OpenDNS is now part of Cisco Learn More

Security Beyond The Firewall

The most trusted brands choose OpenDNS

  • Comcast
  • Kaiser Permanente
  • Pinterest
  • Sutter Health
  • Kellogg's
  • Xerox
  • George Washington University
  • Quest Diagnostics
  • Underwriters Laboratories
  • BP
  • Zendesk
  • Loews Hotels Holding Corporation
  • BMC Software
  • Evernote
  • Nvidia

Security Made Simple

Security Made Simple

Protect Your Business With OpenDNS Umbrella

Product Image

Threat protection like no other

OpenDNS Umbrella blocks malware, botnets and phishing over any port, protocol or app, and also detects and contains advanced attacks before they can cause damage. Our Security Graph engine uses big-data analytics and machine learning for predictive intelligence, to automate protection against both known and emergent threats.

Worldwide coverage in minutes

OpenDNS Umbrella protects devices anywhere and stays up-to-date without admin intervention because there is no hardware to install or software to maintain. Our Global Network handles more than two percent of the world’s Internet requests daily with 100 percent uptime and no added latency.

We have you covered, anywhere you go

OpenDNS protects you on your laptop, smartphone, desktop, server, and network


Show me OpenDNS Products for Personal Use →

Numbers We Are Proud Of

of Internet requests

daily active users

daily DNS requests

OpenDNS Blog

  • Excursus: SAI Conference 2016

    Author: David Rodriguez

    “On the horizon: faster and more effective propagation methods that maximize the impact of ransomware campaigns and increase the probability … that adversaries will generate significant revenue.” – 2016 Cisco Cybersecurity Report…

    Read More →
  • Identifying Scam Infrastructure

    Author: Artsiom Holub

    Spam and online scams have been causing headaches since the dawn of the Web. Historically, most spammers bought or rented servers from black market … providers like xDedic, the cybercriminal trading platform currently notable…

    Read More →
  • Vulnerable PHP Forms Abused for Locky Distribution

    Author: Brad Antoniewicz

    Threat actors love—and when I say love, I mean they really, really love—email. It’s direct marketing for their scam! The trouble is that, to … an even greater degree than legitimate direct marketers, they need to keep…

    Read More →
  • From Query Logs to Visualization

    Author: Colin Seale

    Researchers and scientists use data visualizations to better understand data and communicate results. Good visualizations can provide insight into a … dataset that might otherwise be overlooked. In this post, we’ll go through the…

    Read More →