How DNS Security Protects the Financial Industry Against Cyberattacks
For many years, the volume of sensitive customer and financial data in circulation have made the financial services sector an attractive target for attackers, and the COVID-19 pandemic has further...
View ArticleImproving Operational Efficiency with DDI Automation & Event Forwarding
The DDI (DNS-DHCP-IPAM) solution is the central point for any IP related information you have on your network, so being able to automatically inform other IT components about any modifications is a...
View ArticleSOLIDserver Release 8.0: Enhancing Multi Cloud Control and Security
The Release 8.0 of SOLIDserver puts strong focus on support of multi cloud services and strengthening of DNS Security, thus helping network teams improve control and visibility over their entire...
View ArticleSigns It’s Time To Upgrade Your IPAM
As the technology that drives business forward evolves, so does the need for a more complex network that keeps everyone securely connected. An improved IP address management (IPAM) solution upgrade...
View ArticleAddressing DNS Security Risks That Threaten The Education Sector
In the wake of the pandemic, the education sector saw one of the most dramatic digital transformations as schools and universities worldwide were forced to move overnight to remote learning. This...
View ArticleSimplify Management of DNS Services with DNS Cloud Extension to Azure DNS Zones
Hardening your DNS infrastructure Securing your Internet visibility at a global scale is easily achieved using Public Cloud DNS Services. To avoid Public Cloud vendor lock-in you need a solution that...
View ArticleImproving I&O Efficiency with DNS and DHCP Services in Containers
Running applications, components and services in containers is particularly interesting with regards to the ease of deployment, the level of isolation and the topologies authorized through some modern...
View ArticleFighting DDoS Attacks with Hybrid Cloud DNS
DNS security is often in the news, a notable example being due to one of the largest DDoS attacks ever disrupting the Dyn cloud DNS service. At least 150,000 compromised devices (including IoT...
View ArticleHow DNS Security Protects the Most Targeted Industry: Telecoms
The past year has only increased the pressure placed upon the telecoms and media industry as companies continue their transition to the hybrid working model post pandemic and organizations continue to...
View ArticleHow to Enhance Threat Intelligence with Newly Observed Domains
Domain names life cycle… Domain names are used as a way to abstract the location of the related application or service and hide its IP address to the user. It is much easier to remember a meaningful...
View ArticleDNS Security – A Critical Element of the Shift to Long-Term Remote Work
Twenty months into the COVID-19 pandemic, remote work is no longer a temporary situation but the status quo for many. In fact, recently Gartner forecasts indicated that by the close of this year, 51%...
View ArticleA Modern DDI Solution Enables Successful Partnerships Between NetOps and SecOps
This week’s blog comes courtesy of guest author Shamus McGillicuddy (VP of Research at EMA), a leading industry analyst covering enterprise network technology. Network operations and security...
View ArticleAnsible & DDI Automation: Connecting Compute and Network Teams
Ansible as a solid automation foundation Ansible is a great open source software for managing server fleets with regards to their installation and configuration. With Ansible able to exchange with a...
View ArticleDDI for Telco: Improving Business Continuity, Operational Efficiency and...
For Telecom operators and Internet Service Providers, IP networks are becoming increasingly complex to manage and evolve. Multi cloud, IoT, 5G and other digital transformation projects have introduced...
View ArticleSOLIDserver NOT Impacted by Log4j Security Vulnerability
The EfficientIP SOLIDserver Solution is not affected by the security vulnerability described in the CVE-2021-44228 as it does not in any way use the Apache Log4j library. Following publicity around...
View Article2021 Year in Review: Networking and Security in a Pandemic World
With the Covid pandemic still ongoing, 2021 turned out to be a very disruptive year for organizations and their network infrastructures. For every industry, cyberattacks remained top of mind as cases...
View ArticleTop 5 IT Network and Security Predictions for 2022
Welcome to 2022, a year which promises to be full of turbulence with the pandemic still ongoing and organizations forced to adopt hybrid working models. Network security and privacy will no doubt be...
View ArticleAugmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer
You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the...
View ArticleCybersquatting: The Basics Part 1 – Strategies and Attack Types
DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about...
View ArticleCybersquatting: The Basics Part 2 – How to Protect Yourself
In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On...
View Article