DNS Firewall Feature Highlights

Service overview

D-Zone offers a seat-based license with three tiers designed to provide cost-effective security and content filtering for small offices while providing discounts for larger number of seats. Because security is important, small organizations aren’t giving up any features when they get the malware filtering and reporting available in D-Zone DNS Firewall.


Protection begins with data science 

Advanced malware blocking backed by a global network of servers collecting billions of pieces of data on the latest threats. This data science is used to update threat lists and adds over 100,000 new malicious domains every day. You can access and manage your security settings and reports from our D-Zone portal.

Data science built off DNS data to provide a layer of threat protection not delivered by others.

D-Zone DNS Firewall portal overview

A simple overview of threat detection activity that can be reviewed over the last 24 hours, 7 days, or 1 month. 

Snapshot of theD-Zone DNS Firewall dashboard

Drill down on threat types

A snapshot of block content based on your web filter settings, malware and phishing domains, and botnets. This can give you some indication of the types of issues targeting your organization – including those that find their way inside from different means like BYOD, shadow IT, and USB drops.

Identify what and where threats happen

Manage your security profile

Enable Google safe search and turn on and off your malware protection at the click of a button. From this view you can also manage content types and mass-block categories like adult content, gambling, cults and others. Finally, set time-of-day access to the whole internet or to specific to content types. Individual sites can be whitelisted or blacklisted as needed.

Customize your security settings

Customize messages to your users

When a user attempts to visit a malware site or blocked content you can present customized messages in their browser to tell them what went wrong and steps to take – such as emailing the threat to your IT security team.

Alert users on what actions to take when something suspicious happens

Seem simple? Then what are you waiting for? Start your 30 day free trial now!