Heading into the cloud?
See how your network can thrive in the complexity of the cloud
Tame Complexity Without Compromising Security
Manage DNS forwarding rules governing hybrid cloud to deliver SaaS-based services fast, while monitoring IP addresses to protect the enterprise against cyber-attacks.
Optimize hybrid-cloud service delivery
Threat Detection & Remediation
Reduce time to detect, investigate, and remediate cyber-attacks
Optimize DNS Resolution
Edge provides multiple DNS query resolution paths while simplifying the segmentation of DNS data.
Improved Network Performance
Reduce network congestion using Edge as both a caching and forwarding server.
Direct Internet Access
Seamless integration of security intelligence, including BlueCat DOH block lists, CrowdStrike, and other third-party threat feeds.
Extend Security Investments
BlueCat DNS Edge supports integration with Cisco Umbrella to leverage policy enforcement and content filtering for external traffic.
Reduce breaches and outbreaks by securing local traffic going directly to the internet or SaaS apps.
Enable faster remediation with real-time analytics and forensics of DNS traffic.
Detect & stop external threats (North-South), and lateral movement (East-West) of infected devices
Compressive Logging & Search
Filter parameters such as time-and-date or event type to explore policy events from your BlueCat Edge instance.
Easily view the list of all policies with description, policy action, and status within the Splunk app.
Place your DNS data into any compliant public or private data lake to conduct advanced analytics.
Edge & Service Points
BlueCat Edge uses Service Points: a lightweight, cloud-managed software that sits at the network edge, enabling faster and more secure DNS resolution.
Capture and log any internal and external queries from any client, branch, or user globally.
- Control Access
Apply policies to control access for every client, block threats, and protect sensitive data and critical systems. Control the DNS resolution path for network optimization.
- DoH Blocking
Retain visibility into DNS queries by blocking lookups to known public DoH resolvers.
- Threat Protection
Enrich DNS data using out-of-the-box integrated threat intelligence from Crowdstrike to stop malware, DNS tunneling, and DGA threats that can exfiltrate data or take down the network.
- Reporting and DNS Insights
DNS Insights page displays a graphical analysis of all queries that have been received through the service points. Learn More
- Namespaces and Forwarders
Create an array of namespaces for complex networks. Learn More
- Agentless Deployment
Provide visibility, protection and control to any DNS-leveraging device, without the need to deploy and manage agents on those devices.
- Zero-Touch Deployment
Deploy unlimited numbers of virtual service points without making changes to your existing DNS infrastructure – at no extra cost.
- Dynamic Scaling
Meet any collection, storage, and processing requirement without interruption and allow for local resiliency.
Log every internal and external DNS query and response from every client type, providing investigative context — with no agent required. Learn More
- Easy Policy Configuration
Allow admins to apply policies to block, redirect, or monitor DNS requests based on clients and resources being accessed. Learn More
- Web Single Sign-On (SSO)
With SAML-based Web SSO in Address Manager, all user login credentials are authenticated by the Identity Provider (IdP). Learn More
Related Services & Products
All Adaptive DNS
Learn about the layers of Adaptive DNS
Learn how to innovate faster and complete repetitive tasks at machine speed by treating infrastructure as code.
Reconcile multiple IP spaces on-prem or in the cloud, while delivering scalable DHCP management with DNS.
Related case studies
Customer story: Scalable global routing for hybrid cloud
For a multinational insurer, a secure, scalable, and interconnected hybrid cloud estate wouldn’t have been possible without input from networking.
BlueCat Migration Case Study: Federal System Integrator
Here’s how BlueCat migrated a spin-off of a Federal System Integrator with zero downtime.
DNS Security Case Study: Federal System Integrator
Here’s how BlueCat brought complete visibility and control over DNS infrastructure to a Federal system integrator.
Core Network Services Case Study: Federal System Integrator
Here’s how BlueCat built a new DDI architecture for a Federal System Integrator following a large merger.
It’s time to get granular.
This page a little too light for you? Head to our technical content library for the hard facts. Data sheets. Product guides. Demos. Specs. Stats.
You name it, we’ve got it.
Critical conversations on critical infrastructure
Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.