Our product uses the Domain Name System (DNS) protocol, referred to popularly as the “phonebook of the internet”. When applications on your network make domain-name requests, these requests are sent to our servers, where they are matched against our threat feeds and your policy settings. If a request is to a malicious/blocked domain, the user is diverted. This ensures that unwanted activity is cutoff at the root, because the request never makes it to the blocked/infected domain. It also comprehensively covers all devices on your network, from servers and computers to printers and tablets - because DNS is essential for most network connections to be established.