INFINITY CLOUD DNSFILTER IS A CLOUD-HOSTED CONTENT AND THREAT FILTER WHICH PAIRS A RELIABLE ANYCAST NETWORK WITH A WORLD-CLASS ARTIFICIAL INTELLIGENCE SCANNING ENGINE. ALL WITH TRANSPARENT, NO COMMITMENT PRICING.
Infinity Cloud DNSFilter offers comprehensive content filtering and threat protection for all of your networks. Our cloud topology is spread across multiple providers, ensuring a solid platform to control what your users are allowed to access online. Our purpose-built AI scanner can classify content in real-time as well as detect threats encountered on the internet, such as phishing and malware domains.
Over the lifetime of Infinity Cloud DNSFilter, our network has achieved 100% uptime. We’ve engineered our DNS system to be able to recover from multiple sources of degradation, so you can always depend on us to filter your networks.
All features can be administered remotely from any device using our online dashboard.
Infinity Cloud DNSFilter takes only a few minutes to configure on your network equipment. After initial configuration, all adjustments are made through our online dashboard. You have complete control of all policies, devices, and users in your account.
We offer roaming clients on all major platforms: Windows, MacOS, iOS, Android, and ChromeOS. You can easily assign policies which are unique to devices or device groups.
Real Time A.I. Categorization
The internet is a BIG place. More than 126,000 domains are registered each day, making it impossible for human- controlled block lists to catch up with classifying websites and identifying potential malware or phishing attempts. This creates a major vulnerability in most filtering/security solutions.
Infinity Cloud DNSFilter has an artificial intelligence engine, which classifies domains in real time. When your users visit a domain, our scanner fetches it and classifies it immediately. The classification is then matched against your policy to determine if the user can access it.
Our scanner also utilizes image-based analysis, which is able to defeat phishing attempts, such as those which mimic Google, Microsoft, and Dropbox logins.