You are here:

PROTECT

Internet Security, Visibility & Control

A cloud-based DNS security solution, enabling you to take control of user internet access and protect your business against online threats such as malware, phishing, malicious and fraudulent websites.

PROTECT is not only essential to any business with zero cyber defence, but also works well with existing cyber defence solutions, enabling an additional layer of security and visibility at an affordable price.

SECURE YOUR BUSINESS, CONTROL INTERNET ACCESS, AND GAIN VALUABLE INSIGHT INTO ONLINE ACTIVITY.

SIMPLIFIED DEPLOYMENT

Sign up, protect, and configure your internet connection through our easyto-use dashboard,all within a few minutes.

EXPAND EXISTING CYBER DEFENCE

Get instant threat protection by integrating PROTECT to compliment your existing cyber solution thereby introducing an additional layer of security and reporting - enhancing your cyber defence and visibility.

COVERAGE

Spanning more than 99.9%+ coverage of the internet with features such as built-in automatic malicious detection and classification of emerging threats through the use of AI.

EFFECTIVE CONTROL & SECURITY

Add additional security against malware, block phishing attacks, ransomware, time-wasting, and compromised websites by limiting users that could put your network at risk.

VISIBILITY & AFFORDABILITY

You don’t know what you cannot see. With PROTECT you gain 24/7 access to realtime centralized reporting, providing valuable insight into internet usage, usage trends and security threats.

FAST & RELIABLE DNS SERVICE

Our DNS solution is built upon a robust network service hosted in a neutral datacentre, serving multiple networks, and providing fast connectivity on one of the largest internet exchanges in the southern hemisphere - ensuring your users will experience faster internet speeds

WHAT HAPPENS IF YOU DON’T COMPLY WITH POPI

THE POPI ACT AIMS TO PROTECT SOUTH AFRICANS' RIGHT TO PRIVACY BY REGULATING HOW PERSONAL INFORMATION IS PROCESSED BY MARKETING COMPANIES AND OTHERS. FAILURE TO COMPLY WITH THE ACT WILL RESULT IN A HEFTY FINE OF UP TO R10 MILLION, OR JAIL TIME. IT SAYS THAT THE RESPONSIBLE PARTY MUST EMPLOY "APPROPRIATE, REASONABLE TECHNICAL AND ORGANIZATIONAL MEASURES" DESIGNED TO PREVENT BOTH UNLAWFUL ACCESS AND THE LOSS OR DAMAGE OF THE PERSONAL INFORMATION.

HOW DOES IT WORK?

Internet Security, Visibility & Control

Every internet connection requires at least one reliable DNS server to work, without which, devices on your network would be unable to locate or communicate with internet services.

Every DNS query (malicious or not) originating from your internet connection is an actual attempt by a device on your network to locate and connect to an internet service.

Most of these queries originate from PC’s, laptops, and phones as background services without users even knowing. The ability to inspect and report on your internet connections DNS queries is not only vital to securing your network but also essential to controlling your users’ internet access.

PROTECT is a reliable, fast, cloud-based DNS filtering service, which inspects every single DNS query originating from your internet connection, thereby enabling you to protect your network against online threats and take control of internet usage.

“Every internet connection requires a DNS service, Why then not use a reliable security filtering service, such as Protect, to add a layer of visibility, cyber defence and control to your internet connection?”

Our PROTECT URL and Threat Detection solution has got you covered. 

Integrated with our partner networks, our protection database has over

100 million
devices which continuously contribute to our threat feed database.

This mass continuous device contribution, along with our AI driven threat identification technology

means we detect emerging threats, thereby providing your internet connection with PROTECT Zero-Day defence.

AI-BASED THREAT DETECTION AND URL CLASSIFICATION

PROTECT provides unmatched visibility, accuracy, and coverage through its Partner networks of over 600+ million users.

MALWARE AND PHISHING PROTECTION

Protect your business against malware, ransomware, phishing and more. Gain visibility into targeted attacks and report on malicious activity all driven through an intuitive dashboard

INFORMATIVE AND COMPREHENSIVE REPORTS

Real-time and scheduled reports provide valuable insight into your network activity. Go one step further and install the PROTECT Desktop network agent to manage and report on end-user internet activity.

CONTROL INTERNET ACCESS

Configure multiple networks and policies, providing segmentation and user awareness to enforce your internet access rules to protect your organisation

MSP & PARTNER BRANDING

Easily customize PROTECT to enhance your customer offering by amplifying the visibility and awareness of your brand.

FLEXIBILITY

PROTECT gives you the ability to easily select from a variety of categories including SafeSearch and YouTube restrictions providing granular control.

USE PROTECT TO CATCH SPYWARE, MALWARE AND
PHISHING DOMAINS BEFORE THEY CATCH YOU…