30(a) Security Policy: Summary of the security policy for the proposed registry

Prototypical answer:

gTLDFull Legal NameE-mail suffixDetail
.theatreKey GTLD Holding Incwolfe-sbmc.comView

1 DETAILED DESCRIPTION OF PROCESSES AND SOLUTIONS DEPLOYED TO MANAGE LOGICAL SECURITY ACROSS INFRASTRUCTURE AND SYSTEMS, MONITORING AND DETECTING THREATS AND SECURITY VULNERABILITIES AND TAKING APPROPRIATE STEPS TO RESOLVE THEM
The Applicant’s selected backend registry services provider’s (Verisign’s) comprehensive security policy has evolved over the years as part of managing some of the world’s most critical TLDs. Verisign’s Information Security Policy is the primary guideline that sets the baseline for all other policies, procedures, and standards that Verisign follows. This security policy addresses all of the critical components for the management of backend registry services, including architecture, engineering, and operations.
Verisign’s general security policies and standards with respect to these areas are provided as follows:
Architecture
Information Security Architecture Standard: This standard establishes the Verisign standard for application and network architecture. The document explains the methods for segmenting application tiers, using authentication mechanisms, and implementing application functions.
Information Security Secure Linux Standard: This standard establishes the information security requirements for all systems that run Linux throughout the Verisign organization.
Information Security Secure Oracle Standard: This standard establishes the information security requirements for all systems that run Oracle throughout the Verisign organization.
Information Security Remote Access Standard: This standard establishes the information security requirements for remote access to terminal services throughout the Verisign organization.
Information Security SSH Standard: This standard establishes the information security requirements for the application of Secure Shell (SSH) on all systems throughout the Verisign organization.
Engineering
Secure SSL⁄TLS Configuration Standard: This standard establishes the information security requirements for the configuration of Secure Sockets Layer⁄Transport Layer Security (SSL⁄TLS) for all systems throughout the Verisign organization.
Information Security C++ Standards: These standards explain how to use and implement the functions and application programming interfaces (APIs) within C++. The document also describes how to perform logging, authentication, and database connectivity.
Information Security Java Standards: These standards explain how to use and implement the functions and APIs within Java. The document also describes how to perform logging, authentication, and database connectivity.
Operations
Information Security DNS Standard: This standard establishes the information security requirements for all systems that run DNS systems throughout the Verisign organization.
Information Security Cryptographic Key Management Standard: This standard provides detailed information on both technology and processes for the use of encryption on Verisign information security systems.
Secure Apache Standard: Verisign has a multitude of Apache web servers, which are used in both production and development environments on the Verisign intranet and on the Internet. They provide a centralized, dynamic, and extensible interface to various other systems that deliver information to the end user. Because of their exposure and the confidential nature of the data that these systems host, adequate security measures must be in place. The Secure Apache Standard establishes the information security requirements for all systems that run Apache web servers throughout the Verisign organization.
Secure Sendmail Standard: Verisign uses sendmail servers in both the production and development environments on the Verisign intranet and on the Internet. Sendmail allows users to communicate with one another via email. The Secure Sendmail Standard establishes the information security requirements for all systems that run sendmail servers throughout the Verisign organization.
Secure Logging Standard: This standard establishes the information security logging requirements for all systems and applications throughout the Verisign organization. Where specific standards documents have been created for operating systems or applications, the logging standards have been detailed. This document covers all technologies.
Patch Management Standard: This standard establishes the information security patch and upgrade management requirements for all systems and applications throughout Verisign.
General
Secure Password Standard: Because passwords are the most popular and, in many cases, the sole mechanism for authenticating a user to a system, great care must be taken to help ensure that passwords are “strong” and secure. The Secure Password Standard details requirements for the use and implementation of passwords.
Secure Anti-Virus Standard: Verisign must be protected continuously from computer viruses and other forms of malicious code. These threats can cause significant damage to the overall operation and security of the Verisign network. The Secure Anti-Virus Standard describes the requirements for minimizing the occurrence and impact of these incidents.

Security processes and solutions for this TLD are based on the standards defined above, each of which is derived from Verisign’s experience and industry best practice. These standards comprise the framework for the overall security solution and applicable processes implemented across all products under Verisign’s management. The security solution and applicable processes include, but are not limited to:
System and network access control (e.g., monitoring, logging, and backup)
Independent assessment and periodic independent assessment reports
Denial of service (DoS) and distributed denial of service (DDoS) attack mitigation
Computer and network incident response policies, plans, and processes
Minimization of risk of unauthorized access to systems or tampering with registry data
Intrusion detection mechanisms, threat analysis, defenses, and updates
Auditing of network access
Physical security

Further details of these processes and solutions are provided in Part B of this response.
1.1 Security Policy and Procedures for the Proposed Registry
Specific security policy related details, requested as the bulleted items of Question 30 Part A, are provided here.
Independent Assessment and Periodic Independent Assessment Reports. To help ensure effective security controls are in place, the Applicant, through its selected backend registry services provider, Verisign, conducts a yearly American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA) SAS 70 audit on all of its data centers, hosted systems, and applications. During these SAS 70 audits, security controls at the operational, technical, and human level are rigorously tested. These audits are conducted by a certified and accredited third party and help ensure that Verisign in-place environments meet the security criteria specified in Verisign’s customer contractual agreements and are in accordance with commercially accepted security controls and practices. Verisign also performs numerous audits throughout the year to verify its security processes and activities. These audits cover many different environments and technologies and validate Verisign’s capability to protect its registry and DNS resolution environments. Figure ‎30A 1 lists a subset of the audits that Verisign conducts. For each audit program or certification listed in Figure ‎30A 1, Verisign has included, as attachments to the Part B component of this response, copies of the assessment reports conducted by the listed third-party auditor. From Verisign’s experience operating registries, it has determined that together these audit programs and certifications provide a reliable means to ensure effective security controls are in place and that these controls are sufficient to meet ICANN security requirements and therefore are commensurate with the guidelines defined by ISO 27001.

Augmented Security Levels or Capabilities. See Section 5 of this response.
Commitments Made to Registrants Concerning Security Levels. See Section 4 of this response.
2 SECURITY CAPABILITIES ARE CONSISTENT WITH THE OVERALL BUSINESS APPROACH AND PLANNED SIZE OF THE REGISTRY
Verisign, the Applicant’s selected backend registry services provider, is an experienced backend registry provider that has developed and uses proprietary system scaling models to guide the growth of its TLD supporting infrastructure. These models direct Verisign’s infrastructure scaling to include, but not be limited to, server capacity, data storage volume, and network throughput that are aligned to projected demand and usage patterns. Verisign periodically updates these models to account for the adoption of more capable and cost-effective technologies.
Verisign’s scaling models are proven predictors of needed capacity and related cost. As such, they provide the means to link the projected infrastructure needs of the TLD with necessary implementation and sustainment cost. Using the projected usage volume for the most likely scenario (defined in Question 46, Template 1 Financial Projections: Most Likely) as an input to its scaling models, Verisign derived the necessary infrastructure required to implement and sustain this gTLD. Verisign’s pricing for the backend registry services it provides to the Applicant fully accounts for cost related to this infrastructure, which is provided as “Total Critical Registry Function Cash Outflows” (Template 1, Line IIb.G) within the Question 46 financial projections response.
3 TECHNICAL PLAN ADEQUATELY RESOURCED IN THE PLANNED COSTS DETAILED IN THE FINANCIAL SECTION
Verisign, the Applicant’s selected backend registry services provider, is an experienced backend registry provider that has developed a set of proprietary resourcing models to project the number and type of personnel resources necessary to operate a TLD. Verisign routinely adjusts these staffing models to account for new tools and process innovations. These models enable Verisign to continually right-size its staff to accommodate projected demand and meet service level agreements as well as Internet security and stability requirements. Using the projected usage volume for the most likely scenario (defined in Question 46, Template 1 Financial Projections: Most Likely) as an input to its staffing models, Verisign derived the necessary personnel levels required for this gTLD’s initial implementation and ongoing maintenance. Verisign’s pricing for the backend registry services it provides to the Applicant fully accounts for cost related to this infrastructure, which is provided as “Total Critical Registry Function Cash Outflows” (Template 1, Line IIb.G) within the Question 46 financial projections response.
Verisign employs more than 1,040 individuals of which more than 775 comprise its technical work force. (Current statistics are publicly available in Verisign’s quarterly filings.) Drawing from this pool of on-hand and fully committed technical resources, Verisign has maintained DNS operational accuracy and stability 100 percent of the time for more than 13 years for .com, proving Verisign’s ability to align personnel resource growth to the scale increases of Verisign’s TLD service offerings.
Verisign projects it will use the following personnel role, which is described in Section 5 of the response to Question 31, Technical Overview of Proposed Registry, to support its security policy:
Information Security Engineers: 11

To implement and manage the TLD as described in this application, Verisign, the Applicant’s selected backend registry services provider, scales, as needed, the size of each technical area now supporting its portfolio of TLDs. Consistent with its resource modeling, Verisign periodically reviews the level of work to be performed and adjusts staff levels for each technical area.
When usage projections indicate a need for additional staff, Verisign’s internal staffing group uses an in-place staffing process to identify qualified candidates. These candidates are then interviewed by the lead of the relevant technical area. By scaling one common team across all its TLDs instead of creating a new entity to manage only this proposed gTLD, Verisign realizes significant economies of scale and ensures its TLD best practices are followed consistently. This consistent application of best practices helps ensure the security and stability of both the Internet and this proposed gTLD, as Verisign holds all contributing staff members accountable to the same procedures that guide its execution of the Internet’s largest TLDs (i.e., .com and .net). Moreover, by augmenting existing teams, Verisign affords new employees the opportunity to be mentored by existing senior staff. This mentoring minimizes start-up learning curves and helps ensure that new staff members properly execute their duties.
4 SECURITY MEASURES ARE CONSISTENT WITH ANY COMMITMENTS MADE TO REGISTRANTS REGARDING SECURITY LEVELS
Verisign is the Applicant’s selected backend registry services provider. For this gTLD, no unique security measures or commitments must be made by Verisign or the Applicant to any registrant.
5 SECURITY MEASURES ARE APPROPRIATE FOR THE APPLIED-FOR gTLD STRING (FOR EXAMPLE, APPLICATIONS FOR STRINGS WITH UNIQUE TRUST IMPLICATIONS, SUCH AS FINANCIAL SERVICES-ORIENTED STRINGS, WOULD BE EXPECTED TO PROVIDE A COMMENSURATE LEVEL OF SECURITY)
No unique security measures are necessary to implement this gTLD. As defined in Section 1 of this response, Verisign, the Applicant’s selected backend registry services provider, commits to providing backend registry services in accordance with the following international and relevant security standards:
American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA) SAS 70
WebTrust⁄SysTrust for Certification Authorities (CA)
As defined in Section 1 of this response, Verisign, the Applicant’s selected backend registry services provider, commits to providing backend registry services in accordance with the following international and relevant security standards:
American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA) SAS 70
WebTrust⁄SysTrust for Certification Authorities (CA)

Similar gTLD applications: (233)

gTLDFull Legal NameE-mail suffixzDetail
.frontdoorLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.broadwayKey GTLD Holding Incwolfe-sbmc.com-4.05Compare
.cityeatsLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.cookingchannelLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.travelchannelLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.theaterKey GTLD Holding Incwolfe-sbmc.com-4.05Compare
.foodnetworkLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.diyLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.gleanLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.lifestyleLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.vanaLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.livingLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.foodLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.bwayKey GTLD Holding Incwolfe-sbmc.com-4.05Compare
.hgtvLifestyle Domain Holdings, Inc.wolfe-sbmc.com-4.05Compare
.SKYDRIVEMicrosoft Corporationmicrosoft.com-3.91Compare
.XBOXMicrosoft Corporationmicrosoft.com-3.91Compare
.MICROSOFTMicrosoft Corporationmicrosoft.com-3.91Compare
.AZUREMicrosoft Corporationmicrosoft.com-3.91Compare
.BINGMicrosoft Corporationmicrosoft.com-3.91Compare
.HOTMAILMicrosoft Corporationmicrosoft.com-3.91Compare
.LIVEMicrosoft Corporationmicrosoft.com-3.91Compare
.WINDOWSMicrosoft Corporationmicrosoft.com-3.9Compare
.cfaCFA Institutecfainstitute.org-3.88Compare
.thehartfordHartford Fire Insurance Companythehartford.com-3.87Compare
.SCASVENSKA CELLULOSA AKTIEBOLAGET SCA (publ)valideus.com-3.8Compare
.HOMEDot Home LLCsecondgen.com-3.79Compare
.CAREERdotCareer LLCsecondgen.com-3.78Compare
.REALESTATEdotRealEstate LLCsecondgen.com-3.78Compare
.HOTdotHot LLCsecondgen.com-3.78Compare
.mlsThe Canadian Real Estate Associationcrea.ca-3.78Compare
.mlsThe Canadian Real Estate Associationcrea.ca-3.78Compare
.MEDMedistry LLCsecondgen.com-3.76Compare
.REALTORReal Estate Domains LLCsecondgen.com-3.76Compare
.ABCAmerican Broadcasting Companies, Inc.disney.com-3.68Compare
.crsFederated Co operatives Limitedmlt.com-3.67Compare
.bloombergBloomberg IP Holdings LLCbloomberg.net-3.66Compare
.finishReckitt Benckiser N.V.rb.com-3.61Compare
.vanishReckitt Benckiser N.V.rb.com-3.61Compare
.ubankNational Australia Bank Limitednab.com.au-3.61Compare
.nabNational Australia Bank Limitednab.com.au-3.61Compare
.patchAOL Inc.teamaol.com-3.61Compare
.aolAOL Inc.teamaol.com-3.61Compare
.brokerIG Group Holdings PLCiggroup.com-3.6Compare
.tradingIG Group Holdings PLCngtld.webcentral.com.au-3.6Compare
.spreadbettingIG Group Holdings PLCngtld.webcentral.com.au-3.6Compare
.nadexIG Group Holdings PLCngtld.webcentral.com.au-3.6Compare
.forexIG Group Holdings PLCngtld.webcentral.com.au-3.6Compare
.marketsIG Group Holdings PLCngtld.webcentral.com.au-3.6Compare
.cfdIG Group Holdings PLCngtld.webcentral.com.au-3.6Compare
.ubsUBS AGubs.com-3.6Compare
.bmsBristol-Myers Squibb Companybms.com-3.6Compare
.sasSAS AB (publ)sas.se-3.6Compare
.rweRWE AGrwe.com-3.6Compare
.abbABB Ltdch.abb.com-3.6Compare
.partyOriental Trading Company, Inc.oriental.com-3.6Compare
.sbsSPECIAL BROADCASTING SERVICE CORPORATIONsbs.com.au-3.6Compare
.changiairportChangi Airport Group (Singapore) Pte. LtdCHANGIAIRPORT.COM-3.6Compare
.javaOracle Corporationoracle.com-3.59Compare
.oracleOracle Corporationoracle.com-3.59Compare
.skySky IP International Ltd, a company incorporated in England and Wales, operating via its registered Swiss branchbskyb.com-3.58Compare
.mutualfundsFidelity Brokerage Services LLCfmr.com-3.57Compare
.iraFidelity Brokerage Services LLCfmr.com-3.57Compare
.fidelityFidelity Brokerage Services LLCfmr.com-3.57Compare
.retirementFidelity Brokerage Services LLCfmr.com-3.57Compare
.expressExpress LLCexpress.com-3.57Compare
.nextdirectNext plcnext.co.uk-3.57Compare
.nextNext plcnext.co.uk-3.57Compare
.walterSandvik ABngtld.webcentral.com.au-3.57Compare
.sandvikcoromantSandvik ABngtld.webcentral.com.au-3.57Compare
.sandvikSandvik ABsandvik.com-3.57Compare
.lundbeckH. Lundbeck A⁄Slundbeck.com-3.56Compare
.blancoBLANCO GmbH + Co KGblanco.de-3.56Compare
.accentureAccenture Global Services Limitedaccenture.com-3.56Compare
.juniperJUNIPER NETWORKS, INC.juniper.net-3.56Compare
.lefrakLeFrak Organization, Inc.ngtld.webcentral.com.au-3.56Compare
.bbtBB&T Corporationbbandt.com-3.56Compare
.lupinLUPIN LIMITEDlupinpharma.com-3.56Compare
.monsterMonster, Inc.monsterproducts.com-3.56Compare
.senerSener Ingeniería y Sistemas, S.A.sener.es-3.56Compare
.bloomingdalesMacys, Inc.macys.com-3.56Compare
.ladbrokesLADBROKES INTERNATIONAL PLCladbrokes.co.uk-3.56Compare
.warmanWeir Group IP Limitedweir.co.uk-3.56Compare
.weirWeir Group IP Limitedweir.co.uk-3.56Compare
.infyInfosys Limitedinfosys.com-3.56Compare
.BAREFOOTGallo Vineyards, Inc.ngtld.webcentral.com.au-3.56Compare
.betLADBROKES INTERNATIONAL PLCladbrokes.co.uk-3.56Compare
.infosysInfosys Limitedinfosys.com-3.56Compare
.GALLOGallo Vineyards, Inc.ngtld.webcentral.com.au-3.56Compare
.macysMacys, Inc.macys.com-3.56Compare
.jaguarJaguar Cars Limitedgmail.com-3.56Compare
.rockwoolRockwool International A⁄Srockwool.com-3.56Compare
.visaVisa International Service Associationvisa.com-3.56Compare
.webjetWebjet Limitedwebjet.com.au-3.56Compare
.chanelChanel International B.V.chanelusa.com-3.56Compare
.vanguardThe Vanguard Group, Inc.vanguard.com-3.56Compare
.arteAssociation Relative à la Télévision Européenne G.E.I.E.arte.tv-3.56Compare
.sanofiSanofisanofi.com-3.56Compare
.airbusAirbus S.A.S.airbus.com-3.56Compare
.statoilStatoil ASAstatoil.com-3.56Compare
.lipsyLipsy Ltdlipsy.co.uk-3.56Compare
.tiresBridgestone Americas Tire Operations, LLCngtld.webcentral.com.au-3.56Compare
.globalxGlobalX Information Services Pty Limitedglobalx.com.au-3.56Compare
.orangeOrange Brand Services Limitedorange.com-3.56Compare
.aegAktiebolaget Electroluxelectrolux.se-3.56Compare
.maifMutuelle Assurance Instituteur France (MAIF)maif.fr-3.56Compare
.weberSaint-Gobain Weber SAsaint-gobain.com-3.56Compare
.volvoVolvo Holding Sverige Aktiebolagconsultant.volvo.com-3.56Compare
.legoLEGO Juris A⁄SLEGO.com-3.56Compare
.astriumAstrium SASastrium.eads.net-3.55Compare
.COACHCoach, Inc.steptoe.com-3.55Compare
.rexrothBosch Rexroth AGboschrexroth.de-3.55Compare
.boschRobert Bosch GMBHde.bosch.com-3.55Compare
.ericssonTelefonaktiebolaget L M Ericssonericsson.com-3.55Compare
.嘉里Kerry Trading Co. Limitedkuokgroup.com-3.53Compare
.lindeLinde Aktiengesellschaftlinde.com-3.53Compare
.clubmedClub Méditerranée S.A.clubmed.com-3.5Compare
.盛貿飯店Shangri‐La International Hotel Management Limitedshangri-la.com-3.49Compare
.盛贸饭店Shangri‐La International Hotel Management Limitedshangri-la.com-3.49Compare
.tradershotelsShangri‐La International Hotel Management Limitedshangri-la.com-3.49Compare
.香格里拉Shangri‐La International Hotel Management Limitedshangri-la.com-3.49Compare
.shangrilaShangri‐La International Hotel Management Limitedshangri-la.com-3.49Compare
.kerrylogisiticsKerry Trading Co. Limitedkuokgroup.com-3.49Compare
.kuokgroupKerry Trading Co. Limitedkuokgroup.com-3.49Compare
.kerrypropertiesKerry Trading Co. Limitedkuokgroup.com-3.49Compare
.kerryhotelsKerry Trading Co. Limitedkuokgroup.com-3.49Compare
.嘉里大酒店Kerry Trading Co. Limitedkuokgroup.com-3.49Compare
.xperiaSony Mobile Communications ABsonyericsson.com-3.48Compare
.jcbJCB Co., Ltd.jcb.co.jp-3.48Compare
.koneKONE Corporationkone.com-3.46Compare
.nissayNippon Life Insurance Companyngtld.webcentral.com.au-3.46Compare
.tatamotorsTata Motors Ltdtatamotors.com-3.45Compare
.landroverLand Roverjaguarlandrover.com-3.45Compare
.artUK Creative Ideas Limitedwhitecase.com-3.45Compare
.poloRalph Lauren Corporationralphlauren.com-3.45Compare
.gentingResorts World Inc Pte. Ltd.ngtld.webcentral.com.au-3.45Compare
.pitneyPitney Bowes Inc.pb.com-3.45Compare
.nikonNIKON CORPORATIONnikonoa.net-3.45Compare
.softbankSOFTBANK CORP.softbank.co.jp-3.45Compare
.yodobashiYODOBASHI CAMERA CO.,LTD.yodobashi.com-3.45Compare
.goldpointYODOBASHI CAMERA CO.,LTD.yodobashi.com-3.45Compare
.nicoDWANGO Co., Ltd.dwango.co.jp-3.44Compare
.gooNTT Resonant Inc.mail.goo.ne.jp-3.44Compare
.lotteLotte Holdings Co., Ltd.lotte.co.jp-3.44Compare
.SHELLShell Information Technology International Incvalideus.com-3.43Compare
.닷넷VeriSign Sarlverisign.com-3.38Compare
.大拿VeriSign Sarlverisign.com-3.38Compare
.कॉमVeriSign Sarlverisign.com-3.38Compare
.كومVeriSign Sarlverisign.com-3.38Compare
.नेटVeriSign Sarlverisign.com-3.38Compare
.комVeriSign Sarlverisign.com-3.38Compare
.קוֹםVeriSign Sarlverisign.com-3.38Compare
.コムVeriSign Sarlverisign.com-3.38Compare
.닷컴VeriSign Sarlverisign.com-3.38Compare
.点看VeriSign Sarlverisign.com-3.38Compare
.點看VeriSign Sarlverisign.com-3.38Compare
.คอมVeriSign Sarlverisign.com-3.38Compare
.comsecVeriSign, Inc.verisign.com-3.37Compare
.pictetPictet Europe S.A.agencevirtuelle.com-3.31Compare
.bbvaBANCO BILBAO VIZCAYA ARGENTARIA, S.A.grupobbva.com-3.31Compare
.verisignVeriSign, Inc.verisign.com-3.3Compare
.dwgAutodesk, Inc.autodesk.com-3.28Compare
.SESSESses.com-3.24Compare
.BOFANMS Services, Inc.fairwindspartners.com-3.22Compare
.BEAUTYLʹOréalloreal.com-3.21Compare
.HAIRLʹOréalloreal.com-3.2Compare
.SALONLʹOréalloreal.com-3.2Compare
.MAKEUPLʹOréalloreal.com-3.2Compare
.SKINLʹOréalloreal.com-3.2Compare
.SAMSCLUBWal-Mart Stores, Inc.fairwindspartners.com-3.19Compare
.一号店Wal-Mart Stores, Inc.fairwindspartners.com-3.19Compare
.GEORGEWal-Mart Stores, Inc.fairwindspartners.com-3.19Compare
.ASDAWal-Mart Stores, Inc.fairwindspartners.com-3.19Compare
.WALMARTWal-Mart Stores, Inc.fairwindspartners.com-3.19Compare
.KIEHLSLʹOréalloreal.com-3.19Compare
.REDKENLʹOréalloreal.com-3.19Compare
.MAYBELLINELʹOréalloreal.com-3.19Compare
.MATRIXLʹOréalloreal.com-3.19Compare
.KERASTASELʹOréalloreal.com-3.19Compare
.欧莱雅LʹOréalloreal.com-3.19Compare
.LOREALLʹOréalloreal.com-3.19Compare
.GARNIERLʹOréalloreal.com-3.19Compare
.GROCERYWal-Mart Stores, Inc.wileyrein.com-3.18Compare
.GUARDIANThe Guardian Life Insurance Company of Americafairwindspartners.com-3.17Compare
.GUARDIANLIFEThe Guardian Life Insurance Company of Americafairwindspartners.com-3.17Compare
.CAPITALONECapital One Financial Corporationfairwindspartners.com-3.17Compare
.AARPAARPfairwindspartners.com-3.17Compare
.FAIRWINDSFairWinds Partners, LLCfairwindspartners.com-3.17Compare
.TIFFANYTiffany and Companyfairwindspartners.com-3.16Compare
.STAPLESStaples, Inc.fairwindspartners.com-3.15Compare
.TIAATeachers Insurance and Annuity Association of Americafairwindspartners.com-3.14Compare
.LANCOMELʹOréalloreal.com-3.14Compare
.LIAISONLiaison Technologies, Incorporatedfairwindspartners.com-3.12Compare
.CLOUDSymantec Corporationfairwindspartners.com-3.11Compare
.OMEGAThe Swatch Group Ltdfairwindspartners.com-3.11Compare
.SWATCHThe Swatch Group Ltdfairwindspartners.com-3.11Compare
.AMERICANFAMILYAmFam, Inc.fairwindspartners.com-3.11Compare
.AMFAMAmFam, Inc.fairwindspartners.com-3.11Compare
.SECURITYSymantec Corporationfairwindspartners.com-3.11Compare
.NORTONSymantec Corporationfairwindspartners.com-3.11Compare
.SYMANTECSymantec Corporationfairwindspartners.com-3.11Compare
.PROTECTIONSymantec Corporationfairwindspartners.com-3.11Compare
.ANTIVIRUSSymantec Corporationfairwindspartners.com-3.11Compare
.MERCKMSDMSD Registry Holdings, Inc.fairwindspartners.com-3.08Compare
.MSDMSD Registry Holdings, Inc.fairwindspartners.com-3.08Compare
.RAIDJohnson Shareholdings, Inc.fairwindspartners.com-3.06Compare
.MRMUSCLEJohnson Shareholdings, Inc.fairwindspartners.com-3.06Compare
.OFFJohnson Shareholdings, Inc.fairwindspartners.com-3.06Compare
.GLADEJohnson Shareholdings, Inc.fairwindspartners.com-3.06Compare
.AFAMILYCOMPANYJohnson Shareholdings, Inc.fairwindspartners.com-3.06Compare
.RIGHTATHOMEJohnson Shareholdings, Inc.fairwindspartners.com-3.06Compare
.FUJIXEROXXerox DNHC LLCfairwindspartners.com-3.05Compare
.XEROXXerox DNHC LLCfairwindspartners.com-3.05Compare
.DUCKJohnson Shareholdings, Inc.fairwindspartners.com-3.05Compare
.SCJOHNSONJohnson Shareholdings, Inc.fairwindspartners.com-3.05Compare
.webWeb.com Group, Inc.web.com-3.04Compare
.MERCKMerck Registry Holdings, Inc.fairwindspartners.com-2.98Compare
.MERCKMerck Registry Holdings, Inc.fairwindspartners.com-2.98Compare
.BUYPVT Registry, LLCfairwindspartners.com-2.98Compare
.oooINFIBEAM INCORPORATION LIMITEDinfibeam.net-2.96Compare
.NATIONWIDENationwide Mutual Insurance Companygmail.com-2.96Compare
.ONYOURSIDENationwide Mutual Insurance Companynationwide.com-2.96Compare
.INCCNI Registry, LLCfairwindspartners.com-2.87Compare
.LLCLLC Registry, LLCfairwindspartners.com-2.86Compare
.LLPPLL Registry, LLCfairwindspartners.com-2.85Compare
.LTDLTD Registry, LLCfairwindspartners.com-2.84Compare
.livestrongLance Armstrong Foundationlivestrong.org-2.8Compare
.GMBHGMBH Registry, LLCfairwindspartners.com-2.78Compare
.CORPPROC Registry, LLCfairwindspartners.com-2.78Compare
.obiOBI Group Holding GmbHobi.de-2.75Compare
.iceIntercontinentalExchange, Inc.theice.com-2.63Compare
.bankfTLD Registry Services LLCfsround.org-2.58Compare
.insurancefTLD Registry Services LLCfsround.org-2.58Compare