Quantcast
Channel: EfficientIP
Browsing all 315 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How DNS Security Protects the Financial Industry Against Cyberattacks

For many years, the volume of sensitive customer and financial data in circulation have made the financial services sector an attractive target for attackers, and the COVID-19 pandemic has further...

View Article


Image may be NSFW.
Clik here to view.

Improving Operational Efficiency with DDI Automation & Event Forwarding

The DDI (DNS-DHCP-IPAM) solution is the central point for any IP related information you have on your network, so being able to automatically inform other IT components about any modifications is a...

View Article


Image may be NSFW.
Clik here to view.

SOLIDserver Release 8.0: Enhancing Multi Cloud Control and Security

The Release 8.0 of SOLIDserver puts strong focus on support of multi cloud services and strengthening of DNS Security, thus helping network teams improve control and visibility over their entire...

View Article

Image may be NSFW.
Clik here to view.

Signs It’s Time To Upgrade Your IPAM

As the technology that drives business forward evolves, so does the need for a more complex network that keeps everyone securely connected. An improved IP address management (IPAM) solution upgrade...

View Article

Image may be NSFW.
Clik here to view.

Addressing DNS Security Risks That Threaten The Education Sector

In the wake of the pandemic, the education sector saw one of the most dramatic digital transformations as schools and universities worldwide were forced to move overnight to remote learning. This...

View Article


Image may be NSFW.
Clik here to view.

Simplify Management of DNS Services with DNS Cloud Extension to Azure DNS Zones

Hardening your DNS infrastructure Securing your Internet visibility at a global scale is easily achieved using Public Cloud DNS Services. To avoid Public Cloud vendor lock-in you need a solution that...

View Article

Image may be NSFW.
Clik here to view.

Improving I&O Efficiency with DNS and DHCP Services in Containers

Running applications, components and services in containers is particularly interesting with regards to the ease of deployment, the level of isolation and the topologies authorized through some modern...

View Article

Image may be NSFW.
Clik here to view.

Fighting DDoS Attacks with Hybrid Cloud DNS

DNS security is often in the news, a notable example being due to one of the largest DDoS attacks ever disrupting the Dyn cloud DNS service. At least 150,000 compromised devices (including IoT...

View Article


Image may be NSFW.
Clik here to view.

How DNS Security Protects the Most Targeted Industry: Telecoms

The past year has only increased the pressure placed upon the telecoms and media industry as companies continue their transition to the hybrid working model post pandemic and organizations continue to...

View Article


Image may be NSFW.
Clik here to view.

How to Enhance Threat Intelligence with Newly Observed Domains

Domain names life cycle… Domain names are used as a way to abstract the location of the related application or service and hide its IP address to the user. It is much easier to remember a meaningful...

View Article

Image may be NSFW.
Clik here to view.

DNS Security – A Critical Element of the Shift to Long-Term Remote Work

Twenty months into the COVID-19 pandemic, remote work is no longer a temporary situation but the status quo for many. In fact, recently Gartner forecasts indicated that by the close of this year, 51%...

View Article

Image may be NSFW.
Clik here to view.

A Modern DDI Solution Enables Successful Partnerships Between NetOps and SecOps

​​This week’s blog comes courtesy of guest author Shamus McGillicuddy (VP of Research at EMA), a leading industry analyst covering enterprise network technology. Network operations and security...

View Article

Image may be NSFW.
Clik here to view.

Ansible & DDI Automation: Connecting Compute and Network Teams

Ansible as a solid automation foundation Ansible is a great open source software for managing server fleets with regards to their installation and configuration. With Ansible able to exchange with a...

View Article


Image may be NSFW.
Clik here to view.

DDI for Telco: Improving Business Continuity, Operational Efficiency and...

For Telecom operators and Internet Service Providers, IP networks are becoming increasingly complex to manage and evolve. Multi cloud, IoT, 5G and other digital transformation projects have introduced...

View Article

Image may be NSFW.
Clik here to view.

SOLIDserver NOT Impacted by Log4j Security Vulnerability

The EfficientIP SOLIDserver Solution is not affected by the security vulnerability described in the CVE-2021-44228 as it does not in any way use the Apache Log4j library. Following publicity around...

View Article


Image may be NSFW.
Clik here to view.

2021 Year in Review: Networking and Security in a Pandemic World

With the Covid pandemic still ongoing, 2021 turned out to be a very disruptive year for organizations and their network infrastructures. For every industry, cyberattacks remained top of mind as cases...

View Article

Image may be NSFW.
Clik here to view.

Top 5 IT Network and Security Predictions for 2022

Welcome to 2022, a year which promises to be full of turbulence with the pandemic still ongoing and organizations forced to adopt hybrid working models. Network security and privacy will no doubt be...

View Article


Image may be NSFW.
Clik here to view.

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the...

View Article

Image may be NSFW.
Clik here to view.

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about...

View Article

Image may be NSFW.
Clik here to view.

Cybersquatting: The Basics Part 2 – How to Protect Yourself

In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On...

View Article
Browsing all 315 articles
Browse latest View live