Dualog® Protect

Protecting your vessels

Take your cybersecurity to new heights

Introducing Dualog® Protect - a better way to make your fleet safer. The Dualog® Protect service stops most malware, ransomware, trojan and phishing attempts, ultimately blocking unsafe or suspicious internet resources before any harm is done by monitoring all activity at the DNS-level. The service is easy to set up and configure to your requirements for what types of content you wish to block. You can easily create company policies to allow certain services or sites and preventing others.

 

New call-to-action

Safe browsing

You can safely allow for Internet services across your entire fleet with improved security

  • Stops most malware, ransomware, trojan and phishing attempts
  • Stop most command-and-control (C2) callbacks and data exfiltrations
  • Protects every device or user within your network
  • Identifies infected machines on the «inside»
  • Significantly reduce the risk of incidents or security breaches
  • Internet access for all purposes can safely be allowed for
Dualog® Protect blocks most ransomware, trojans and phishing attempts and also prevents “command-and-control callbacks” and data exfiltration*. By operating at the DNS-level, the service protects all computers and devices attached to all onboard networks.

As the number of onboard systems requiring online connectivity is increasing, Dualog® Protect provides the level of protection you need to provide connectivity across your fleet without compromising security.

*According to a Cisco Security Research paper, 91.3 % of malware uses DNS in attacks. Consequently, adding DNS filtering as a security measure at a global level is an essential part of a robust cybersecurity approach. By setting up an extra layer of defence to your IT operations, you drastically reduce the risk of malware attacks. attacks. 

dualog_protect_dnsconcept

Cybersecurity surveillance and reporting

Act rapidly when an incident occurs

  • Provide administrators with a comprehensive and up-to-date overview of their cybersecurity status
  • Allows administrators to focus on what is important
  • Monitoring can be part of a cybersecurity certification process
  • Use Dualog® Protect to present and analyse cybersecurity statistics
  • Identify problem areas
  • Optimise system configuration
 
Cybersecurity surveillance and centralised reporting tools enable IT Administrators to monitor the health of onboard systems and to respond instantly should an incident occur. 

surveillance_and_reporting

Easy to implement

Get started in a matter of minutes

 
 
  • Easy fleet-wide configuration with rules for which Internet services are blocked and which are allowed
  • Set the right level of policy control on Internet traffic
  • Optimise use of Internet infrastructure by reducing unwanted data traffic
  • Optimise ROI on Internet infrastructure
 
Dualog® Protect is easy to implement and allows you to centrally configure content-type and access policies across the fleet. 

Contact sales

dualog_protect_illustration

Summary

Features*
  • Simple to implement onboard

  • Fleet-wide management with a single policy **

  • Includes sophisticated and flexible reporting tools ***

  • Provides administrators with a clear overview regarding what has been blocked and why

  • Identifies problem networks and devices

  • Prevents malware, ransomware, trojan and phishing attempts at the DNS level

  • Prevents command-and-control (C2) call-backs and related data exfiltration

  • Utilises Big Data and data mining methods to predict attacks

  • Identifies suspicious domains by aggregating and analysing DNS-related data

  • Constantly analyses and detects anomalies and suspicious patterns to stay ahead of hackers and cyber-criminals

 

Dualog Protect is subject to our Standard Terms and Conditions.

Main benefits

Seamlessly protects every device attached to your onboard networks
Reduces the risk of cyber-related incidents and security breaches
Identifies "already infected" onboard systems, machines and devices
Optimises use of internet infrastructure and bandwidth by reducing unwanted traffic
Forms part of a robust cybersecurity policy by adding an essential layer of defence
Ensures safer business and crew internet access
Download free Product Sheet