Skip to content

Blogs on DDI for Network Automation & Network Security

DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance.

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

DNS Security for Retail: Protecting Revenue & Brand

The work-from-anywhere environment has accelerated the transition to the cloud, e-commerce and in-store retailers are experiencing heightened security risks. Risks that lead to more network downtime and data theft potential. Cybersecurity incidents can hit a retailer’s reputation hard, causing customers to switch allegiance to a competitor. Smart DNS security offers the network visibility and analytics that retailers require for having the confidence to withstand potential cyber-attacks. Confidence in their capability to recover quickly and safeguard consumer data. While maintaining a...

SOLIDserver 8.2: Enhancing Network Automation and Cloud Asset Management

With the Release 8.2 of SOLIDserver, IT teams including CloudOps, DevOps, and NetSecOps are provided with two new products that strengthen their capability to better view cloud instances and network objects to accelerate their automation journey, increasing their agility and help decision-making to sustain business needs. Complementary benefits can be envisaged around enhanced cost control, risk management, and meeting compliance. These significant benefits are brought by the following two major products introduced with Release 8.2: Cloud Observer: Centralized Visibility Over...

How Telcos Overcome Rising DNS Attacks

Telecommunication operators control and run the critical infrastructure vital for communicating and storing large amounts of sensitive data. This makes them an obvious major target for cyber attacks, frequently using DNS as an attack vector to cause devastating impacts on internet connectivity and data confidentiality. According to a recent IDC security report, Telcos are the 2nd most targeted vertical, with 94 percent of them suffering DNS attacks. Other reports estimate each DDoS attack carried out through DNS costs over $220,000...

DNS RFCs: The Elephant in the Room – Part 2

As stated in Part 1 of this series, DNS RFCs have a great impact on how DNS operates. It comes with a risk factor and can impact security. In this second part, we will continue to discuss the impact and provide some food for thought on how to deal with it. DNS is a clear Favorite – Everyone, and I mean EVERYONE loves it! DNS has had more than 25 years to mature, and with that, also the bad actors that want...

Network Security for Higher Education: The Key Role of DNS

Last year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS as an attack target or a vector. IDC’s 2022 Global DNS Threat Report shows that 84% of schools and universities were victims of DNS attacks in the past 12 months. The report then goes on to provide recommendations on how purpose-built DNS...

DNS RFCs: The Elephant in the Room – Part 1

DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an “RFC” The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...

DNS Security for Healthcare: Controlling Connected Devices and Protecting Patient Data

Over the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...

SD-WAN: Why DDI is Key for Efficient Management

As published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Let’s review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...

How to Secure Anywhere Networking with DNS: 2022 Threat Report Highlights

As organizations adopt a “work from anywhere” approach, IDC’s 2022 Global DNS Threat Report confirms that the frequency and damage cost of DNS attacks have remained as high as ever, causing severe impacts on service continuity and data confidentiality for on-premises, cloud, and remote workers. On the positive side, the importance of DNS for overall network security is being increasingly acknowledged, with organizations understanding its criticality for strengthening resilience, protecting data privacy, and for providing an early security barrier by...

Enhancing Visibility & Control Over Google Cloud Platform with IPAM Sync

Today, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...

Access Control via DNS Applied to Parental Control

More and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...