Can Your SWG stop Data Exfiltration?

In a typical DNS Tunneling attack, an attacker encodes sensitive data in subdomains of DNS queries.
When the DNS quersies reach the attacker's name server, stolen data is decoded and reassembled.

Unauthorised File Upload Simulation

Drag and drop or click to upload a file

Maximum file size: 100 KB

File will be deleted from the server in 10 minutes

Your SWG must be able to detect and limit DNS Tunneling, while ensuring a threshold for business traffic