Skip to main content

Service Overview

D-Zone offers a seat-based license designed to provide cost-effective security and content filtering for small offices while providing discounts for larger number of seats. This important layer of protection is delivered to all organization types, regardless of size.

Protection begins with data science

Advanced malware blocking backed by a global network of servers collecting billions of pieces of data on the latest threats. This data science is used to update threat lists and adds over 100,000 new malicious domains every day. You can access and manage your security settings and reports from our D-Zone portal.

D-Zone DNS Firewall portal overview

An easy to read overview of threat detection activity that can be reviewed to track malware, phishing, botnet and web filtering results on the network. Reports on both HTTP and HTTPs block activity.

Multiple networks can be rolled-up into a single view. 

Drill down on threat types

A snapshot of block content based on your web filter settings, malware and phishing domains, and botnets. This can give you some indication of the types of issues targeting your organization – including those that find their way inside from different means like BYOD, shadow IT, and USB drops.

Manage your security profile

Enable Google safe search and turn on and off your malware protection at the click of a button. From this view you can also manage content types and mass-block categories like adult content, gambling, cults and others.

Set time-of-day access to the whole internet or to specific to content types. Individual sites can be whitelisted or blacklisted as needed.

Customize messages to your users

When a user attempts to visit a malware site or blocked content you can present customized messages in their browser to tell them what went wrong and steps to take – such as emailing the threat to your IT security team.

API Integration

For organizations using a SIEM, a client management platform, or other dashboards, the API lets them easily integrate on-boarding, threat profiling and reporting.