archives
How to configure DHCP failover
In this demo, learn how to configure the DCHP failover protocol for BAM and BDDS, pairing DCHP servers to provide redundancy and load balancing.
How to configure crossover high availability (xHA)
In this demo, learn how to configure a crossover high availability (xHA) pair in BlueCat Integrity for disaster recovery through redundant servers.
Address Manager Role-Based Access Control
In this demo, you will see how BlueCat’s Address Manager permits the admin to control who can change the environment. Admins will ensure that only cretin…
Simply configure BAM DNS and DHCP
Learn how to configure DNS & DHCP (view, zone, record, DNS options, block, network, DHCP options) & UI options (Table View/Tree View).
Setup Metrics & Reports in Address Manager (BAM)
Learn how to configure SNMP on BDDS servers to generate reports like network and block utilization in different formats.
Adding widgets to MyIPAM Dashboard
Learn how to set up BlueCat Address Manager MyIPAM dashboard widgets for BDDS Servers. These widgets help you manage day-to-day tasks.
EMA Report: Network Management Megatrends 2020
EMA surveyed organizations’ DDI solutions and found an inverse relationship between the use of enterprise DDI solutions and company size and IT budget.
Webinar: Cloud Discovery & Visibility
Brian Shorland, BlueCat’s Director of Product Management, walks our webinar guests through a demo of our Cloud Discovery & Visibility feature.
Keeping networks secure during unprecedented WFH
As we work from home, DNS over HTTPS (DOH) use is up by 1,500%. Learn what DNS tells us about network security and how BlueCat and Cisco Umbrella can help.
2020 Networking Trends Report
NetOps teams are increasingly required to drive rapid changes to the network in support of their business’ digital transformation efforts.
DNS-Based Security: A New Model for FISMA Compliance
DNS data is an extraordinary valuable – and surprisingly underutilized – source of information that gets to the heart of FISMA compliance. Get the…
Exposing The Enemy Within
91% of cyberattacks leverage DNS, yet few security experts analyze DNS data. Get this eBook to learn the role that DNS play in cyberattacks and the goal…