CloudShield is now part of Lookingglass banner




BOOKMARK BLOG: Tips, opinions, and advice from industry experts

FOLLOW AND SHARE: Updates, articles, and news on social sites


CloudShield started in 2000 to deliver Deep Packet Processing to enable fine-grained network traffic control. Today, CloudShield Deep Packet Processing technology is physically available on the CloudShield CS-4000 Trusted Network Security Platform, the CloudShield PN41 Deep Packet Processing Module (DPPM) for IBM Blade Center system, and the CS-2000 Content Processing Platform.

Among its many capabilities for inspecting and manipulating traffic, the architecture of CloudShield Deep Packet Processing enables trust with its most recent evidence being the CS-4000 as a component of a configuration of equipment and software that attained Director Central Intelligence Directive (DCID) 6/5 Protection Level (PL) 5, the highest security accreditation available worldwide.



From the outset, CloudShield has provided tools for partners and customers to create cybersecurity applications using Deep Packet Processing on our trusted platforms. Here are some of the key solutions utilizing CloudShield Deep Packet Processing:

CloudShield DNS Defender CloudShield DNS Defender: Customers spend millions to ensure cybersecurity. Yet, their most vulnerable infrastructure, DNS (Domain Name Service) is left unprotected. DNS Defender is a DNS firewall that has been protecting customers against DDoS, reconnaissance, and protocol weaknesses since 2008.

CloudShield Trusted Cyber Solution Orchestrator

CloudShield Trusted Cyber Solution Orchestrator: Enables customers to create managed defense-in-depth security solutions and enables technology partners to gain rapid access to CloudShield trusted platforms.

CloudShield DNS Assessment Service CloudShield DNS Assessment Service: Our research has found countless examples of poor practices that create significant downtime risk in DNS implementations. The CloudShield DNS Security and Performance Assessment Service can quickly help you understand DNS vulnerabilities and take steps to mitigate risk.


5 Simple DNS Checklists: How many of these DNS strategies do you have in place? Explore five areas to consider when protecting DNS.
DNS Security Tip Guide: Covers security layering, DNS traffic management, and the role DNS plays in advanced malware attacks.

DNS Use Cases: Are you ready to defend against a DDoS attack? Read how 4 customers won against DNS security threats with CloudShield.