Blogs on DDI for Network Automation & Network Security DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance. Search Search Search Clear Categories Categories CategoriesNoneDDI (127)DNS (121)DNS Security (118)IPAM (94)Network Automation (58)Virtualization & Cloud (34)DHCP (29)Internet of Things (18)Application Traffic Routing (11)GDPR (11)Privacy Laws (11) Topics Topics TopicsNoneDNS (182)DDI Solutions (126)DDI (125)DDI Management (125)DDI Services (124)DNS Solution (98)Network Automation (98)IPAM (93)DNS Management (90)IPAM Repository (88) Sort Sort SortNoneBy NewestBy OldestBy Title (A-Z)By Title (Z-A) DNS SecurityDNS Security for Retail: Protecting Revenue & BrandThe work-from-anywhere environment has accelerated the transition to the cloud, e-commerce and in-store retailers are experiencing heightened security risks. Risks that lead to more network downtime and data theft potential. Cybersecurity incidents can hit a retailer’s reputation hard, causing customers to switch allegiance to a competitor. Smart DNS security offers the network visibility and analytics that retailers require for having the confidence to withstand potential cyber-attacks. Confidence in their capability to recover quickly and safeguard consumer data. While maintaining a...DDINetwork AutomationSOLIDserver 8.2: Enhancing Network Automation and Cloud Asset ManagementWith the Release 8.2 of SOLIDserver, IT teams including CloudOps, DevOps, and NetSecOps are provided with two new products that strengthen their capability to better view cloud instances and network objects to accelerate their automation journey, increasing their agility and help decision-making to sustain business needs. Complementary benefits can be envisaged around enhanced cost control, risk management, and meeting compliance. These significant benefits are brought by the following two major products introduced with Release 8.2: Cloud Observer: Centralized Visibility Over...DNSHow Telcos Overcome Rising DNS AttacksTelecommunication operators control and run the critical infrastructure vital for communicating and storing large amounts of sensitive data. This makes them an obvious major target for cyber attacks, frequently using DNS as an attack vector to cause devastating impacts on internet connectivity and data confidentiality. According to a recent IDC security report, Telcos are the 2nd most targeted vertical, with 94 percent of them suffering DNS attacks. Other reports estimate each DDoS attack carried out through DNS costs over $220,000...DDIDNSDNS RFCs: The Elephant in the Room – Part 2As stated in Part 1 of this series, DNS RFCs have a great impact on how DNS operates. It comes with a risk factor and can impact security. In this second part, we will continue to discuss the impact and provide some food for thought on how to deal with it. DNS is a clear Favorite – Everyone, and I mean EVERYONE loves it! DNS has had more than 25 years to mature, and with that, also the bad actors that want...DNSDNS SecurityNetwork Security for Higher Education: The Key Role of DNSLast year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS as an attack target or a vector. IDC’s 2022 Global DNS Threat Report shows that 84% of schools and universities were victims of DNS attacks in the past 12 months. The report then goes on to provide recommendations on how purpose-built DNS...DDIDNSDNS SecurityDNS RFCs: The Elephant in the Room – Part 1DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an “RFC” The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...DNSDNS SecurityDNS Security for Healthcare: Controlling Connected Devices and Protecting Patient DataOver the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...Application Traffic RoutingDDIDHCPDNSDNS SecurityIPAMNetwork AutomationVirtualization & CloudSD-WAN: Why DDI is Key for Efficient ManagementAs published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Let’s review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...DNS SecurityHow to Secure Anywhere Networking with DNS: 2022 Threat Report HighlightsAs organizations adopt a “work from anywhere” approach, IDC’s 2022 Global DNS Threat Report confirms that the frequency and damage cost of DNS attacks have remained as high as ever, causing severe impacts on service continuity and data confidentiality for on-premises, cloud, and remote workers. On the positive side, the importance of DNS for overall network security is being increasingly acknowledged, with organizations understanding its criticality for strengthening resilience, protecting data privacy, and for providing an early security barrier by...DDIIPAMEnhancing Visibility & Control Over Google Cloud Platform with IPAM SyncToday, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...DNSDNS SecurityAccess Control via DNS Applied to Parental ControlMore and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...DDIDNSDNS SecurityIPAMSOLIDserver 8.1: Simplifying Multi Cloud Management and App Access ControlThe Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates... Load more (198) 123…1718Next
DNS SecurityDNS Security for Retail: Protecting Revenue & BrandThe work-from-anywhere environment has accelerated the transition to the cloud, e-commerce and in-store retailers are experiencing heightened security risks. Risks that lead to more network downtime and data theft potential. Cybersecurity incidents can hit a retailer’s reputation hard, causing customers to switch allegiance to a competitor. Smart DNS security offers the network visibility and analytics that retailers require for having the confidence to withstand potential cyber-attacks. Confidence in their capability to recover quickly and safeguard consumer data. While maintaining a...
DDINetwork AutomationSOLIDserver 8.2: Enhancing Network Automation and Cloud Asset ManagementWith the Release 8.2 of SOLIDserver, IT teams including CloudOps, DevOps, and NetSecOps are provided with two new products that strengthen their capability to better view cloud instances and network objects to accelerate their automation journey, increasing their agility and help decision-making to sustain business needs. Complementary benefits can be envisaged around enhanced cost control, risk management, and meeting compliance. These significant benefits are brought by the following two major products introduced with Release 8.2: Cloud Observer: Centralized Visibility Over...
DNSHow Telcos Overcome Rising DNS AttacksTelecommunication operators control and run the critical infrastructure vital for communicating and storing large amounts of sensitive data. This makes them an obvious major target for cyber attacks, frequently using DNS as an attack vector to cause devastating impacts on internet connectivity and data confidentiality. According to a recent IDC security report, Telcos are the 2nd most targeted vertical, with 94 percent of them suffering DNS attacks. Other reports estimate each DDoS attack carried out through DNS costs over $220,000...
DDIDNSDNS RFCs: The Elephant in the Room – Part 2As stated in Part 1 of this series, DNS RFCs have a great impact on how DNS operates. It comes with a risk factor and can impact security. In this second part, we will continue to discuss the impact and provide some food for thought on how to deal with it. DNS is a clear Favorite – Everyone, and I mean EVERYONE loves it! DNS has had more than 25 years to mature, and with that, also the bad actors that want...
DNSDNS SecurityNetwork Security for Higher Education: The Key Role of DNSLast year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS as an attack target or a vector. IDC’s 2022 Global DNS Threat Report shows that 84% of schools and universities were victims of DNS attacks in the past 12 months. The report then goes on to provide recommendations on how purpose-built DNS...
DDIDNSDNS SecurityDNS RFCs: The Elephant in the Room – Part 1DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an “RFC” The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...
DNSDNS SecurityDNS Security for Healthcare: Controlling Connected Devices and Protecting Patient DataOver the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...
Application Traffic RoutingDDIDHCPDNSDNS SecurityIPAMNetwork AutomationVirtualization & CloudSD-WAN: Why DDI is Key for Efficient ManagementAs published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Let’s review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...
DNS SecurityHow to Secure Anywhere Networking with DNS: 2022 Threat Report HighlightsAs organizations adopt a “work from anywhere” approach, IDC’s 2022 Global DNS Threat Report confirms that the frequency and damage cost of DNS attacks have remained as high as ever, causing severe impacts on service continuity and data confidentiality for on-premises, cloud, and remote workers. On the positive side, the importance of DNS for overall network security is being increasingly acknowledged, with organizations understanding its criticality for strengthening resilience, protecting data privacy, and for providing an early security barrier by...
DDIIPAMEnhancing Visibility & Control Over Google Cloud Platform with IPAM SyncToday, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...
DNSDNS SecurityAccess Control via DNS Applied to Parental ControlMore and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...
DDIDNSDNS SecurityIPAMSOLIDserver 8.1: Simplifying Multi Cloud Management and App Access ControlThe Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...