gigaom.com
Open in
urlscan Pro
141.193.213.21
Public Scan
Submitted URL: https://ftjs-zgph.maillist-manage.net/click/1e5d041a3740eea5/1e5d041a37412161
Effective URL: https://gigaom.com/report/gigaom-radar-for-domain-name-system-dns-security/
Submission: On May 10 via api from TR — Scanned from DE
Effective URL: https://gigaom.com/report/gigaom-radar-for-domain-name-system-dns-security/
Submission: On May 10 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOMGET /research/
<form role="search" method="get" action="/research/" class="search-form d-none">
<a href="#close-search" title="Close Search" class="close-search-button" aria-label="Search"></a>
<input type="search" class="field search-field form-control" value="" name="s" aria-label="Search" placeholder="Search...">
<button class="submit search-submit btn btn-primary">Search</button>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/6337266/4678bc54-8535-40a7-97b3-44ac697dcbbd
<form id="hsForm_4678bc54-8535-40a7-97b3-44ac697dcbbd" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/6337266/4678bc54-8535-40a7-97b3-44ac697dcbbd"
class="hs-form-private hsForm_4678bc54-8535-40a7-97b3-44ac697dcbbd hs-form-4678bc54-8535-40a7-97b3-44ac697dcbbd hs-form-4678bc54-8535-40a7-97b3-44ac697dcbbd_bd388a7b-6290-4a45-be67-39b71da2c149 hs-form stacked hs-custom-style"
target="target_iframe_4678bc54-8535-40a7-97b3-44ac697dcbbd" data-instance-id="bd388a7b-6290-4a45-be67-39b71da2c149" data-form-id="4678bc54-8535-40a7-97b3-44ac697dcbbd" data-portal-id="6337266"
data-test-id="hsForm_4678bc54-8535-40a7-97b3-44ac697dcbbd">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="form-label" placeholder="Enter your Email"
for="email-4678bc54-8535-40a7-97b3-44ac697dcbbd"><span>Email</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-4678bc54-8535-40a7-97b3-44ac697dcbbd" name="email" required="" placeholder="" type="email" class="hs-input form-control" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_domain_of_interest hs-domain_of_interest hs-fieldtype-checkbox field hs-form-field"><label id="label-domain_of_interest-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="form-label" placeholder="Enter your Domain of Interest"
for="domain_of_interest-4678bc54-8535-40a7-97b3-44ac697dcbbd"><span>Domain of Interest</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input">
<ul required="" role="checkbox" class="inputs-list multi-container">
<li class="hs-form-checkbox form-check" role="checkbox"><input id="domain_of_interest0-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-input form-check-input" type="checkbox" name="domain_of_interest"
value="Cloud, Infrastructure & Management"><label for="domain_of_interest0-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-form-checkbox-display form-label form-check-label"><span>Cloud, Infrastructure & Management</span></label>
</li>
<li class="hs-form-checkbox form-check" role="checkbox"><input id="domain_of_interest1-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-input form-check-input" type="checkbox" name="domain_of_interest" value="Data, Analytics & AI"><label
for="domain_of_interest1-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-form-checkbox-display form-label form-check-label"><span>Data, Analytics & AI</span></label></li>
<li class="hs-form-checkbox form-check" role="checkbox"><input id="domain_of_interest2-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-input form-check-input" type="checkbox" name="domain_of_interest" value="DevOps"><label
for="domain_of_interest2-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-form-checkbox-display form-label form-check-label"><span>DevOps</span></label></li>
<li class="hs-form-checkbox form-check" role="checkbox"><input id="domain_of_interest3-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-input form-check-input" type="checkbox" name="domain_of_interest" value="Network & Edge"><label
for="domain_of_interest3-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-form-checkbox-display form-label form-check-label"><span>Network & Edge</span></label></li>
<li class="hs-form-checkbox form-check" role="checkbox"><input id="domain_of_interest4-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-input form-check-input" type="checkbox" name="domain_of_interest"
value="People, Processes & Applications"><label for="domain_of_interest4-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-form-checkbox-display form-label form-check-label"><span>People, Processes & Applications</span></label></li>
<li class="hs-form-checkbox form-check" role="checkbox"><input id="domain_of_interest5-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-input form-check-input" type="checkbox" name="domain_of_interest" value="Security & Risk"><label
for="domain_of_interest5-4678bc54-8535-40a7-97b3-44ac697dcbbd" class="hs-form-checkbox-display form-label form-check-label"><span>Security & Risk</span></label></li>
</ul>
</div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By clicking submit, you consent to allow GigaOm to store and process the personal information you’ve submitted.</p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large btn btn-primary" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1715337823002","formDefinitionUpdatedAt":"1692817735153","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[7281062],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":7849397,\"label\":\"<p>I agree to receive other communications from GigaOm.</p>\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"<p>GigaOm is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:</p>\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"<p>In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.</p>\",\"processingConsentCheckboxLabel\":\"<p>I agree to allow GigaOm to store and process my personal data.</p>\",\"privacyPolicyText\":\"<p>By clicking submit, you consent to allow GigaOm to store and process the personal information you’ve submitted.</p>\",\"isLegitimateInterest\":true}","embedType":"REGULAR","disableCookieSubmission":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36","pageTitle":"GigaOm Radar for Domain Name System (DNS) Security - Gigaom","pageUrl":"https://gigaom.com/report/gigaom-radar-for-domain-name-system-dns-security/","isHubSpotCmsGeneratedPage":false,"formTarget":"#hbspt-form-bd388a7b-6290-4a45-be67-39b71da2c149","rumScriptExecuteTime":1689.1999988555908,"rumTotalRequestTime":1947,"rumTotalRenderTime":2120.5,"rumServiceResponseTime":257.8000011444092,"rumFormRenderTime":173.5,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1715337823267,"originalEmbedContext":{"portalId":"6337266","formId":"4678bc54-8535-40a7-97b3-44ac697dcbbd","region":"na1","target":"#hbspt-form-bd388a7b-6290-4a45-be67-39b71da2c149","isBuilder":false,"isTestPage":false,"isPreview":false,"css":"","cssRequired":"","isMobileResponsive":true},"correlationId":"bd388a7b-6290-4a45-be67-39b71da2c149","renderedFieldsIds":["email","domain_of_interest"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.5064","sourceName":"forms-embed","sourceVersion":"1.5064","sourceVersionMajor":"1","sourceVersionMinor":"5064","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1715337823089,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"onFormReady\"]"},{"clientTimestamp":1715337823089,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"GigaOm Radar for Domain Name System (DNS) Security - Gigaom\",\"pageUrl\":\"https://gigaom.com/report/gigaom-radar-for-domain-name-system-dns-security/\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36\",\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1715337823090,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""}]}"><iframe
name="target_iframe_4678bc54-8535-40a7-97b3-44ac697dcbbd" style="display: none;"></iframe>
</form>
Text Content
Skip to content MAIN NAVIGATION Gigaom * Research * MethodologyLearn about GigaOm’s methodological process for its research * Research CalendarIn-depth reports on this year’s topics and technology needs. * Analyst VideosExplore our video library of analyst appearances. * AI, Data & AnalyticsLearn key criteria for evaluating Data Infrastructure. * Security & RiskLearn key criteria for evaluating Security & Risk. * Cloud, Infrastructure & ManagementLearn key criteria for moving and operating in the cloud. * DevOpsLearn key criteria for evaluating DevOps solutions. * Network & EdgeLearn key criteria for evaluating Edge solutions. * People, Processes, & ApplicationsLearn key criteria for evaluating Applications. * View All Research * For Vendors * Customer Centric Enablement and ActivationIncrease lead generation, sales conversion rates and grow revenue. * Total Cost of Ownership & Engineering BenchmarksShorten your sales cycle with rigorous, test-driven reports that quantify value. * RadarsProve your mettle with competitive analysis that spotlights your solutions. * Key CriteriaIn-depth decision-making frameworks that enlighten and guide IT acquisitions. * Advisory ServicesBuild your strategy with Fortune 500 CIO and CTO decision makers. * Enterprise SubscriptionGain first-mover advantage with insights from our research community. * Value EngineeringHelp prospective customers to adapt their workflows to new technology. * Vendor Marketing Content ReviewGet the word out while maintaining the GigaOm brand. * Analysts * Insights * Case StudiesLearn about participating in GigaOm research. * BlogRead GigaOm blogs for quick insight into your industry. * Press RoomStay up to date with the latest company announcements. * Company * Why GigaOmLearn why GigaOm is right for you and your organization. * Our TeamMeet the entire GigaOm team. * PartnersExplore opportunities to partner with GigaOm. * CareersExplore career opportunities to join GigaOm. * Contact usLooking for the best way to get in touch with us? * Login * Login Search Subscribe to GigaOm 1-Week Trial Sign up today for a GigaOm research subscription * Tweet * Share * Post Paul Stringfellow Feb 29, 2024 (Feb 22, 2024) GIGAOM RADAR FOR DOMAIN NAME SYSTEM (DNS) SECURITYV2.0 TABLE OF CONTENTS 1. Executive Summary 2. Market Categories and Deployment Types 3. Decision Criteria Comparison 4. GigaOm Radar 5. Solution Insights 6. Analyst’s Outlook 7. Methodology 8. About Paul Stringfellow 9. About GigaOm 10. Copyright 1. EXECUTIVE SUMMARY The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of communications and the means by which clients connect with services both internally and externally. It is a service so fundamental to the basic day-to-day operations of every network that it must be both ultra-secure and resilient. However, the reality is that it is not. In fact, the DNS is vulnerable. Attacks of all types that can undermine the DNS, such as cache poisoning, DNS hijacking, amplification, spoofing, and tunneling, continue to increase. The impact of a DNS cyberattack on an enterprise can be devastating. It can result in the loss of sensitive data, deployment of malicious code, and denial of access to key services, all of which can result in significant financial losses and reputational damage. Protecting DNS should be a priority, and that means using a solution with a range of security capabilities. A good DNS security solution has a unique value in the overall security chain. This stems from its operation early in the communications process. The vast majority of malicious activity in an infrastructure will make a DNS call; by securing and identifying malicious calls at inception, proactive security can be implemented from the beginning of an attack, helping secure an organization more effectively. The information gained from a DNS security solution can also greatly enhance an organization’s risk analysis and threat response, providing a rich source of data for security teams and improving resilience, availability, and operational stability. DNS security is often overlooked, as it lacks the high profile of other security threat vectors. However, DNS communication is a fundamental part of IT infrastructure and very few systems and organizations can operate without it. Safeguarding it should be an essential part of an organization’s security planning, and the right solution will improve the security of DNS as well as deliver improvements across the broader stack. DNS security has the potential to provide a strong return on investment and should be part of every organization’s security strategy. This is our second year evaluating the DNS security space in the context of our Key Criteria and Radar reports. This report builds on our previous analysis and considers how the market has evolved over the last year. For this evaluation, we’ve updated our inclusion criteria to only include vendors that provide DNS security as a discrete service. The DNS security must be a standalone offering, either a specific solution or, if part of a broader portfolio, able to be deployed and licensed on its own, without the need to include other services. This ruled out some vendors we had included previously that only offered DNS security as part of firewalls or secure internet gateways where DNS could not be unbundled. Additionally, we’re not including vendors that offer authoritative DNS solutions, where it’s required that a user’s DNS infrastructure moves to the vendor’s platform. This is a separate area of DNS security and needs to be evaluated as such. Instead, this report focuses on solutions that offer DNS security for DNS resolution and client end use and those that provide security to DNS infrastructure. The idea is to ensure greater consistency among vendors and to make comparison easier. Despite the elimination of some vendors, the changes resulted in an increase in the number of vendors included in our report. This GigaOm Radar report examines 11 of the top DNS security solutions and compares offerings against the capabilities (table stakes, key features, and emerging features) and nonfunctional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading DNS security offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision. GIGAOM KEY CRITERIA AND RADAR REPORTS The GigaOm Key Criteria report provides a detailed decision framework for IT and executive leadership assessing enterprise technologies. Each report defines relevant functional and nonfunctional aspects of solutions in a sector. The Key Criteria report informs the GigaOm Radar report, which provides a forward-looking assessment of vendor solutions in the sector. RELATED RESEARCH Key Criteria VP/Architect Paul Stringfellow Apr 24, 2024 GIGAOM KEY CRITERIA FOR EVALUATING IDENTITY THREAT DETECTION AND RESPONSE (ITDR) SOLUTIONS Identity management is an essential part of any organization’s IT infrastructure because it serves as the means to control access to… Read More Radar Engineer Ivan McPhee May 8, 2024 (May 1, 2024) GIGAOM RADAR FOR SECURITY SERVICE EDGE (SSE) Designed to address the evolving needs of modern enterprises as they navigate the complexities of cloud adoption, remote work, and digital… Read More Blog Chris Ray Apr 26, 2024 THE QUEST FOR EXTENDED DETECTION AND RESPONSE (XDR): UNRAVELING CYBERSECURITY’S NEXT GENERATION Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was… Read More Radar Engineer Chris Ray Apr 24, 2024 (Apr 16, 2024) GIGAOM RADAR FOR EXTENDED DETECTION AND RESPONSE (XDR) Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are typically combined with a security information and event management (SIEM)… Read More Key Criteria VP/Architect Paul Stringfellow Apr 19, 2024 GIGAOM KEY CRITERIA FOR EVALUATING DATA SECURITY POSTURE MANAGEMENT (DSPM) SOLUTIONS Data is core to all organizations and should be treated as an essential asset. As the data landscape continues to evolve,… Read More CxO Decision Brief CxO Comissioned Research Howard Holton Apr 17, 2024 (Apr 25, 2024) CXO DECISION BRIEF: ELEVATE CYBER RESILIENCE WITH COMMVAULT CLOUD CLEANROOM RECOVERY This GigaOm CxO Decision Brief commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery has emerged as a pivotal solution for organizations and… Read More FULL CONTENT AVAILABLE TO GIGAOM SUBSCRIBERS. Sign Up For Free Gigaom Knowingly Corporation 3905 State Street #7-448 Santa Barbara, CA 93105-5107 SUBSCRIBE TO OUR MONTHLY ANALYST INSIGHTS NEWSLETTER Stay on top of emerging trends by joining our newsletter, a monthly publication from our leading network of analysts. Subscribe Now Email* Domain of Interest* * Cloud, Infrastructure & Management * Data, Analytics & AI * DevOps * Network & Edge * People, Processes & Applications * Security & Risk By clicking submit, you consent to allow GigaOm to store and process the personal information you’ve submitted. RESEARCH * Methodology * Research Calendar * Analyst Videos * AI, Data & Analytics * Security & Risk * Cloud, Infrastructure & Management * DevOps * Network & Edge * People, Processes, & Applications * View All Research FOR VENDORS * Customer Centric Enablement and Activation * Total Cost of Ownership & Engineering Benchmarks * Radars * Key Criteria * Advisory Services * Enterprise Subscription * Value Engineering * Vendor Marketing Content Review INSIGHTS * Case Studies * Blog * Press Room COMPANY * Why GigaOm * Our Team * Partners * Careers * Contact us * LinkedIn * Twitter * Facebook * YouTube * Instagram * Reddit * Spotify * Privacy Policy * MSA * Terms of Service * Code of Conduct * © GigaOm All Rights Reserved 2024 This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept Privacy & Cookies Policy Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities... Necessary Necessary Always Enabled This is an necessary category. Save & Accept