NordVPN Promotion

Home / Blogs

Defensive Domain Name Registrations – Exactly Where Should They Resolve?

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Domain names can be valuable assets, but many corporate domain name portfolios consist of non-resolving domains. In a recent survey conducted by Brandsight, more than 91% of domain professionals said that ensuring domains redirect to relevant content was an extremely important or somewhat important goal. That said, it’s not uncommon for less than half of corporate domain name portfolios to point to live content. Sure, there are adult-themed domains or those registered anonymously for future use that purposely do not resolve, but those are the exceptions to the rule.

Most domains that do not resolve were registered defensively or acquired via acquisition—without much thought given to where the domains should actually point. And going back to point traffic to relevant content after a domain has been acquired can be a daunting task—especially for domain professionals who only spend part of their time managing domain name portfolios.

All that said, companies should strive to ensure that all non-core domains should resolve. The big question is where to point domains?

When deciding where to point defensive registrations, there are generally three different approaches. The first is to try and direct users to their intended location. For typos and misspellings, this is typically straightforward. For other defensively registered domains, this may require working cooperatively with web marketing or digital marketing teams to determine exactly where domain names should resolve. This could include ensuring ccTLDs point to matching language sites, product names point to product pages, and executive names point to management team pages.

There is another school of thought, which is that redirecting defensive registrations could inadvertently teach website visitors to use the wrong domain names. In these cases, pointing domains to parked pages with a message asking whether the visitor meant to visit the company’s primary website is an option.

And for domains that have been previously used to perpetrate the sale of counterfeit goods, to commit fraud, or divert traffic to unauthorized content, pointing to a page that explains that the name has been recovered as part of the company’s brand protection program is yet a third option.

In all cases, monitoring traffic to these pages can be useful in determining whether names can be allowed to lapse or whether other similar registrations should be considered.

A common question is around how much traffic should a domain receive in order for it to be considered valuable? Of course, that depends. Raw numbers can be useful, but tracking conversion rates provides powerful evidence for understanding the value of a domain. This can be accomplished by appending UTM codes to defensive registrations and using web analytics platforms to understand how visitors convert into sales.

Determining which is the right approach is highly dependent on the company’s culture. For some companies, ensuring that all visitors are able to reach their intended destination is critical, but others may feel that promoting their core domain names and elevating their commitment to brand protection takes precedence. And certainly, using a combination of all three approaches is an option as well.

By Elisa Cooper, Head of Marketing, GoDaddy Corporate Domains

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

NordVPN Promotion