The Threat Hunter’s New Weapon: DNS Data Chief Cybersecurity Officer for Cyxtera, Chris Day talks about the evolution of cybersecurity and rise of the threat […]
World renowned cyber security expert, Dick Clarke, advises on breaking the cycle of breach and blame by evolving the role of the CISO.
Bad actors know that DNS makes a great weapon in producing massive amounts of traffic for successful DDoS attacks. Here’s how.
DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.
The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.
Powerful, software-driven DNS capabilities for Microsoft Azure Cloud
Your “free” DNS is anything but. Work-arounds only get you so far until you realize your IT infrastructure is inadequate. Use the calculator to see your true costs.
Wertkin Whiteboard 3 Personas of DNS in Cyber Security Depending on the (nefarious) intention, naive DNS is pressed into service differently to achieve different results. […]
Wertkin Whiteboard The Power of a Client-Facing DNS Firewall Learn why Enterprise DNS is the foundation for scalable, secure networks and critical to all of […]
Monitoring network activity is not enough. Act on DNS data to set security policy.
Why your overlooked DNS data is key to cyber attack detection, prevention and response.
Webinar Best Practices for Federal DNS Security Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment […]
Andrew Wertkin, BlueCat CTO, talks to Cerner and Dell about the core business drivers for implementing network virtualization and the impact of moving to a policy-driven approach
Webinar Exposing the Enemy Within Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network
Virtual testing environments for design, simulation and testing of real-world topologies and conditions.
Learn how BlueCat Enterprise DNS solutions increase network reliability and security, while enabling growth and change.
Simplify Complex IT Tasks and Workflows for VMware Solutions
A new and innovative approach to enterprise security that utilizes the pervasive nature of your DNS infrastructure.
Best practices network architectures that are centralized and automated, delivering core DNS, DHCP and IPAM services rapidly and without compromise
Webinar DNS: Are Security & Complexity Really Mutually Exclusive? BlueCat’s Director of Cyber Security Solutions discusses the crucial role that DNS data plays in cyber-security […]
The BlueCat vRO Plug-in ensures high speed and reliable provisioning of IP addresses and DNS names for virtual resources.
We take the risk out of your migrations.
Microsoft Active Directory is dependent on DNS to function. This e-book discusses the common challenges with Microsoft DNS when it is integrated with Active Directory.
BlueCat helps W&W Informatik seamlessly transition from previous DDI solution, increasing productivity and eliminating down-time
Cologne Bonn Airport is one of the largest commercial airports in Germany. With approximately 9.45 million passengers per year, it is the seventh largest passenger […]
Connecting your DDI solution with critical infrastructure ensures maximum value of your investment and uptime.
Learn more about BlueCat’s Enterprise DNS solutions and product details.
THE CUSTOMER Founded in Offenburg, Germany in 1927 and originally called “The Grocery Purchasing Cooperative,” Edeka SouthWest is one of the largest food producers, distributors, […]
Alesund kommune Simplifies Network Management and Eliminates DHCP-Related Downtime with BlueCat
BlueCat Provided Support and Expertise, as well as a Resilient, Scalable, and Redundant Network to University College Dublin
The Universität Salzburg Implements a Comprehensive DNS, DHCP and IP Address Management (DDI) Solution with BlueCat
TYROLIT Delivers Resilient DNS and DHCP with BlueCat; Looks Ahead to IPv6
THE CHALLENGE Located in North-Rhine Westphalia (NRW), western Germany, the Hochschule Ostwestfalen-Lippe – University of Applied Sciences (www.hs-owl.de), or HS-OWL, has three campuses in the […]
THE CHALLENGE With nearly 3,000 students in six colleges, 1,500 full and part-time teaching staff and a 750-bed medical center, the Medical University of South […]
THE CHALLENGE ProSiebenSat.1 Produktion is a wholly-owned subsidiary of ProSiebenSat.1 Media AG. With a digital platform that leads the way in Europe, ProSiebenSat.1 Produktion offers […]
A DNS firewall solution that provides an additional layer of defense against malware, botnets and other malicious activities.
Learn about our best-in-class support services – from 24/7 technical support via our Care online portal, email or phone to four-hour on-site hardware repair.
Automatically register and track all devices connecting to your network for mobile security and BYOD.
The Connector for IBM QRadar allows organizations to pinpoint attacks and threats by providing detailed information about every device on the network.
The Connector for HP ArcSight allows organizations to pinpoint attacks and threats by providing detailed information about every device on the network.