IP address provisioning should work like a vending machine-Tempemail Zone

There are three ways to do IP address provisioning. First is what you might call “open access”.  In this model, the network team opens up the IPAM system for everyone to allocate IP addresses as ....

Continue reading

Network virtualization needs enterprise-level DNS-Tempemail Zone

Network virtualization is part of every network’s DNA. With virtualization, admins can provision and configure networks based on policy and business needs instead of routers and switches. As a result, network teams are delivering more ....

Continue reading

How to block DoH with BlueCat’s new threat feed option-Tempemail Zone

DNS over HTTPS (DoH) is a method of encrypting DNS queries which has gained a lot of traction recently.  In February 2020, DoH was added as a default setting in the Firefox browser.  Now ordinary ....

Continue reading

Introducing new deployment options for DNS Edge service points-Tempemail Zone

As businesses scale, network teams have to account for a constant increase in the number of devices connecting to the network. Full utilization of hardware and cloud investments is critical to ensuring fast, reliable, and ....

Continue reading

How DNS powers DevOps in DOD “software factories”-Tempemail Zone

The sleekest jet.  The biggest aircraft carrier.  The most badass tank.  DOD agencies used to engage in a not-so-subtle competition to develop the coolest hardware on the planet.  In recent years, however, the measure of ....

Continue reading

Bolster defense-in-depth with BlueCat threat feeds-Tempemail Zone

To block malicious network activity, you only need two things.  First, you need a way to filter network traffic through security policies.  Second, you need a threat feed to populate those security policies with up-to-date, ....

Continue reading

Stop advanced threats with BlueCat Threat Protection-Tempemail Zone

IoT is making networks smarter and more efficient, but comes with significant security trade offs. With 91% of malware using the DNS protocol, each new connection creates opportunities for DNS attacks to infiltrate the network ....

Continue reading

WFH is driving a DoH explosion – what’s the impact?-Tempemail Zone

The rapid, unplanned shift to working from home is uncovering a new world of challenges for network and security teams.  As new usage patterns emerge, everyone is looking to reduce their attack surface and optimize ....

Continue reading

BlueCat-Illusive integration enables efficient, effective deception-Tempemail Zone

Deception is quickly emerging as one of the most innovative and effective ways to protect a network.  It’s an idea that occupies a sensible middle ground in the spectrum of cybersecurity tactics.  Instead of merely ....

Continue reading