Educause Security Discussion mailing list archives

Re: OpenDNS Users


From: Michael Benedetto <mbenedetto () AMNH ORG>
Date: Fri, 24 May 2013 17:56:08 +0000

We've been using OpenDNS for close to 18months for our forwarder from our
internal DNS servers on recursive queries. It works great. We've had a
performance increase overall, and our malware issues have dropped over 80%
with the malware blocking we have through OpenDNS.

 

Michael Benedetto
Director of Information Technology and Deputy CIO
American Museum of Natural History
Central Park West at 79th Street
New York, NY 10024-5192
Voice: 212-769-5318
E-mail:  <mailto:mbenedetto () amnh org> mbenedetto () amnh org
Skype: michael_benedetto

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Santabarbara, Angelo
Sent: Friday, May 24, 2013 12:32 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] OpenDNS Users

 

Yes the implementation is simply to add it as a forwarder on internal DNS
servers.  We did consider the pay for product prior to them releasing the
"Umbrella service."  I think it would be very useful for the community as
that version also blocks known malware hosting sites.  Problem for us was
the budgetary cost as it is charged by total FTE count.

 

We really didn't have any web/application problems.  The big difference was
the "intercept page" that is displayed when a domain is blocked.  We
customized it and notified our community about it and it worked out fine.  I
recommend you start with the free version and then you can look at all the
analytics provided to get a scope of the amount of malware traffic that
would be blocked in addition to the phishing/botnet traffic blocked for
free.

Attachment: smime.p7s
Description:


Current thread: