In response to the website hack at The New York Times, I've seen some security experts advocate implementing domain-monitoring...
and domain-locking services. What value do domain security services offer, and what should enterprises look for in such services?
Ask the Expert
SearchSecurity expert Kevin Beaver is ready to answer your network security questions – submit them now! (All questions are anonymous)
As illustrated by the Syrian Electronic Army's attack on the hosting provider Melbourne IT, offloading your domain-hosting needs may not be all that it's cracked up to be -- especially when you consider the number of high-profile domains Melbourne IT was hosting. What essentially happened was that Melbourne IT's systems were hacked, its credentials were stolen and many of its domains got redirected. This redirection of domains caused websites (including www.nytimes.com) to resolve to IP addresses that hosted malware. According to several security experts involved, utilizing domain-locking services would have prevented this attack dead in its tracks.
So, to answer your question, there is substantial value in domain security services, as they can often prevent unauthorized domain redirects. In addition, domain-monitoring will alert domain administrators whenever changes are made to their Whois record.
But do these services provide 100% domain security? No. Domain services don't do much in the way of Border Gateway Protocol or BGP, redirects or other such attacks that happen outside of a network but nonetheless adversely affect it. However, if you are looking to prevent redirects and want to know about Whois record changes, these services can come in handy.
In terms of what an enterprise should look for in such offerings, I would first compare a number of vendors. If one has a reputation for being mistake-prone, look elsewhere. Secondly, evaluate the mechanics of how each vendor performs services. For example, is SSL encryption used? How are alerts delivered to domain administrators? Are there any specific components and devices that need to be embedded into existing infrastructure? These are just a few considerations that decision makers should take into account prior to finalizing a purchasing decision.
Related Q&A from Brad Casey, Contributor
Can Project Sonar, an Internet-scanning project, benefit enterprise network security? Expert Brad Casey discusses.continue reading
Does your enterprise track eliminated firewall rules? It's one of the change management best practices suggested by expert Brad Casey.continue reading
The Department of Defense is using a converged network security architecture to simplify security management. Learn about the security benefits.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.