|In-network technology used to apply management policies to traffic is only part of a complete solution. Rounding out many of Nominum’s applications is the Global Intelligence Xchange. As a cloud-based service, Global Intelligence Xchange takes advantage of massive volumes of diverse DNS data (malicious and otherwise) to algorithmically process the information for downstream policies. Prior to delivering any of the many available list services to Vantio engines, all records are validated by Nominum experts to provide industry-best coverage to ensure proper categorization and the elimination of false positives.|
Research and analysis team
Nominum has a full team dedicated solely to threat analysis of multiple data inputs for categorization and identifying potentially malicious domains and further analyzing the impact they have on provider networks or policies.
Worldwide data streams
Working with Service Providers from around the world, Nominum collects anonymized DNS data which is used for both historic and real-time analysis to create the many lists Nominum applications and Vantio engines rely on for policy control.
Leading threat classification
Leveraging the data analysis team, the GIX has been proven in production to have the highest detect rate and lowest false positive rate. GIX does not rely on simple repackaging of widely available free lists.
Tight feedback loop
Specifically for Vantio ThreatAvert, GIX receives and processes worldwide DNS data, uncovering new malware trends. and Updated threat lists are distributed in minutes.