Skip to content

Blogs on DDI for Network Automation & Network Security

DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance.

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

IPAM: The Foundation of the Modern ISP

To deliver IT services successfully you need a system of record- one place that holds the details of all the devices running on your network, where they are and what they are doing. In most modern service management methodologies, that one place is a configuration management database, where service managers monitor and control changes. But in the cloud and at scale that, model breaks down. That’s why ISPs and telcos are starting to take a different approach to finding the...

Fighting DDoS Attacks with Hybrid DNS

DNS security has been in the news again, with one of the largest DDoS attacks ever disrupting the Dyn cloud DNS service. At least 150,000 compromised devices (including IoT hardware) were used by the Mirai botnet to bombard cloud-hosted DNS servers with DNS requests, taking down access to many of the Internet’s most popular services. It’s not the only major service provider that’s had a DNS-based attack in the last few weeks, with Singapore’s StarHub reporting a similar incident. What...

Get Ready For the Future of Retail with DNS

Walk into a modern shop and you’ll see this new interface to the world of retail. It’s chip credit card readers, barcode scanners, smart e-paper price labels, intelligent posters, and Bluetooth beacons- a list that goes on and on and into the cloud. They’re tools that are bringing about new ways of selling, and are changing the face of retail in ways you wouldn’t expect. For instance, at its recent Dreamforce event, Salesforce notably demonstrated a tool that used Bluetooth...

Anyone For Tennis? Serving Up Secure DNS

If you think about the ideal scenario for a hacker to gain access to systems, you would come up with a large attack surface and lots of opportunity to disguise attacks as genuine network access. Imagine a network with thousands of potentially unauthenticated devices converging in a short period of time, producing extreme spikes in traffic. Sound like the crowd at a sporting event? Going for gold – the motivation of elite hackers In many ways, the attacks facing the...

IT Teams – Beware of Accidental Fame Thanks to GDPR

Fame is something most IT practitioners never experience, nor desire. However, this IT instinct to stay ‘below the radar’ is about to be challenged in a way many did not foresee, due to formidable EU data regulations. For those who do not exercise care, the outcome may make some IT infrastructure experts accidentally famous – in a bad way. While the new General Data Protection Regulation (GDPR) legislation may seem a world away from IT infrastructure and IP provisioning, it...

All or Nothing: Why Partial Automation Does Not Work

As we build out cloud applications and networks, we need to change the way we deliver and manage IP addresses. Many of the tools we currently use were designed for the good old days, when we had one or two, or maybe tens of servers to support a single application- a server was deployed once and it sat in the datacenter for years. That’s all changed. We’re now deploying hundreds, even thousands, of virtual servers; taking advantage of the speed...

IoT Security: Are Universities’ DNS and DHCP Ready for the Challenge?

Today, our communications are greatly enhanced by access to the Internet, giving the ability to connect computers through a global network infrastructure. While we once only connected directly through a static port computer, we now utilize more than five connected items on average, making the total amount of IoT devices expected to more than double every five years. However, connecting all of these devices through private or public networks has its dark side too, and can be challenging for many...

Improving DNS Security Helps APAC Businesses Stay Online

EfficientIP’s 2016 global DNS security survey doesn’t just show the global picture; it lets us drill down into regional differences between various major marketplaces. We’ve already looked at the results from the USA and European markets, and in this second in a series of regional explorations, we’re now looking at the results from Asia, from which EfficientIP interviewed 200 different companies as part of its survey. Asia is home to many of the world’s most advanced economies, driving the global...

European Businesses At Risk of DNS-Powered Security Breaches

The European single market is an attractive place to do business, an open trade zone with common regulation that encompasses 28 countries and nearly 600 million people, combined with liberal EU-wide telecom policies. That also means it’s an attractive place for online criminals who are becoming increasingly sophisticated. With an EU-wide privacy policy, GDPR (now in place and with less than two years for businesses to become compliant), securing your systems is now a high priority: with GDPR it’s possible...

Understanding Privacy Shield

Different parts of the world have different views of how we need to treat personally-identifiable information. Europe takes a much stronger view of personal privacy than the US, with a focus on giving users control of their personal information: no matter who holds the data, the user has the right to determine how it’s used – and must be informed of what’s being collected and why. For Europeans, personal privacy is a fundamental right, the result of a century of...

DDI In Cloud Services

The promise of the cloud is one of scalability- of applications and services that can scale on demand according to the need, booking only appropriate compute and storage capacity. That means designing resource provisioning processes capable of handling both public and private cloud technologies, while building appropriate orchestration tools to automate them. In the cloud, you’re not working with one or two servers deployed for years. Instead it’s hundreds and thousands of dynamic instances, providing just the compute you need,...

What Mr. Robot Can Teach Businesses About Network Security

We here at EfficientIP love a good scripted drama…and with the return of the USA Network series Mr. Robot last week, we’re ready for a summer of mixing business with pleasure. If you’re unfamiliar with the show, a basic plot synopsis: Hacktivist group FSociety is on a mission to overthrow E Corp, a conglomerate that manufactures phones, computers and devices, and also happens to run a giant banking and consumer credit division. Led by unhinged vigilante hacker Elliot Alderson, FSociety...