Cisco Umbrella Deployment

Secure your network by implementing DNA layered security for optimal performance and protection.

DNS Layered Security

DNS Layered Protection is a security solution that protects against cyber threats such as phishing, malware, and botnets. It is recommended for organisations, and businesses of all sizes who are concerned about the security of their online activities and the safety of their sensitive information. This includes, but is not limited to, corporations, financial institutions, healthcare providers, government agencies, and e-commerce websites.

DNS Layered Protection can be especially useful for companies with a large online presence and those that handle sensitive customer information, as it helps to ensure that sensitive data is protected from cyber threats. Overall, anyone who values the security of their online activities and wants to protect their sensitive information from cyber threats can benefit from using DNS Layered Protection.

Security Awareness Training

Benefits to Your Organisation

Holocron Cyber employs experienced security consultants to facilitate the deployment of Cisco Umbrella. The benefits of the platform to your organisation are outlined below:

Increased Security

By using multiple layers of protection, DNS Layered Protection helps to defend against a wide range of cyber threats, including phishing, malware, and botnets.

Real-time Threat Intelligence

DNS Layered Protection provides real-time threat intelligence, enabling organisations to quickly respond to and block new threats.

Improved Network Performance

DNS Layered Protection can also improve network performance by reducing the number of unwanted and malicious DNS requests.

Increased Visibility and Control

DNS Layered Protection increases visibility into internet activity and has the ability to control access to malicious sites and applications.

Protects Sensitive Information

By protecting against cyber threats, organisations can ensure that their sensitive information, such as customer data, is kept secure.

Ease of Deployment

The solution is easy to set up and manage, reducing the burden on IT staff and freeing up resources for other tasks.


DNS Layered Protection can be a cost-effective solution for organisations, as it provides comprehensive security coverage without the need for multiple separate solutions.

A man clicks a button with a finger print and lock symbol showing for a 2-step verification process.

Overview of Services

DNA Protection deployment is separated into two stages:

Network copy

Stage 1:

Scoping of your network environment

Essential Eight Audit

Stage 2:

Deployment to devices

Note: Deployment times may vary based on network configurations within your organisation. Generally, a week is required for the deployment, however, unforeseen circumstances may increase this time. 

The Risks of Not Deploying DNS Layered Protection

Security Threats

Without DNS Layered Protection, your network is vulnerable to security threats, such as malware, which can compromise confidential data and systems.

Network Downtime

Network downtime can occur if security threats are not prevented, causing a loss of productivity an revenue.

Reputational damage

A security breach can damage and organisation’s reputation, affecting customer trust and confidence.


Failure to deploy appropriate security measures can result in non-compliance with regulations and standards.

What it Encompasses

DNS Layered Protection introduces multiple capabilities into your security toolkit. At its core, DNS layer security provides protection in-between your network and the public internet by blocking any domains associated with malware, phishing, and command-and-control call-backs. It also ensures that any threats that may silently exist in the network are contained.

Cisco Umbrella Deployment

Cloud Access Broker (CASB)

DNS Layered Protection also functions as a cloud-access broker (CASB), monitoring cloud application usage to ensure usage and applications meet security requirements, while enabling the discovery of unsanctioned applications that can threaten the organisation's cyber security.

Essential Eight Audit

Secure Web Gateway

Secure web gateway functionality monitors traffic, scanning for malware and enabling the use of URL filtering and app-visibility with granular controls.

Managed Cyber Security protection against Malware

Threat Intelligence

The solution utilises threat intelligence from one of the largest threat intelligence organisations on the planet. Utilising ongoing data from billions of web requests, along with machine learning and statistical modelling, it is able to automatically uncover malware, ransomware, and other threats.

Cloud Delivered Firewall

Cloud-delivered firewall functionality is an optional capability that enables the solution to monitor and enforce rules for IP, ports, and protocols.

Managed Cyber Security Protection for your Essential Eight Audit compliance

Integrated Platform

Functionality at scale, across locations, and with more complex networks is achieved with lightweight clients, connectors and virtual appliances, and Meraki SD-WAN capabilities enable networks to be securely managed from an integrated platform.

Talk to a cyber security expert today and secure your systems & data

Talk to one of our leading cyber security experts today, about how we can help you mitigate threats and safeguard your business.

30 min. consult with a trusted security expert

Book a Consultation

"*" indicates required fields

This field is for validation purposes and should be left unchanged.