SlideShare a Scribd company logo
1 of 8
Download to read offline
Solutions for Software and
Hardware Vendors
SafeDNS for Software and
Hardware Vendors
The internet security and web classification markets require top quality, highly sophisticated
solutions to satisfy demand of such market players as software and hardware vendors.
Depending on product specifications vendors look for an additional layer of security for
products and their users, websites classification, internet traffic analysis as well as an
opportunity to create a more precise user advertising profile.
To reach these goals the company offers vendors to integrate into their products the
SafeDNS web content filtering service or its technology for categorizing internet resources.
We provide vendors with integration-ready, cost-effective and highly scalable solutions to
allow them expand the number of their products' features, secure them from cyber threats
and get detailed insights on user behavior online.
All SafeDNS solutions are based on our own database of categorized internet resources,
SafeDNS DB with over 90M categorized sites. To make the categorization of internet
resources precise we use terabytes of DNS logs generated via the SafeDNS filtering service
and data gathered by our own farm of web crawlers. Continuous machine learning, AI and
behavior analysis, applied to this data, ensures excellent quality of our technology for internet
security and web classification.
SafeDNS integration-ready solutions are designed for:
●
Networking hardware vendors (web gateways, Wi-Fi routers, firewalls, and other network
equipment)
●
Security software developers (DLP- and DPI-systems, antiviruses, web filters, parental
controls etc.)
●
Internet application developers (antiphishing modules, advertising systems, forums, social
media sites etc.)
Our filtering services are already successfully used in networking hardware by Fält
Communications and ZYXEL around the world.
Offer customers new opportunities
Integrating SafeDNS is indispensable for:
●
Web filtering with filtering by content categories, black and white lists, safe search etc. It
allows you to monitor and filter the internet on per user or per device basis with different
settings for users of your network equipment.
●
Analyzing users' traffic to identify safety violations and create a user advertising profile.
●
Using SafeDNS DB in your software and services or the content filtering software already
installed onto your equipment.
We have a number of open APIs to integrate our services and database into third-party
products:
Categorization SDK and API. It allows to get content categories for certain websites and links
from our database via SDK or HTTP GET request to our API.
Subscription API. It allows to create users in the SafeDNS cloud service with the preset
parameters of subscription (duration and a billing plan), assign and change IP addresses,
passwords etc. This API can be used to integrate your network equipment centralized
management system with our cloud filtering service. It is usually used in conjunction with our
White Label Portal (a brand-free cloud filtering service).
Update API. Used in routers with dynamic IPs to update these addresses in the SafeDNS
cloud via the standard API similar to APIs of Dyn.com, DNS-O-MATIC etc.
JSON-RPC API. This is the core API of the entire SafeDNS service. It’s used for the
management of all user settings, signing DNS requests with user’s tokens to differentiate
users' requests on the local network and behind the NAT. This API is used in our agent
software and is the main API for integration of our service into Wi-Fi routers and other
network equipment.
Using our cloud service in the Filtered DNS mode. It does not require additional
adjustments from the user side, except for the choice of a filtering policy on the equipment or
in the management system. You can create different filtering levels, e.g. policies for different
users of the equipment. From our side – we create up to 5 unique DNS service IP addresses
on our cloud servers. Different filtering settings are applied for each of these IPs. For
example, on the first IP users get the maximum filtering level for all adult content, social
media, forced safe search in Google and Bing, restricted mode for YouTube etc. On the
second IP – medium level of filtering, where access to social media is open, safe mode for
YouTube is off. And on the third IP – everything is open, except for porn and malware
resources.
Possible ways to integrate SafeDNS
into your networking hardware
Redirecting all your customers' DNS requests to one of these addresses ensures all of them
will be filtered with the same settings considering the chosen level of filtering. You will be able
to manage filtering settings for each IP and customize block pages via your account in our
service.
Full integration of the SafeDNS cloud content filtering service into your devices for
filtering users on a local network and behind a NAT with different filtering settings.
In this case JSON-RPC API is applied. As our filtering technology is based on resolving DNS
queries, DNS packets must be modified inside your network equipment according to the
scheme below. A special token must be added to the additional section of DNS requests
coming from an end user's device. Tokens are applied to identify users on the side of SafeDNS
servers to apply the necessary filtering rules to devices of the identified users.
This kind of integration is already deployed in ZYXEL Keenetic SOHO WiFi routers and Fält
Communications Wi-Fi routers for transportation systems.
Using SafeDNS Categorization SDK for traffic analysis of your security software or
existing content filter in your hardware. In order to get websites and URLs categorized use
our special Categorization SDK and API. For high load real time systems SafeDNS
Categorization SDK should be used. For other cases we offer high speed Categorization API.
For all integration options we provide a detailed description of the solution architecture to
seamlessly integrate SafeDNS into your products. Upon additional agreement we can fully
develop an integration module for your equipment.
Big data analysis
On top of all listed options SafeDNS offers big data analysis of DNS requests from your
network equipment in order to identify malware resources and infected end user devices.
Based on machine learning and behavior analysis our classification system, already deployed
in the SafeDNS core service, is highly precise in identifying malware resources and infected
user devices requesting those resources as well as creating a precise user advertising profile.
●
Integrate and manage its filtering solutions with open APIs
●
Meet customers' expectations for enhanced protection against web threats
●
Offer customers new cool features like content filtering and network monitoring
●
Get detailed data on how web traffic is used on a network to improve security and create a
more precise customer internet usage profile
SafeDNS makes it easy for you to
We provide cloud solutions for web content filtering and internet security focusing on the telecoms
market and that of network equipment manufacturers. Our products and services are used by over 100
mobile and internet service providers to allow, block and monitor access to the web and increase
customers' safety online. The SafeDNS filtering solutions are integrated into networking hardware of
vendors selling it internationally.
The SafeDNS highly scalable distributed network is able to accommodate any number of users and
provides fast response worldwide with no latency. We process over a billion requests daily blocking
access to 9 million queries to malware and botnets. We have a global coverage with SafeDNS filtering
servers located throughout data centers in New Zealand, Europe, North and Central America with 100%
up-time during the last 5 years.
Our own farm of web crawlers gathers huge amount of data off the internet. That is why our internal
database covers billions of URLs and over 150 million websites.
The efficiency of the SafeDNS web filtering system has by now been proved twice by AV-Comparatives, a
world leading test lab. For 2 years straight our filtering service is named Approved Parental Control
Product as SafeDNS blocks porn with 98% precision and has zero false positives.
SafeDNS is Editor’s Choice for Content Management & Filtering Solutions in 2016 Cyber Defense
Magazine Infosec Awards. We create a next-generation innovation and advanced technology for
protection against web threats and making the internet cleaner and safer all our users.
This fact is recognized and emphasized with this award by the industry's leading electronic information
security magazine. The award further validates our company as an innovator in the sphere of online
security and web content filtering.
Being Internet Watch Foundation Member, SafeDNS includes in its web filtering
system and blocks URLs of indecent images of children and abuse domains from
Child Abuse Images and content list (CAIC) supporting IWF efforts to stop child abuse
and exploitation online.
SafeDNS is also Friendly WiFi Approved Provider which means our content filtering solutions are
recommended for public WiFi owners and providers seeking to ensure a safer web connection for their
users.
Why SafeDNS
Contact us
www.safedns.com
mail@safedns.com
+1-800-820-2530
+1-571-421-2990 (outside US)
901 North Pitt Street Suite #325
Alexandria VA 22314
SafeDNS was founded in 2010 for developing internet security and web filtering solutions for the
telecom market and end users. SafeDNS provides products and services for educational institutions,
home and corporate users like network operators, MSPs and VARs. Now SafeDNS solutions are used by
more than 4000 businesses and institutions and hundreds of thousands of home users worldwide.
AV-Comparatives
"SafeDNS blocked 98.1% of pornography
sites and 68% of other (harmful) sites.
It did not have false positives"
Cyber Defense Magazine
"We’re thrilled to recognize next-generation innovation in
the information security marketplace and that’s why
SafeDNS has earned this award from CDM"

More Related Content

What's hot

Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without FirewallsPriyanka Aash
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Enisa report e idas compliant eid solution
Enisa report   e idas compliant eid solutionEnisa report   e idas compliant eid solution
Enisa report e idas compliant eid solutionAli Soleymani
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBASplunk
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security BrokersAbhishek Tripathi
 
Test Automation Processes Log4j Vulnerability
Test Automation Processes Log4j VulnerabilityTest Automation Processes Log4j Vulnerability
Test Automation Processes Log4j VulnerabilityaNumak & Company
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...Priyanka Aash
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...Priyanka Aash
 
Presentación IronPort Products
Presentación IronPort ProductsPresentación IronPort Products
Presentación IronPort ProductsLogicalis Latam
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cSam Kumarsamy
 
SplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting StartedSplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting StartedSplunk
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Brochure swascan ENG
Brochure swascan ENGBrochure swascan ENG
Brochure swascan ENGSWASCAN
 
WatchGuard-CriminalMindsAdvMalware2015
WatchGuard-CriminalMindsAdvMalware2015WatchGuard-CriminalMindsAdvMalware2015
WatchGuard-CriminalMindsAdvMalware2015Serhat Cakmakoglu
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 

What's hot (20)

Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without Firewalls
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Enisa report e idas compliant eid solution
Enisa report   e idas compliant eid solutionEnisa report   e idas compliant eid solution
Enisa report e idas compliant eid solution
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Test Automation Processes Log4j Vulnerability
Test Automation Processes Log4j VulnerabilityTest Automation Processes Log4j Vulnerability
Test Automation Processes Log4j Vulnerability
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
 
Presentación IronPort Products
Presentación IronPort ProductsPresentación IronPort Products
Presentación IronPort Products
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
 
SplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting StartedSplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting Started
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Brochure swascan ENG
Brochure swascan ENGBrochure swascan ENG
Brochure swascan ENG
 
WatchGuard-CriminalMindsAdvMalware2015
WatchGuard-CriminalMindsAdvMalware2015WatchGuard-CriminalMindsAdvMalware2015
WatchGuard-CriminalMindsAdvMalware2015
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 

Viewers also liked

SafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_Romanian
SafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_RomanianSafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_Romanian
SafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_RomanianSafeDNS
 
SafeDNS_Web Filtering_Platform_for_ISP_in_Romanian
SafeDNS_Web Filtering_Platform_for_ISP_in_RomanianSafeDNS_Web Filtering_Platform_for_ISP_in_Romanian
SafeDNS_Web Filtering_Platform_for_ISP_in_RomanianSafeDNS
 
Atendimento de Emergências - Atmo Hazmat para Industrias
Atendimento de Emergências - Atmo Hazmat para IndustriasAtendimento de Emergências - Atmo Hazmat para Industrias
Atendimento de Emergências - Atmo Hazmat para IndustriasAtmo Hazmat
 
Benefits Of Managing Ethics In The Workplace
Benefits Of Managing Ethics In The WorkplaceBenefits Of Managing Ethics In The Workplace
Benefits Of Managing Ethics In The Workplacesimply_coool
 
So kommt ihr zu Content, der Google und der Zielgruppe gerecht wird
So kommt ihr zu Content, der Google und der Zielgruppe gerecht wirdSo kommt ihr zu Content, der Google und der Zielgruppe gerecht wird
So kommt ihr zu Content, der Google und der Zielgruppe gerecht wirdcrowdmedia GmbH
 
Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...
Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...
Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...Justin Medved
 
Climbing the Self-Management Mountain Range (March 2017)
Climbing the Self-Management Mountain Range (March 2017)Climbing the Self-Management Mountain Range (March 2017)
Climbing the Self-Management Mountain Range (March 2017)Lezka Rodriguez
 
The Rhythms of Life: unearthing the gems of social media data - Peter Kay
The Rhythms of Life: unearthing the gems of social media data - Peter KayThe Rhythms of Life: unearthing the gems of social media data - Peter Kay
The Rhythms of Life: unearthing the gems of social media data - Peter KayNomensa
 
10 Minimalist Strategies To Live By
10 Minimalist Strategies To Live By 10 Minimalist Strategies To Live By
10 Minimalist Strategies To Live By Dan Erickson
 
Esclavos sin derechos aniversario ibe ventanilla 2017
Esclavos sin derechos aniversario ibe ventanilla 2017Esclavos sin derechos aniversario ibe ventanilla 2017
Esclavos sin derechos aniversario ibe ventanilla 2017IBE Callao
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsNisha Patel
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS
 
Consumer Insights Overview - Premium Retail Solutions
Consumer Insights Overview - Premium Retail SolutionsConsumer Insights Overview - Premium Retail Solutions
Consumer Insights Overview - Premium Retail SolutionsWinston Ledet
 

Viewers also liked (17)

SafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_Romanian
SafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_RomanianSafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_Romanian
SafeDNS_Cloud_Web_Filtering_Service_for_ISP_in_Romanian
 
SafeDNS_Web Filtering_Platform_for_ISP_in_Romanian
SafeDNS_Web Filtering_Platform_for_ISP_in_RomanianSafeDNS_Web Filtering_Platform_for_ISP_in_Romanian
SafeDNS_Web Filtering_Platform_for_ISP_in_Romanian
 
Atendimento de Emergências - Atmo Hazmat para Industrias
Atendimento de Emergências - Atmo Hazmat para IndustriasAtendimento de Emergências - Atmo Hazmat para Industrias
Atendimento de Emergências - Atmo Hazmat para Industrias
 
Benefits Of Managing Ethics In The Workplace
Benefits Of Managing Ethics In The WorkplaceBenefits Of Managing Ethics In The Workplace
Benefits Of Managing Ethics In The Workplace
 
So kommt ihr zu Content, der Google und der Zielgruppe gerecht wird
So kommt ihr zu Content, der Google und der Zielgruppe gerecht wirdSo kommt ihr zu Content, der Google und der Zielgruppe gerecht wird
So kommt ihr zu Content, der Google und der Zielgruppe gerecht wird
 
Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...
Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...
Looking For Learning In 21st Century Classrooms - A leadership guide to suppo...
 
Climbing the Self-Management Mountain Range (March 2017)
Climbing the Self-Management Mountain Range (March 2017)Climbing the Self-Management Mountain Range (March 2017)
Climbing the Self-Management Mountain Range (March 2017)
 
Recuerdo de 24 horas
Recuerdo de 24 horasRecuerdo de 24 horas
Recuerdo de 24 horas
 
The Rhythms of Life: unearthing the gems of social media data - Peter Kay
The Rhythms of Life: unearthing the gems of social media data - Peter KayThe Rhythms of Life: unearthing the gems of social media data - Peter Kay
The Rhythms of Life: unearthing the gems of social media data - Peter Kay
 
10 Minimalist Strategies To Live By
10 Minimalist Strategies To Live By 10 Minimalist Strategies To Live By
10 Minimalist Strategies To Live By
 
Reimagine Dublin One
Reimagine Dublin OneReimagine Dublin One
Reimagine Dublin One
 
Esclavos sin derechos aniversario ibe ventanilla 2017
Esclavos sin derechos aniversario ibe ventanilla 2017Esclavos sin derechos aniversario ibe ventanilla 2017
Esclavos sin derechos aniversario ibe ventanilla 2017
 
Social Loafing
Social LoafingSocial Loafing
Social Loafing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Shifting To 21st Century Learning
Shifting To 21st Century LearningShifting To 21st Century Learning
Shifting To 21st Century Learning
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service Providers
 
Consumer Insights Overview - Premium Retail Solutions
Consumer Insights Overview - Premium Retail SolutionsConsumer Insights Overview - Premium Retail Solutions
Consumer Insights Overview - Premium Retail Solutions
 

Similar to SafeDNS for Networking Hardware Manufacturers and Software Vendors

SafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VARSafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VARSafeDNS
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...Dryden Geary
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbaiolatechsolutionsltd
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Mustafa Kuğu
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VACase StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VAMaximaSheffield592
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
Net foundry two page platform overview with use cases
Net foundry two page platform overview with use casesNet foundry two page platform overview with use cases
Net foundry two page platform overview with use casesStefan Johansson
 
Net foundry two page platform overview+use cases
Net foundry two page platform overview+use casesNet foundry two page platform overview+use cases
Net foundry two page platform overview+use casesStefan Johansson
 
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...online Marketing
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 

Similar to SafeDNS for Networking Hardware Manufacturers and Software Vendors (20)

SafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VARSafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbai
 
QCards: NAV2016 in the Cloud
QCards: NAV2016 in the CloudQCards: NAV2016 in the Cloud
QCards: NAV2016 in the Cloud
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VACase StudyAutomotive - SSLVPN case study DIGIPASS BY VA
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VA
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Net foundry two page platform overview with use cases
Net foundry two page platform overview with use casesNet foundry two page platform overview with use cases
Net foundry two page platform overview with use cases
 
Net foundry two page platform overview+use cases
Net foundry two page platform overview+use casesNet foundry two page platform overview+use cases
Net foundry two page platform overview+use cases
 
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 

More from SafeDNS

SafeDNS para puntos de acceso y proveedores de WiFi
SafeDNS para puntos de acceso y proveedores de WiFiSafeDNS para puntos de acceso y proveedores de WiFi
SafeDNS para puntos de acceso y proveedores de WiFiSafeDNS
 
Impulse la productividad y aumente la seguridad en Internet de su negocio con...
Impulse la productividad y aumente la seguridad en Internet de su negocio con...Impulse la productividad y aumente la seguridad en Internet de su negocio con...
Impulse la productividad y aumente la seguridad en Internet de su negocio con...SafeDNS
 
SafeDNS para integradores
SafeDNS para integradoresSafeDNS para integradores
SafeDNS para integradoresSafeDNS
 
SafeDNS para educación
SafeDNS para educaciónSafeDNS para educación
SafeDNS para educaciónSafeDNS
 
SafeDNS for Educational Institutions and Libraries
SafeDNS for Educational Institutions and LibrariesSafeDNS for Educational Institutions and Libraries
SafeDNS for Educational Institutions and LibrariesSafeDNS
 
Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...
Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...
Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...SafeDNS
 
SafeDNS Content Filtering Service Guide
SafeDNS Content Filtering Service GuideSafeDNS Content Filtering Service Guide
SafeDNS Content Filtering Service GuideSafeDNS
 
Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...
Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...
Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...SafeDNS
 
El valor del filtrado por DNS en el sistema de seguridad de la información en...
El valor del filtrado por DNS en el sistema de seguridad de la información en...El valor del filtrado por DNS en el sistema de seguridad de la información en...
El valor del filtrado por DNS en el sistema de seguridad de la información en...SafeDNS
 
SafeDNS Serviciul de filtrare web pentru educație bazat pe cloud
SafeDNS Serviciul de filtrare web pentru educație bazat pe cloudSafeDNS Serviciul de filtrare web pentru educație bazat pe cloud
SafeDNS Serviciul de filtrare web pentru educație bazat pe cloudSafeDNS
 
SafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & TelecomSafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & TelecomSafeDNS
 

More from SafeDNS (11)

SafeDNS para puntos de acceso y proveedores de WiFi
SafeDNS para puntos de acceso y proveedores de WiFiSafeDNS para puntos de acceso y proveedores de WiFi
SafeDNS para puntos de acceso y proveedores de WiFi
 
Impulse la productividad y aumente la seguridad en Internet de su negocio con...
Impulse la productividad y aumente la seguridad en Internet de su negocio con...Impulse la productividad y aumente la seguridad en Internet de su negocio con...
Impulse la productividad y aumente la seguridad en Internet de su negocio con...
 
SafeDNS para integradores
SafeDNS para integradoresSafeDNS para integradores
SafeDNS para integradores
 
SafeDNS para educación
SafeDNS para educaciónSafeDNS para educación
SafeDNS para educación
 
SafeDNS for Educational Institutions and Libraries
SafeDNS for Educational Institutions and LibrariesSafeDNS for Educational Institutions and Libraries
SafeDNS for Educational Institutions and Libraries
 
Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...
Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...
Caso de éxito de SafeDNS sobre la protección de cientos de puntos de acceso d...
 
SafeDNS Content Filtering Service Guide
SafeDNS Content Filtering Service GuideSafeDNS Content Filtering Service Guide
SafeDNS Content Filtering Service Guide
 
Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...
Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...
Servicio de filtrado de contenido en la nube para “Zonas WiFi gratis para la ...
 
El valor del filtrado por DNS en el sistema de seguridad de la información en...
El valor del filtrado por DNS en el sistema de seguridad de la información en...El valor del filtrado por DNS en el sistema de seguridad de la información en...
El valor del filtrado por DNS en el sistema de seguridad de la información en...
 
SafeDNS Serviciul de filtrare web pentru educație bazat pe cloud
SafeDNS Serviciul de filtrare web pentru educație bazat pe cloudSafeDNS Serviciul de filtrare web pentru educație bazat pe cloud
SafeDNS Serviciul de filtrare web pentru educație bazat pe cloud
 
SafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & TelecomSafeDNS filtering solutions for ISPs & Telecom
SafeDNS filtering solutions for ISPs & Telecom
 

Recently uploaded

Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 

Recently uploaded (20)

Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 

SafeDNS for Networking Hardware Manufacturers and Software Vendors

  • 1. Solutions for Software and Hardware Vendors
  • 2. SafeDNS for Software and Hardware Vendors The internet security and web classification markets require top quality, highly sophisticated solutions to satisfy demand of such market players as software and hardware vendors. Depending on product specifications vendors look for an additional layer of security for products and their users, websites classification, internet traffic analysis as well as an opportunity to create a more precise user advertising profile. To reach these goals the company offers vendors to integrate into their products the SafeDNS web content filtering service or its technology for categorizing internet resources. We provide vendors with integration-ready, cost-effective and highly scalable solutions to allow them expand the number of their products' features, secure them from cyber threats and get detailed insights on user behavior online. All SafeDNS solutions are based on our own database of categorized internet resources, SafeDNS DB with over 90M categorized sites. To make the categorization of internet resources precise we use terabytes of DNS logs generated via the SafeDNS filtering service and data gathered by our own farm of web crawlers. Continuous machine learning, AI and behavior analysis, applied to this data, ensures excellent quality of our technology for internet security and web classification. SafeDNS integration-ready solutions are designed for: ● Networking hardware vendors (web gateways, Wi-Fi routers, firewalls, and other network equipment) ● Security software developers (DLP- and DPI-systems, antiviruses, web filters, parental controls etc.) ● Internet application developers (antiphishing modules, advertising systems, forums, social media sites etc.) Our filtering services are already successfully used in networking hardware by Fält Communications and ZYXEL around the world.
  • 3. Offer customers new opportunities Integrating SafeDNS is indispensable for: ● Web filtering with filtering by content categories, black and white lists, safe search etc. It allows you to monitor and filter the internet on per user or per device basis with different settings for users of your network equipment. ● Analyzing users' traffic to identify safety violations and create a user advertising profile. ● Using SafeDNS DB in your software and services or the content filtering software already installed onto your equipment. We have a number of open APIs to integrate our services and database into third-party products: Categorization SDK and API. It allows to get content categories for certain websites and links from our database via SDK or HTTP GET request to our API. Subscription API. It allows to create users in the SafeDNS cloud service with the preset parameters of subscription (duration and a billing plan), assign and change IP addresses, passwords etc. This API can be used to integrate your network equipment centralized management system with our cloud filtering service. It is usually used in conjunction with our White Label Portal (a brand-free cloud filtering service). Update API. Used in routers with dynamic IPs to update these addresses in the SafeDNS cloud via the standard API similar to APIs of Dyn.com, DNS-O-MATIC etc. JSON-RPC API. This is the core API of the entire SafeDNS service. It’s used for the management of all user settings, signing DNS requests with user’s tokens to differentiate users' requests on the local network and behind the NAT. This API is used in our agent software and is the main API for integration of our service into Wi-Fi routers and other network equipment.
  • 4. Using our cloud service in the Filtered DNS mode. It does not require additional adjustments from the user side, except for the choice of a filtering policy on the equipment or in the management system. You can create different filtering levels, e.g. policies for different users of the equipment. From our side – we create up to 5 unique DNS service IP addresses on our cloud servers. Different filtering settings are applied for each of these IPs. For example, on the first IP users get the maximum filtering level for all adult content, social media, forced safe search in Google and Bing, restricted mode for YouTube etc. On the second IP – medium level of filtering, where access to social media is open, safe mode for YouTube is off. And on the third IP – everything is open, except for porn and malware resources. Possible ways to integrate SafeDNS into your networking hardware Redirecting all your customers' DNS requests to one of these addresses ensures all of them will be filtered with the same settings considering the chosen level of filtering. You will be able to manage filtering settings for each IP and customize block pages via your account in our service.
  • 5. Full integration of the SafeDNS cloud content filtering service into your devices for filtering users on a local network and behind a NAT with different filtering settings. In this case JSON-RPC API is applied. As our filtering technology is based on resolving DNS queries, DNS packets must be modified inside your network equipment according to the scheme below. A special token must be added to the additional section of DNS requests coming from an end user's device. Tokens are applied to identify users on the side of SafeDNS servers to apply the necessary filtering rules to devices of the identified users. This kind of integration is already deployed in ZYXEL Keenetic SOHO WiFi routers and Fält Communications Wi-Fi routers for transportation systems.
  • 6. Using SafeDNS Categorization SDK for traffic analysis of your security software or existing content filter in your hardware. In order to get websites and URLs categorized use our special Categorization SDK and API. For high load real time systems SafeDNS Categorization SDK should be used. For other cases we offer high speed Categorization API. For all integration options we provide a detailed description of the solution architecture to seamlessly integrate SafeDNS into your products. Upon additional agreement we can fully develop an integration module for your equipment. Big data analysis On top of all listed options SafeDNS offers big data analysis of DNS requests from your network equipment in order to identify malware resources and infected end user devices. Based on machine learning and behavior analysis our classification system, already deployed in the SafeDNS core service, is highly precise in identifying malware resources and infected user devices requesting those resources as well as creating a precise user advertising profile. ● Integrate and manage its filtering solutions with open APIs ● Meet customers' expectations for enhanced protection against web threats ● Offer customers new cool features like content filtering and network monitoring ● Get detailed data on how web traffic is used on a network to improve security and create a more precise customer internet usage profile SafeDNS makes it easy for you to
  • 7. We provide cloud solutions for web content filtering and internet security focusing on the telecoms market and that of network equipment manufacturers. Our products and services are used by over 100 mobile and internet service providers to allow, block and monitor access to the web and increase customers' safety online. The SafeDNS filtering solutions are integrated into networking hardware of vendors selling it internationally. The SafeDNS highly scalable distributed network is able to accommodate any number of users and provides fast response worldwide with no latency. We process over a billion requests daily blocking access to 9 million queries to malware and botnets. We have a global coverage with SafeDNS filtering servers located throughout data centers in New Zealand, Europe, North and Central America with 100% up-time during the last 5 years. Our own farm of web crawlers gathers huge amount of data off the internet. That is why our internal database covers billions of URLs and over 150 million websites. The efficiency of the SafeDNS web filtering system has by now been proved twice by AV-Comparatives, a world leading test lab. For 2 years straight our filtering service is named Approved Parental Control Product as SafeDNS blocks porn with 98% precision and has zero false positives. SafeDNS is Editor’s Choice for Content Management & Filtering Solutions in 2016 Cyber Defense Magazine Infosec Awards. We create a next-generation innovation and advanced technology for protection against web threats and making the internet cleaner and safer all our users. This fact is recognized and emphasized with this award by the industry's leading electronic information security magazine. The award further validates our company as an innovator in the sphere of online security and web content filtering. Being Internet Watch Foundation Member, SafeDNS includes in its web filtering system and blocks URLs of indecent images of children and abuse domains from Child Abuse Images and content list (CAIC) supporting IWF efforts to stop child abuse and exploitation online. SafeDNS is also Friendly WiFi Approved Provider which means our content filtering solutions are recommended for public WiFi owners and providers seeking to ensure a safer web connection for their users. Why SafeDNS
  • 8. Contact us www.safedns.com mail@safedns.com +1-800-820-2530 +1-571-421-2990 (outside US) 901 North Pitt Street Suite #325 Alexandria VA 22314 SafeDNS was founded in 2010 for developing internet security and web filtering solutions for the telecom market and end users. SafeDNS provides products and services for educational institutions, home and corporate users like network operators, MSPs and VARs. Now SafeDNS solutions are used by more than 4000 businesses and institutions and hundreds of thousands of home users worldwide. AV-Comparatives "SafeDNS blocked 98.1% of pornography sites and 68% of other (harmful) sites. It did not have false positives" Cyber Defense Magazine "We’re thrilled to recognize next-generation innovation in the information security marketplace and that’s why SafeDNS has earned this award from CDM"