Published in Dualog, cybersecurity, all | 4 minutes reading time

Dualog® Protect – easily explained

Stay up to date!

* By subscribing to the latest news from our blog, you consent to us storing your email address, and sending you monthly emails. You can, at any time, retract this consent.

In today’s world of connected ships, onboard computers and devices can access an infinite number of internet resources, leaving them vulnerable to continually evolving threats.

According to a Cisco Security Research paper, 91.3% of malware uses DNS in attacks. Consequently, adding some sort of security measure at a global level should be an essential part of your cyber risk management. By setting up an extra layer of defence to your IT operations, you drastically reduce the risk of malware attacks.

Last year, Dualog took shipboard cybersecurity to a higher level by launching our new service Dualog® Protect. The service provides a robust additional layer of security that is easy to implement.

Let’s take a closer look at what Dualog® Protect offers, and why you should consider implementing the service onboard your ships.


Safe browsing

Using Dualog® Protect, you can safely allow for Internet services across your entire fleet without compromising security.

Dualog® Protect blocks ransomware, Trojan and phishing attempts as well as preventing “command-and-control call-backs” and data exfiltration. By operating at the DNS-level, the service protects all computers and devices attached to all onboard networks.


Cybersecurity surveillance and reporting

Providing cybersecurity surveillance and centralised reporting tools, Dualog® Protect allows your IT administrators to monitor your onboard systems' health and respond instantly should an incident occur. You can...

  • Provide administrators with a comprehensive and up-to-date overview of their cybersecurity status
  • Allows administrators to focus on what is important
  • Use Dualog® Protect to present and analyse cybersecurity statistics
  • Identify problem areas
  • Optimise system configuration

Moreover, monitoring can be part of a cybersecurity certification process.


Easy to implement

Dualog® Protect is easy to set up and configure to your own requirements for what types of content you wish to block. You can even design company policies* to only allow certain services or sites and blocking others.

Get started using the service in a matter of minutes:

  • Easy fleet-wide configuration with rules for which Internet services are blocked and which are allowed
  • Set the right level of policy control on Internet traffic
  • Optimise use of Internet infrastructure by reducing unwanted data traffic

Read more: How to deal with malware in the maritime sector



By setting up the extra layer of defence that Dualog® Protect provides, you will drastically reduce the risk of cyberattacks hitting your ships. Thus, you can safely allow for Internet services across your entire fleet without compromising security.

The service provides fleet-wide policy management to control activity and manage access to specific types of Internet content.


  • Easy to implement onboard
  • Fleet-wide management with a single policy
  • Includes sophisticated and flexible reporting tools
  • Provides administrators with a clear overview of what has been blocked and why
  • Identifies problem networks and devices
  • Prevents malware, ransomware, Trojan and phishing attempts at the DNS level
  • Prevents command-and-control (C2) call-backs and related data exfiltration
  • Utilises Big Data and data mining methods to predict attacks
  • Identifies suspicious domains by aggregating and analysing DNS-related data
  • Constantly analyses and detects anomalies and suspicious patterns to stay ahead of hackers and cybercriminals


  • Seamlessly protects every device attached to your onboard networks
  • Reduces the risk of cyber-related incidents and security breaches
  • Identifies “already infected” onboard systems, machines and devices
  • Optimises use of internet infrastructure and bandwidth by reducing unwanted traffic
  • Forms part of a robust cybersecurity policy by adding an essential layer of defence
  • Ensures safer business and crew internet access


Webinar: Dualog Protect

Dualog® Protect – easily explained
Written by Rune Larsen, Service Marketing Manager

Rune Larsen is Service Marketing Manager in Dualog, with responsibilities for user experience design, visual design and marketing of existing and new services. Educated in business strategy and marketing from the Arctic University of Norway, he has more than 25 years of experience from the creative industry, where he worked as a writer, consultant, designer and creative director in various advertising agencies and design studios. He's been orchestrating brand identity projects, design work and brand building campaigns for a wide range of organisations. He brings a passion for great design to the team, never compromising on the importance of the 'experience' part of UX. When not at the office, he enjoys hiking with his wife or is busy being a football coach for his youngest daughter. His fitness regime involves either running or cross-country skiing. Rune is an avid reader of business-related books, and he loves the occasional bottle of Barolo.

Related blog posts