Logo
Sign in
Product Logo
Cloud ShieldSecurepoint

Cloud Shield is a cloud-based DNS security service that protects networks and devices by filtering and securing DNS traffic.

Vendor

Vendor

Securepoint

Company Website

Company Website

cloud-shield-securepoint.pdf
Product details

Cloud Shield by Securepoint is a cloud-based DNS security solution designed to protect entire networks or individual devices from online threats. It works by routing all DNS traffic through Securepoint’s secure servers, checking every request against an up-to-date security database. This prevents access to malicious, compromised, or risky websites, and blocks dangerous connections before harm can occur. The solution is compatible with any infrastructure, requires no ongoing maintenance, and is managed via an intuitive online portal. It offers features typically found in UTM firewalls, such as content filtering, geo-IP blocking, and encrypted DNS connections, making it a comprehensive yet simple tool for digital self-defense.

Key Features

Network and Device Protection Protects all network-connected devices, including IoT such as smart TVs and printers.

  • Shields against malware, phishing, and unsafe websites.
  • Ensures security even for devices that cannot run traditional security software.

DNS Check and Encrypted Connections Secures DNS queries and ensures privacy.

  • All DNS traffic is encrypted and routed through Securepoint servers.
  • Prevents data interception and manipulation.

Firewall, Filter, and Geo-IP-Blocking Provides advanced filtering and regional access control.

  • Blocks access to dangerous or unwanted content categories.
  • Restricts connections to or from specific countries to prevent data leaks and attacks.

Parental Controls and Blocking Functions Enables content and usage restrictions.

  • Implements youth protection policies easily.
  • Allows for custom block or allow lists.

Management via Online Portal Centralized, user-friendly administration.

  • Add devices, set filters, and manage geo-blocking via a web interface.
  • View logs, statistics, and reports on blocked attacks.

Benefits

Comprehensive Security Without Complexity Delivers enterprise-level protection with minimal configuration.

  • No hardware installation or ongoing maintenance required.
  • Rapid deployment across diverse infrastructures.

Protection for All Devices Secures not just computers, but also networked devices that lack built-in security.

  • Extends security to smart devices and printers.
  • Reduces risk from unmanaged endpoints.