Advantages of DNSFilter vs OpenDNS

The Hidden Cost of Free

Open and free DNS resolvers are a valuable asset to the public, but what happens when a free service and business mix?

DNSFilter

OpenDNS

DNSFilter provides DNS resolution only to paying customers.    

Customers pay only for what they use.

OpenDNS provides free DNS resolution
for tens of millions of systems.

Making a profit means the paid customers are covering the costs.


One-Click Safe Search

With  DNSFilter, you can enable the Safe Search feature for Google, Bing, and YouTube for your entire network instantly through our Dashboard.

(Okay, technically it's up to four clicks)


Real-Time Domain Categorization

Newly registered domain names are often used for threats and inappropriate or illegal content.
DNSFilter is the only web content filtering service which provides real-time domain categorization.
If endusers reach a domain which has not yet been categorized, we'll inform them it's being categorized and redirect them to the website or block page accordingly.


Category and Reporting Lookup and Reporting

DNSFilter allows reporting inaccurate categories or a security threat right through the Dashboard. No e-mailing support necessary.


Public Roadmap

DNSFilter's Public Roadmap provides transparency into our upcoming features and enhancements.
Want something added?  Reach out to us.

No DNS Amplification

DNS Amplification attacks occur when a large group of infected computers controlled by an attacker is used to send very small DNS requests with a spoofed IP address. Although the requests (packets) are small, the DNS response is usually exponentially larger in size; however, because the requests are using a spoofed IP address (with the address of the target), the DNS answers are sent to the target, instead of the originating computer.

DNSFilter

OpenDNS

DNSFilter sends valid DNS responses only to our customers; large-scale, amplified attacks towards third parties are not possible. OpenDNS is a publicly accessible recursive service; theoretically, attackers could use their service to attack third parties with great effectiveness.



(DISCLAIMER: This graph exists only to provide an example of a theoretical issue with any open (publicly accessible) DNS resolver, using OpenDNS as an example. DNSFilter does not claim to know the details of mitigation tactics and/or compensating controls that OpenDNS may or may not employ to defend against a DNS Amplification attack.)


Ready for a Trial?

Sign up for a 14-day free trial and deploy in minutes.

Have questions?
Our Help KB has answers.

Want to get in touch?
Reach out to us.

Still need help? Contact Us Contact Us