuration and deployment of the Whalebone solution into your DNS infrastructure — on-premise resolver or cloud-based, depending on network architecture.
DNS Filtering at Network Layer
Blocking malicious domains directly at the DNS layer — covers all devices on the network without installing any software.
Malware C2 Domain Blocking
Severing malware communication with command-and-control servers — an infected device cannot receive commands or exfiltrate data.
Phishing Domain Blocking
Protecting users from phishing — malicious URLs are blocked at the DNS layer before the page loads in the browser.
CSAM Filtering
Mandatory filtering of illegal content under Slovak law — automatically active for ISPs and organisations with public networks.
DNS Tunnelling Detection
Identifying data exfiltration attempts via DNS protocol — a technique used by APT groups to bypass firewalls and DLP solutions.
Threat Intelligence Feed
Continuously updated feed of billions of IoCs from global sources — Whalebone processes over one billion DNS queries per day for maximum detection.
Security Incidents Dashboard
Clear dashboard with detected threats, blocked domains, incident trends and a list of affected devices on the network.
Granular Policy per Segment
Different filtering policies for different network segments — separate rules for IT, OT, guest network or BYOD devices.
Management Reports
Monthly security reports for management — number of blocked threats, trend, attack categories and organisational security score.
SIEM Integration
Export of DNS events and security alerts to the SIEM system for correlation with other security sources and centralised monitoring.
NIS2/ZKB Compliance Reports
Automatically generated reports demonstrating implementation of network security protection for NIS2 and Cybersecurity Act audits.
Who It's For

Who Needs DNS Protection

  • Organisations with an internal network — from 50 devices, where every device is a potential attack vector
  • Internet service providers (ISPs) with CSAM filtering obligations and customer protection duties
  • Schools, universities and educational institutions needing content filtering and network protection
  • Healthcare facilities with strict network security and data protection requirements
  • NIS2 and Cybersecurity Act entities required to implement network communication protection
  • Companies with OT/IoT devices that cannot have a security agent installed
Problems We Solve

What DNS Protection Stops

  • Malware C2 communication — infected device undetected for a month, transmitting data to the attacker
  • Ransomware encryption keys downloaded via DNS before data encryption begins
  • Phishing attacks succeeding because the browser loads the page before antivirus evaluates it
  • DNS tunnelling exfiltrating sensitive data via DNS queries that firewalls don't block
  • IoT/OT devices without an agent communicating with malicious servers undetected
  • No visibility into DNS traffic — not knowing what is happening on the network
Regulatory Requirements

DNS Protection in the Context of NIS2 and ZKB

Network security including DNS filtering is an explicit part of the technical measures required by NIS2 and the Slovak Cybersecurity Act.

ZKB
Act No. 69/2018 Coll.
The Cybersecurity Act requires essential services to implement network and information system protection measures, including network communication monitoring and threat blocking.
NIS2
Article 21 — Network Security
NIS2 requires technical measures for network system security including threat detection and prevention at the network layer for essential and important entities.
GDPR
Personal Data Protection
DNS filtering prevents personal data leaks via malware and phishing — directly contributing to technical data protection measures under Article 32 GDPR.

Protect Your Network at the DNS Layer from Tomorrow

We deploy Whalebone Immunity without downtime and without agents on devices. Contact us for a free demo and implementation proposal.