Cloud-delivered network security. Protects any device, anywhere.
Malware and breach protection
We deliver security at the DNS layer, using the Internet’s existing infrastructure, to keep malware from compromising your systems and to stop botnets or phishing from exfiltrating your data.
Leverage our up-to-the-minute view and analysis of 2% of the world’s Internet activity to stay ahead of attacks. Enhance your threat intelligence by seeing where attacks are being staged on the Internet.
In seconds, our cloud platform displays your global activity from all locations. Instantly, identify targeted attacks by comparing your activity—over any port, protocol, or app—to the rest of the world.
It just works
By just pointing DNS to us, security is simple to deploy. By enforcing security in the cloud, Umbrella is easy to manage. No hardware to install. No software to maintain. Nothing you need to update.
Umbrella enforces security at the DNS and IP layers, using the Internet’s existing infrastructure to prevent phishing from compromising systems and exfiltrating data over any port or protocol.
View security activity in real time with globally aggregated reports. Schedule and send these reports to your inbox. And retain your logs forever with our Amazon S3 integration.
Pinpoint devices infected or users targeted by advanced attacks to reduce the time to remediation.
Comply with internal acceptable use policies or regulatory requirements with up to 60 content categories. And gain visibility into how up to 1800 cloud services are being used.
OpenDNS Security Graph automates protection against known and emergent threats by analyzing a cross-section of the world’s Internet activity to identify infrastructure being staged before an attack is launched.
Layer predictive security to complement signature-based or real-time, behavior-based security.
Access our global threat intelligence to expand visibility beyond the network activity from your devices and sites.
OpenDNS protects devices anywhere and stays up-to-date without admin intervention because there is no hardware to install or software to maintain.
Secure any on-network device–even those you don’t own—by changing one setting on any existing network egress (router, Wi-Fi access point, DNS or DHCP server) you manage.
Secure off-network devices—no matter where they’re located—by deploying a lightweight roaming client that forwards DNS requests and tunnels only suspect IP connections to our global network.
Take immediate action on IOCs aggregated by threat intelligence platforms—ThreatConnect or custom in-house systems—to reduce the time between detection and prevention from days to seconds.