Quantcast
Channel: EfficientIP
Browsing all 310 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Why SAD DNS Isn’t So Sad with SOLIDserver

DNS is at the middle of any communication intent, making it a popular target for hackers, who always manage to find new ways to attack such a critical service. Sometimes, it is not the engine itself...

View Article


Image may be NSFW.
Clik here to view.

Scalability and Internet Performance: Top Considerations for Retailers

The late ‘90s was really the beginning of the Internet and DNS. The technology was fun to play with, but was really only required if a user was sending emails to someone on the ARPAnet or, later,...

View Article


Image may be NSFW.
Clik here to view.

Tackling Cyberattacks on Government with DNS Security

Cyberattacks spare no industry. One popular target for hackers is the Domain Name System (DNS), which can easily be exploited without adequate security measures due to its openness. DNS attacks within...

View Article

Image may be NSFW.
Clik here to view.

DNS GSLB for Disaster Recovery

While application data controllers (or load balancers) are capable of distributing application traffic towards servers within the data center, a global server load balancing (GSLB) solution enhances...

View Article

Image may be NSFW.
Clik here to view.

Accelerating Transition to the New Normal: Top 5 Predictions for 2021

After the challenging events in 2020, the effects of the Covid pandemic will continue throughout next year, ensuring remote working & remote customers will remain in the limelight. In order to...

View Article


Image may be NSFW.
Clik here to view.

SOLIDserver 7.3: Boosting Network Automation, Security and Control

Release 7.3 of SOLIDserver builds on the importance of the centralized IP Source of Truth data repository and open APIs to boost automation capabilities of DDI. With a focus on simplifying network...

View Article

Image may be NSFW.
Clik here to view.

3 DDI Ways to Improve your Network Automation Journey

When tasked with rolling out new network infrastructure in hundreds or even thousands of retail stores to support the digital transformation initiative of his company, imagine what the Infrastructure...

View Article

Image may be NSFW.
Clik here to view.

Why Using DoH is Questionable

DoH (DNS over HTTPS) is an interesting solution for securing the transport of DNS traffic up to the first resolver. But is it required? What are the drawbacks? Do we really need it? Can we trust its...

View Article


Image may be NSFW.
Clik here to view.

DDI for Multicloud: Improving Opex, UX and App Deployment

When it comes to handling of new applications and workloads for modern digital infrastructures, multicloud is an unquestionable reality. However, the real value of cloud is being held back by siloed...

View Article


Image may be NSFW.
Clik here to view.

Remote Worker Protection Using DoH

Most organizations now have remote workers and need to provide them with maximum comfort and security to perform their operations. We all know that DNS can be abused to carry out very powerful...

View Article

Image may be NSFW.
Clik here to view.

SD-WAN: How DDI Simplifies Deployment and Operations

SD-WAN was born as Enterprises needed cheaper bandwidth and more nimble ways of deploying and operating WAN networks especially with the requirements of Digital Transformation. Although SD-WAN...

View Article

Image may be NSFW.
Clik here to view.

Application Access Control: It All Starts with DNS

Most IP communication starts with a DNS query to translate the server name contained in a URL or any application solution into an IP address. Whether it uses TCP or UDP (or any other communication...

View Article

Image may be NSFW.
Clik here to view.

Simplify IT Operational Management with Identity Manager

The IPAM is far more than just a repository of IP addresses and subnets. To cope with a wide variety of networking environments, it becomes interesting to store and manage additional objects such as...

View Article


Image may be NSFW.
Clik here to view.

DDI Automation for Infrastructure as Code

When using code to automate the activities in the infrastructure department, a DDI solution (DNS, DHCP & IPAM) is one of the parts to connect to and use data from. It may actually be a good...

View Article

Image may be NSFW.
Clik here to view.

DDI & Infrastructure Software Architecture

You are convinced about the interest of the Infrastructure As Code approach. But you don’t really know how to take best advantage of the code that will be produced. The principles used in software...

View Article


Image may be NSFW.
Clik here to view.

Enhancing IoT Security with DNS CQF

IoT devices are popping up every second, with many being on an organization’s network but not always under the control of I&O teams. These devices are required to be identified, inventoried,...

View Article

Image may be NSFW.
Clik here to view.

5 Reasons to Choose EfficientIP DDI

Requirements of today’s IT infrastructure IT infrastructure has become extremely complex and in perpetual evolution to match ever evolving business needs. In addition to planning the needs for...

View Article


Image may be NSFW.
Clik here to view.

Threat Actors Have Grown Smarter in Their DNS Attacks. Here’s How Companies...

Over the past year–during the COVID-19 pandemic–businesses have accelerated their digital transformation as the pandemic has continued to require off-premise working and online or cloud-based products...

View Article

Image may be NSFW.
Clik here to view.

Automating Security Compliance with SOLIDServer IPAM and Tufin Integration

You can’t secure what you don’t know As we know at EfficientIP, managing security of the IP Infrastructure nowadays is challenging. The move to cloud, deployment of SD-WAN networks and Zero Trust...

View Article

Image may be NSFW.
Clik here to view.

How DNS Security Can Help The Very-Targeted Healthcare Industry Fight Back

The COVID-19 pandemic has placed an incredible pressure on the healthcare industry, not just in the physical world but also in the digital one. Healthcare is uniquely vulnerable to cyberattacks,...

View Article
Browsing all 310 articles
Browse latest View live