Skip to content

Eliminate cybersecurity blind spots with protective DNS

  • Add a security layer covering threats that bypass standard tools
  • Expand your security and visibility to remote teams
  • Prevent data theft, ransomware, and misuse of leaked credentials 

TRUSTED BY

WHY IT WORKS

Over 90% of attacks must use DNS.
Block them with Immunity

Domains are crucial for communication between attackers and the malware.
Without DNS protection, your network is open to many modern attack methods.

IM Icon 1

Deployed in under 2 hours, Immunity protects all devices in your network

Prevent malicious traffic in your network with no need to install or maintain anything on end devices

IM Icon 2

No disruption to daily routine of the IT team and employees

Users will not notice until they are protected from connecting to a malicious domain

IM icon 3

Secure employees working remotely or on business trips

You can simply protect employees outside of your network

IM icon 4

Stop DNS tunneling, ransomware, IoT attacks, misuse of leaked passwords

Disrupt threats throughout their life cycle to stop even the most advanced attack strategies

See how Whalebone Immunity works

I prefer a text description

Whalebone Immunity is a protective DNS resolver covering blind spots in the security infrastructure of enterprises, institutions, and governmental bodies. It provides unparalleled control over your DNS traffic, which is essential to cover vectors which bypass the standard security stack, as well as additional features such as Identity Protection and Content Filtering.

DNS is a crucial part of the Internet infrastructure, translating domains into IP addresses. Whalebone Immunity gives you control over this vital protocol, ability to secure it, and provides deep insights into your network.

With Immunity, you can just redirect the DNS traffic on a network level to Whalebone DNS Resolver®, which filters out malicious traffic. Any device is immediately protected, including phones and IoT devices, which are hard or impossible to secure by other solutions.

Get a 30-day free trial running in under 2 hours and make use of the fine-tuned implementation and seamless API integration. Choose on-premises, cloud, or hybrid deployment and see immediate quantifiable results.

SUCCESS STORIES

Why security professionals trust Whalebone Immunity

  • Adastra
  • Nove Mesto municipality
  • Panasonic
  • Equa Bank

AdAstra-min

 

UVOZOVKY
Based on our research, Whalebone Immunity truly stands out. It’s really easy to deploy and maintain, yet very effective.

adastra-logo-proboston-00 1-min

Pavel Pekárek-min (1)

Pavel Pekarek
IT Security Architect at Adastra

 


 

Immunity protects Adastra's employees in 4 countries.

Nové město na moravě-min
 
UVOZOVKY
I can no longer imagine running a network without this level of security. My only regret is not having started to use it sooner. 

Nove Mesto na Morave

Zbynek Grepl  Director of the Municipal IT Department, Nove Mesto na Morave (Czech Republic)


 

Immunity saves the IT team's time and resources.

Panasonic-min
 
UVOZOVKY
Immunity blocked malicious websites the moment our users tried to reach them. It would take at least a day for a firewall to add them to its threat database.
Panasonic_logo 2

Lubomir Gavenda  IT Specialist of Panasonic Slovakia


 

Immunity protects Panasonic's data and sensitive information.

Equa bank-min
 
UVOZOVKY
We have not been in contact with technical support at all. We haven’t needed it. It’s fail-safe and catches relevant threats.

Equa

Mario Lipovsky  IT Security Architect at Equa Bank


 

Mask group-min (2)

Read more on how Immunity helps IT teams across industries

Watch out for blind
spots in your security

Networks that depend only on traditional security measures are vulnerable to advanced threats, such as:

Image-min
Mozek

DNS tunneling & domain generation algorithms (DGA)

These techniques are used to bypass firewalls, allowing hackers to deploy and control malware, and to steal data. Immunity disrupts them through active work with DNS requests and AI analysis.


Group 1000005607

Homograph attacks

These attacks use visually similar letters to mimic your domain, luring employees into disclosing credentials or downloading infected files. Immunity alerts the IT team when it identifies this threat.


Group 1000005711

Leaked passwords & sensitive information

Most people use one password for multiple services, and even companies like Microsoft, LinkedIn, and Adobe have been breached. Immunity notifies you of any leaks connected to your domain.


Group 1000005708

Attacks using supply chain, IoTs, phishing, 0-day vulnerabilities

Immunity disrupts threats at multiple stages. Even past your first line of defense, attacks can be stopped when the malware attempts to communicate with the attacker, spread in the network, block your database, or steal your data.


Group 1000005578

Employees outside the network

Users outside the network are vulnerable to threats otherwise stopped by network security. Immunity provides them with the same protection as if they were connected to the company network.

Whalebone Immunity overview

Key advantages of Whalebone Immunity
  • Secure typical blind spots – make sure that attackers cannot abuse your DNS security limitations.
  • Protect all connected devices without the need to install anything. 
  • Save time thanks to a smooth deployment – you can make it work in 2 hours.
  • Secure your remote employees with an easily deployed app.
  • Get live audit and full visibility of the DNS traffic that traditionally flew under the radar. 
  • Prevent abuse of leaked credentials, including log-in information, passwords, and personal information. 
  • Choose on-premises, cloud, or hybrid deployment for best fit for your network.
  • Simply set boundaries thanks to Content Filtering.
  • Start a free 30-day trial with us and see immediate and quantifiable results.

    Request free trial button

 

Launch Immunity in 6 steps


1 Get to know Whalebone

Schedule a demo call where we will explain everything you need to know.

2 Use case modeling
We will figure out exactly what you need and our tech team will look into your particular deployment in detail.

3 Proof of concept
Start a free trial to see the value for yourself.

4 Deployment & Integration
Your whole network will be protected by Whalebone Immunity in less than 2 hours.

5 Initial training
You will learn how to make the best use of the product and its intuitive interface.

6 Lifetime support
We will not stop there. We will always provide you with immediate tech support.

Launch immunity in 6 steps

 

Technical specifications
  • Flexible architecture: On-premises, hybrid, or cloud deployments enable a versatile integration based on each network's unique requirements fully compliant with Active Directory.
  • Fully customizable DNS Resolver: The caching recursive DNS resolver is fully configurable and abides by the latest standards. It can serve both IPv4 and IPv6 while strictly validating DNSSEC.
  • We love Encrypted DNS: The full range of services can be offered over encrypted DNS protocols such as DNS over TLS (DoT) and DNS over HTTPS (DoH).
  • Domain Intelligence: AI-based threat and content intelligence and real-time delivery provide a vital security layer.
  • API integration: All the configuration and reporting options are made available via API.
  • Off-Net Protection: Use our app Home Office Security to protect users in any network they connect to.
  • Intuitive and practical GUI of the Admin Portal provides substantial DNS visibility.
  • Identity Protection watches out for abuse of leaked sensitive information.

Become a Whalebone Immunity Certified Partner

Get a product that is easy to upsell to your current clients and opens doors for new business.

Why be a partner?

  • Additional "must-have" layer to complete your cybersecurity portfolio offering.
  • Lucrative margins and attractive discounts, increasing with your business success.
  • Flexibility and responsiveness to your feedback and needs, with channel manager, marketing manager, and technical superhero assigned.

Mask group-min (3)

You are just 2 hours from eliminating the security blind spots of your network

  • More than 50% of trials identify malicious traffic the customer did not know of, and more than 50% identify leaked passwords connected to the company domain

  • No credit card needed, smooth deployment, immediate value
  • Try Whalebone Immunity for 30 days for free, with the whole feature range including Identity Protection


    Request free trial button

 

Ask us anything about Whalebone Immunity


 

EMAIL 

immunity@whalebone.io

#ConnectedMeansProtected