Welcome!

Machine Learning Authors: Pat Romanski, Jason Bloomberg, Zakia Bouachraoui, Liz McMillan, William Schmarzo

News Feed Item

Nominum Delivers Service Provider Compliance Solution for Blocking Child Exploitation Sites Online

Nominum, the leader in network naming and addressing solutions announced today that it has a very simple, efficient, and effective solution that allows Internet Service Providers to quickly comply with regulatory mandates or agreements being negotiated that require them to block access to child exploitation sites on the Internet. Nominum’s solution offers providers several key advantages:

  • No invasion of user privacy; packet contents are not examined
  • Simple deployment with no new equipment in the network or operational overhead
  • Preserves the subscriber experience; performance, latency and availability are not impacted
  • Confidentiality of lists of banned sites to prevent inadvertent disclosure or theft

The problem of child exploitation sites on the Internet has been widely publicized around the world with the media and citizens becoming increasingly vocal about the need to protect Internet users by blocking access. Governments worldwide are working to address this problem. In Germany the government moved rapidly, starting legislation in January that was approved through their legislative arm in early July. Similar initiatives and agreements already exist or are being worked on in other parts of the world.

Nominum’s solution for blocking access to child exploitation sites allows service providers to leverage the DNS infrastructure that is already present in every IP network. Nearly 50 percent of broadband households around the world already rely on Nominum’s DNS for their browsing needs. Virtually every Internet application, including web browsers, relies on the DNS to navigate to destinations on the web. When a user inadvertently clicks on a link that leads to child exploitation sites, Nominum’s software can direct them to a “teaching” page, rather than to the unwanted web site. The key advantage of this solution is that it does not rely on examining the information contained in user’s data packets (“opening the envelope”). This means there is no possibility of ever invading a user’s privacy.

With Nominum’s solution, lists of illegal web sites to be blocked can be continuously updated to reflect the very latest information. The process of distributing the lists throughout the provider network is completely automated, with no operator intervention required. Deployment does not require any specialized equipment or changes to the network architecture and confidentiality of blocked domain lists is ensured by storing them in an encrypted format. Unlike Nominum’s solution, alternatives rely on deep packet inspection which requires looking at packet payloads and raises substantial concerns about user privacy.

“Nominum has a corporate commitment to protecting the Internet and improving the user experience. We have been at the forefront of innovations that provide Internet users with a more productive, safe and secure Internet experience,” said Tom Tovar, CEO of Nominum. “We are actively working with Internet Service Providers to rapidly comply with pending regulations and agreements without disrupting their networks or impacting their operations. Together we are committed to protecting Internet users and preserving privacy.”

The products that implement the compliance solution are:

  • The Malicious Domain Redirection (MDR) Service Delivery Module incorporates continuously updated data about “illegal” websites, including child exploitation sites, and intelligently examines DNS requests from users in real time. Rather than simply directing users to sites hosting illegal content, MDR instead directs them to “stop” pages or “teaching” pages that educate them about the problem. The MDR module is an add-on to Nominum’s Vantio caching DNS platform.
  • The CentrisTM Threat Aggregation Database is a centralized, multi-protocol server that enables real time threat data to be collected and distributed at massive scale. Centris hosts lists of child exploitation sites and automatically distributes the information to MDR modules across an ISP network. Confidentiality of lists is assured by distributing and hosting them in an encrypted format.

Pricing and Availability

Products used to implement this solution are software only. The full solution is generally available now and already deployed in production networks. Pricing is configuration dependent.

About Nominum

Nominum’s network naming and addressing solutions power IP networks of all sizes globally, from the largest carrier broadband network to enterprises, universities and government agencies. Nominum’s Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) products lead the industry in security, performance, and reliability. They are the foundation of the always-on broadband Internet, supporting 170 million households connected by more than one hundred carriers in every region - North America, Europe, Asia-Pacific, and Latin America. Large businesses, educational institutions and governmental networks also depend on Nominum to support mission-critical IP services and applications. For more information, visit www.nominum.com. (Click here for a partial list of Nominum’s key customers).

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker containers gain prominence. He explored these challenges and how to address them, while considering how containers will influence the direction of cloud computing.
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundation of software-defined infrastructure, Nutanix has rapidly expanded into full application lifecycle management across any infrastructure or cloud .Join us as we delve into how the Nutanix Developer Stack makes it easy to build hybrid cloud applications by weaving DBaaS, micro segmentation, event driven lifecycle operations, and both financial and cloud governance together into a single unified st...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & Associates, Inc., put cognitive computing into perspective with its value to the business. The session detailed what it takes to build a cognitive application and the types of solutions that are the best fit for this data-driven approach.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examining how the Internet and the cloud has allowed for the democratization of IT, resulting in an increased demand for the cloud and the drive to develop new ways to utilize it.
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.