Strengthen your internal anti-abuse efforts

So you can focus on growing and running your business

Introducing iQ Managed Abuse

DNS abuse is a growing issue, with increased scrutiny at Government levels. Our Managed Abuse service is relied on by a number of TLDs to ensure they comply with their internal and industry-led policies.

photograph of the iQ team
How we can help

Tap into 100+ years of combined experience

Your abuse cases will be managed by our experienced Security and Policy experts. And followed up by comprehensive reporting, so you are fully informed at every step.

How we operate

Documented at every stage of the process

Documentation and audit trails are key. Every step is recorded for review and reporting purposes, to ensure compliance with external parties (ie. ICANN, Governments). Reports are provided at the end of each month and any ICANN reports are provided in a Spec 113b compliant format.

Audit Trails
Monthly Reports
ICANN Compliant Reports
image showing examples of reports

Save internal resources

Relative to lost internal time, resources, and focus on your core business, letting iQ manage all or a portion your DNS abuse cases cost less than you think. We will analyze your current abuse situation for free and provide an estimate. Customers can also nominate a maximum to spend per month.

How it works

Our experienced Security and Policy Experts assess abuse cases on the client's behalf, investigate, and take appropriate actions according to agreed-upon procedures. Then follow up the case until the case is concluded.

illustration of a radar
1. Monitor

We monitor the TLD for reported cases of abuse such as spam, phishing, malware and more.

illustration of an assessment document
2. Assess

Each case is assessed based on the reported abuse and threat intelligence source(s).

illustration of the abuse investigation process
3. Investigate

Based on the assessment, we investigate further to confirm abuse, ensuring a low false-positive rate.

illustration of a shield
4. Mitigate

When abuse is confirmed, we act in accordance with your internal policies and procedures to mitgate the threat.

illustration of a report
5. Report

Each stage is documented and enriched with evidence, to provide a full audit trail.

Ready to get started?

The team is ready to answer any questions you have. Please reach out to us and we will get back to you asap.

Contact us