See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

DNS Security

Disrupt attacks that use DNS for command-and-control and data theft, without requiring changes to infrastructure.

Download datasheet

80%

of known malware uses DNS to establish command-and-control

Read the white paper

2%

0.5-2% of all DNS traffic is malicious

Regain Control of Your DNS

82%

Companies experience a DNS attack

Watch Video
Disrupt DNS Attacks
Download the white paper
The Domain Name System (DNS) is wide open for attackers. According to Palo Alto Networks Unit 42 threat research, almost 80 percent of malware uses DNS to initiate command-and-control (C2), let alone use advanced evasion tactics like DNS tunneling, or the high volume of malicious domains.

It’s time to take back control of your DNS traffic.

Take advantage of predictive analytics to disrupt attacks that use DNS, automate your protections and gain tight integration with Palo Alto Networks Next-Generation Firewalls all while eliminating independent tools.
Download the white paper
Disrupt Attacks Using DNS.
Attackers abuse DNS using a multitude of techniques to deliver malware and exfiltrate data
Machine Learning Predictive analytics disrupts attacks that use DNS for C2 or data theft, while threats are rapidly identified with shared threat intelligence and machine learning.
Domain Protection DNS Security protects you against tens of millions of malicious domains identified with realtime analysis and continuously growing global threat intelligence.
Empowered Security DNS Analytics empowers security personnel with the context to optimize their security posture, confidently craft policies and rapidly remediate security events.
Consistent protection regardless of location
across hardware, software and NGFW form factors
Network Perimeter
Branch
Mobile/Remote
Read White Paper
What it means for you
Built on a modular, cloud-based architecture to seamlessly
Add new detection, prevention, and analytics without the need to change your DNS infrastructure
Integrate with our NGFW, eliminating the need for independent tools
Automate sinkholing malicious domains to cut off C2
Gain complete visibility into your DNS traffic
Avoid insecure host-based resolvers and their maintenance
Read White Paper
Related products & services
PA-Series Our physical Next-Generation Firewalls secure your business with a prevention-focused architecture and integrated innovations that are easy to deploy and use.
Explore physical appliances
Threat Prevention Goes beyond traditional IPS to prevent all known threats across all traffic in a single pass.
Discover Threat Prevention
Prisma Access Get consistent security for all your users as they access the cloud from anywhere in the world with Prisma™ Access.
Learn more
VM-Series Our virtualized Next-Generation Firewalls secure your business with a prevention-focused architecture and integrated innovations that are easy to deploy and use.
Discover virtualized appliances
URL Filtering Enables the safe use of the internet by preventing access to known and new malicious websites before they can be accessed by users.
Visit URL Filtering
Security Subscriptions Our broad range of integrated threat prevention subscription services remove complexity and strengthen your security.
Discover the full range

Recommended resources

  • All
  • All
Protecting Organizations in a World of DoH and DoT
Palo Alto Networks security experts provide an in-depth look into the risks, visibility and control of DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) traffic.
Download white paper
5 Latest Security Threats and How to Stop Them
This white paper covers the latest security threats and how to stop them using our Next-Generation Firewalls, WildFire® malware analysis, URL Filtering, DNS Security, and Threat Prevention.
Read white paper
Regain Control of Your DNS
Blocking DNS-based threats is a major challenge. This white paper covers the steps you can take to stop DNS attacks.
Download white paper
Lightboard Series: DNS Security Service
This lightboard video discusses DNS, the unique security challenges that it poses and our solution to those challenges.
Watch video
What is DNS?
DNS is as ubiquitous online as flooring is in your home – so what exactly is it, and why should you care?
Learn more here
What is DNS Tunneling?
DNS tunneling is one of the most damaging DNS attacks. What exactly is it, how does it work, and how can you defend against it?
Find out how
GlobalProtect Licensing
Leverage our DNS Tech Documentation site to find most up-to-date features and release notes.
Learn more here
Quick Links
Cybersecurity business value calculator
Cybersecurity business value calculator
Request a personalized online demo
Request a personalized online demo
Compare firewalls
Compare firewalls
Migrate to our Next-Generation Firewalls
Migrate to our Next-Generation Firewalls
Request a Security Lifecycle Review
Request a Security Lifecycle Review
Contact sales
Contact sales

Intelligent Network
Security starts here

Start rethinking cybersecurity with exclusive news, invites to events, Unit 42 threat alerts and tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.