Malicious adversaries are as sneaky as they are intelligent. They have the creativity and ingenuity to create malware and botnets that can bring an enterprise’s […]
Forever 21 was the latest retail target of a point of sale cyber attack, joining the likes of Chipotle and Game Stop. Here’s how DNS can help secure your IoT devices, POS systems included.
With every new year comes New Year’s resolutions. So what changes should we commit to this year to keep our networks safe? As we look toward 2018, we also must look back on 2017, which taught us that large-scale cyber attacks are just the beginning.
When we set out to counter cyber threats, you can draw a number of parallels from actual battles. Sun Tzu says it best in The […]
Cyxtera Chief Cyber Security Officer Chris Day tackles the issues of the person on the front lines, securing the network perimeter: the threat hunter.
Scrambling to comply with NIST 800-171? Here’s how DNS-based security can help. And if you’re doing business with the US government, the cybersecurity standards in NIST 800-53 and NIST 800-171 are crucial.
On Wednesday, December 13, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS Data”. rovide some great insight into what’s happened this past year, and what we can expect in 2018.
Whether you’re the owner of an iPhone or the CISO of a multinational corporation, you want to keep your data under wraps. However, researchers have found a way to hack the new iPhone X’s Face ID. Here’s what that means in today’s breach era.
Every free DNS user arrives at a moment of truth sooner or later, as they realize that the cost of free far outweighs the price of a reliable, robust network infrastructure. Whether it’s the cost of adaptation, turnover, human error or scalability, every enterprise realizes at some point that when it comes to their DNS, they’ll get as much as they put in.
If there’s a burglar in your neighbourhood, you’d protect your home by any means necessary. Wouldn’t you do the same for your network? Bad actors move fast. It’s time to educate, prepare, and protect yourself, your network and your data.
The Medical University of South Carolina (MUSC) is complex, high performance environment. They need a network that can keep up.
Calculating the Cost of Free Organizations rely on DNS for critical business applications with many enterprises using a combination of DNS, DHCP and IPAM solutions, […]
Kohl’s, one of America’s largest retail department store chains, needed a reliable, scalable IT infrastructure they could count on. “Free” Microsoft DNS just wasn’t getting the job done.
At the BlueCat annual System Integrator Summit, Federal system integrators and partners met to discuss the strong value of DNS in network security solutions.
Deep Root Analytics, responsible for the largest known exposure of voter data in history, exposed the personal data of almost 2 million registered voters. Not only did it cost Americans their confidence, but it cost Deep Root their corporate reputation.
In part two of our series on European Enterprise DNS transformations, we take a look at three different enterprises, from aerospace to broadcast to education, […]
Electronic voting machines can be secured using DNS data. Monitor, identify and block voter fraud before constituents step into the voting booth.
Worst nightmare: Deleting company records that bring your corporate network to its knees. Automated DNS management is key to visibility and growth.
Bad actors know that DNS makes a great weapon in producing massive amounts of traffic for successful DDoS attacks. Here’s how.
Cyber security expert Richard Clarke talks security as a strategy, and giving the CISO deeper resources and more visibility at the executive table.
Chances are your organization is either working on a cloud strategy or has already implemented one. No matter what industry trend data you reference, the […]
High-growth companies are challenged to hire quickly and keep their unique corporate culture. This panel of HR executives discusses both.
BlueCat hosts JISA delegates at our Toronto office to discuss the growing need for network automation, cloud-based solutions and DNS security in Japan.
DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.
When you get senior network engineers from world class enterprises like Coca-Cola, Cox Automotive and The Home Depot, in a room together – and toss […]
No matter what business you’re in or where you’re located, your IT infrastructure is the backbone of your operation. In the first of this two […]
It’s a good thing we’ve expanded our office space – we might need to install a trophy cabinet. BlueCat is proud to announce that we’ve […]
Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of. SCADA systems power most industrial processes. Using sensors to […]
The Domain Name System is as old as the internet itself. Using DNS for network security, however, is a relatively new concept. As network administrators […]
This blog is the second in a four-part series, 3 Personas of DNS in Cyber Security Hackers are resourceful. They know that helpful DNS will […]
If you’re considering a DNS migration, you’ll want to know these guys, Chris Buxton and Reese Cline. Between them, these two DNS architects have 45 […]
It’s easy to understand why cyber attackers use DNS to do malicious things like spread malware and hobble networks to the point of complete denial […]
Here at the AFCEA Homeland Security conference, we’re hearing a very different tone on cyber security than in years past. Following the rapid-fire release of […]
There is a major festival going on in Toronto where thousands of people clutch their show passes and fill theatres to fawn over their idols. […]
How is Network Virtualization like a driverless car? That analogy emerged from a recent discussion on Network Virtualization among BlueCat CTO, Andrew Wertkin, Cerner Principal Architect, […]
Most cyber attacks are the online equivalent of a smash-and-grab robbery. Criminals tend to leave shortly after finding the information they are looking for, restricting […]
Ask any CISO what a perfect world looks like and you’ll no doubt hear, “Full network visibility to secure the enterprise with no possibility of […]
Where is the line between traditional IT administration and cyber security operations? Or is there a line at all? Those who use administrative DNS data […]
Here at the DoDIIS 2017 conference, we’re hearing a lot about the role of cybersecurity in so-called “fifth generation warfare” – a concept with direct […]
There is cruel irony in DNS. By their very nature, Domain Name Systems facilitate an internet-friendly naming environment making it simple and seamless for users […]
For Federal IT managers, compliance is a primary motivator. FISMA and agency guidelines provide a clear roadmap for cybersecurity, with the performance of Federal IT […]
What is digital transformation? According to InfoWorld, it’s simply the application of digital technologies to fundamentally impact all aspects of business and society. With such […]
“A well-oiled machine.” That’s the highest compliment any network administrator can receive. In a business where people tend to focus on the negative, systems that […]
It’s no secret that post-secondary students can be some of the biggest tech whizzes out there – between all the different devices they use on […]
Hot on the heels of last month’s WannaCry ransomware attack comes a new threat: NotPetya. Also referred to by names such as ‘SortaPetya’ and ‘GoldenEye’, […]
There, amongst all the bright lights and excitement in Las Vegas, was Cisco Live 2017. If you were able to look through the chaos and […]
On June 25, BlueCat will be in Las Vegas as a proud partner in Cisco Live 2017. Technology professionals from around the world will come […]
A CIO walks into a crowded room. Is he going to be the life of the party, or sit quietly in the corner? That’s a […]
3D Toronto: The HQ Hackathon Opens: 31 May, 2017 @ 9AM || Closes: 2 June, 2017 3D EMEA: The Royal Hackathon Opens: 24 May, 2017 || Closes: […]
Last week the world was confronted by a ransomware attack that affected hundreds of thousands of individuals and organizations in over 150 countries. The impact […]
Enterprise DNS offers CIOs a Foundation for Digital Transformation I couldn’t help but chuckle today reading that Joe Montana, the *second greatest NFL quarterback of […]
At BlueCat we’re proud of the innovation we are driving in the industry as well as the deep customer relationships we have forged with some […]
“BlueCat is bold for change because we encourage all of our employees to be courageous, differentiate and ask a lot of questions. We celebrate differences […]
Key questions to help you evaluate your current DNS solution Corporate networks have become incredibly complex. As more and more businesses digitally transform through key […]
As the retail industry continues to go through a dramatic digital transformation, the role of the CIO has never been more important. With the increasing […]
If you pay attention to the world of security you’ve probably heard about the upswing in a type of attack known as Malvertising. Data Breach Today […]
Higher education institutions have been dealing with BYOT for some 15 years, making them pioneers of this massive technology transformation. At the beginning of every […]
Scott Penney, Director of Cyber Security Solutions at BlueCat, talks about the mass cyber attack on Dyn and how you can protect your network with […]
For today’s technology leader, it’s no longer a question of whether you’ll integrate cloud deployments into your IT infrastructure. In fact, for many it’s no […]
It’s official, BlueCat is now certified as a GREAT WORKPLACE by Great Place to Work® Canada. Earning this achievement was no small feat – the […]
Dwell time is arguably the most accurate indicator of an enterprise’s security. It can determine how good you are in finding and eliminating actual breaches. […]
Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim. While their glazed expressions, […]
Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular […]
Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup […]
Years ago, futurists predicted many advances such as flying cars, teleportation, a cure for old age to name a few things that would be available […]
Think of a software feature you can’t remember life without. It can be anything: The “Like” button on Facebook, tagging in social media comments, the […]
A Practical Guide to Determining if You Should Banish Your Manual Processes Enterprises have long relied on spreadsheets to manage their core business functions […]
The health care industry is more susceptible to cyber attacks than any other industry today. Recent research by Raytheon/Websense found some startling trends. Compared to […]
A solid IT strategy and the right leadership mindset are critical for success As the pace and complexity of today’s business increases, IT has the […]
What happens when you invite eight grade nine students into your workplace? Lots of laughter, learning and an insider’s view of BlueCat. On Wednesday November […]
The momentum behind the adoption of Agile methodologies continues to build. Uptake has been growing over 10% year-over-year according to some research. As of 2014, […]
IT is the product IT is moving rapidly from an organization that automates and integrates value chains across their company and partners, to an organization […]
So you’re looking to invest in an enterprise DNS, DHCP and IP Address Management (DDI) solution. Whether you’re evaluating for the first time or are […]
We’ve all been there – where a specific IT scenario or event can be compared to a horror film, filled with suspense and terror.
In this post, a BlueCat customer discusses why organizations can’t afford to overlook DNS, DHCP and IPAM when planning for a disaster, and why a […]
In many organizations today, IP Address Management (IPAM) is an island.
Technology is always changing. Unstoppable topics like Cloud and IPv6 are still relatively young and all sorts of new technologies are popping up around them […]
During our instructor-led BlueCat Customer training courses, there’s a great deal of interaction between the students and our trainers. In fact, much of the value […]
We’ve read it over and over again, “No more excuses, time to roll out IPv6.” “Proof the Net needs to move to IPv6.” “ARIN enters […]
Every Connection Starts with DNS DNS is a core network service. You’d be hard pressed to think of a service, public or private, that doesn’t […]
Last week, I hosted a series of webinars to introduce and walk-through our new BlueCat Threat Protection product. Over 500 networking and security professionals signed […]
How can upgrading a service infrastructure be an art AND a science? I just click a button, the stuff upgrades, and I’m good… right? We’re […]
There’s no denying that Software Defined Networking (SDN) is a very hot topic. Most organizations we talk to have SDN on their roadmap; some already […]
BlueCat is solely focused on delivering IP address management, DNS and DHCP solutions, which means that security is a big part of everything we do. […]
Back in the old days, it was no sweat keeping track of IP addresses via spreadsheets or homegrown tools. That’s because there was a lot […]
If you’ve ever taken a BlueCat training course, there’s a good chance that I’m the guy who developed it. As the curriculum developer and a […]
No matter what industry or market you’re doing business in, chances are your network team is under enormous pressure to keep pace with business growth, […]
In this article, we demystify SDN and M2M and discuss the role of IP address management and automation in preparing your network and IT staff […]
One of the great things about working at BlueCat is knowing that what we do is foundational to every network connection in an organization. Having […]
For most enterprise networks, there are typically four or more jobs for DNS servers. Many DNS administrators don’t realize it, but it’s generally best to […]
We’ve all run into this person before. I’m talking about the “BIND guy” a.k.a the only guy in the entire enterprise who truly knows why […]
With virtualization now widely deployed in the data center, many large organizations are looking to private cloud for the next wave of business and operational […]
I got a quick lesson on the difficulty of fixing legacy IT management problems when I decided to start my own company. I worked in the IT automation space for six years and decided to quit my job at a large software vendor to try to bring a new product to market.
The Problem When first introduced, the driver for virtualization was consolidation and cost savings. Nearly every vendor advertised their solution with their slogan over top […]
There has long been a debate on what exactly cloud computing is and how it can benefit IT and business. Unfortunately, some providers have chosen […]
For many organizations, evaluating the security of a particular product can be difficult. It’s enough work just to evaluate the functionality of a solution, let […]
I’ve seen hundreds of customer architectures and spoken with most of their admins who have switched to BlueCat. A common question I ask is, “Why […]
The Threat Hunter’s New Weapon: DNS Data Chief Cybersecurity Officer for Cyxtera, Chris Day talks about the evolution of cybersecurity and rise of the threat […]
World renowned cyber security expert, Dick Clarke, advises on breaking the cycle of breach and blame by evolving the role of the CISO.
DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.
The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.
Powerful, software-driven DNS capabilities for Microsoft Azure Cloud
Your “free” DNS is anything but. Work-arounds only get you so far until you realize your IT infrastructure is inadequate. Use the calculator to see your true costs.
Wertkin Whiteboard 3 Personas of DNS in Cyber Security Depending on the (nefarious) intention, naive DNS is pressed into service differently to achieve different results. […]
Wertkin Whiteboard The Power of a Client-Facing DNS Firewall Learn why Enterprise DNS is the foundation for scalable, secure networks and critical to all of […]
Monitoring network activity is not enough. Act on DNS data to set security policy.
Why your overlooked DNS data is key to cyber attack detection, prevention and response.
Webinar Best Practices for Federal DNS Security Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment […]
Andrew Wertkin, BlueCat CTO, talks to Cerner and Dell about the core business drivers for implementing network virtualization and the impact of moving to a policy-driven approach
Webinar Exposing the Enemy Within Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network
Virtual testing environments for design, simulation and testing of real-world topologies and conditions.
Learn how BlueCat Enterprise DNS solutions increase network reliability and security, while enabling growth and change.
Simplify Complex IT Tasks and Workflows for VMware Solutions
A new and innovative approach to enterprise security that utilizes the pervasive nature of your DNS infrastructure.
Best practices network architectures that are centralized and automated, delivering core DNS, DHCP and IPAM services rapidly and without compromise
Webinar DNS: Are Security & Complexity Really Mutually Exclusive? BlueCat’s Director of Cyber Security Solutions discusses the crucial role that DNS data plays in cyber-security […]
The BlueCat vRO Plug-in ensures high speed and reliable provisioning of IP addresses and DNS names for virtual resources.
We take the risk out of your migrations.
Microsoft Active Directory is dependent on DNS to function. This e-book discusses the common challenges with Microsoft DNS when it is integrated with Active Directory.
BlueCat helps W&W Informatik seamlessly transition from previous DDI solution, increasing productivity and eliminating down-time
Cologne Bonn Airport is one of the largest commercial airports in Germany. With approximately 9.45 million passengers per year, it is the seventh largest passenger […]
Connecting your DDI solution with critical infrastructure ensures maximum value of your investment and uptime.
Learn more about BlueCat’s Enterprise DNS solutions and product details.
THE CUSTOMER Founded in Offenburg, Germany in 1927 and originally called “The Grocery Purchasing Cooperative,” Edeka SouthWest is one of the largest food producers, distributors, […]
Alesund kommune Simplifies Network Management and Eliminates DHCP-Related Downtime with BlueCat
BlueCat Provided Support and Expertise, as well as a Resilient, Scalable, and Redundant Network to University College Dublin
The Universität Salzburg Implements a Comprehensive DNS, DHCP and IP Address Management (DDI) Solution with BlueCat
TYROLIT Delivers Resilient DNS and DHCP with BlueCat; Looks Ahead to IPv6
THE CHALLENGE Located in North-Rhine Westphalia (NRW), western Germany, the Hochschule Ostwestfalen-Lippe – University of Applied Sciences (www.hs-owl.de), or HS-OWL, has three campuses in the […]
THE CHALLENGE With nearly 3,000 students in six colleges, 1,500 full and part-time teaching staff and a 750-bed medical center, the Medical University of South […]
THE CHALLENGE ProSiebenSat.1 Produktion is a wholly-owned subsidiary of ProSiebenSat.1 Media AG. With a digital platform that leads the way in Europe, ProSiebenSat.1 Produktion offers […]
A DNS firewall solution that provides an additional layer of defense against malware, botnets and other malicious activities.
Learn about our best-in-class support services – from 24/7 technical support via our Care online portal, email or phone to four-hour on-site hardware repair.
Automatically register and track all devices connecting to your network for mobile security and BYOD.
The Connector for IBM QRadar allows organizations to pinpoint attacks and threats by providing detailed information about every device on the network.
The Connector for HP ArcSight allows organizations to pinpoint attacks and threats by providing detailed information about every device on the network.