Showing content for author: Rebekah Taylor
77 posts
Examining the Log4j2 vulnerability and our response
Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.
Learning Certification Program Integrity Stream
Self-paced and online, learn how to use all of BlueCat Integrity’s features and functions, from architecting the IP space to advanced troubleshooting.
Learning Certification Program Edge Stream
Self-paced and online, learn how to use BlueCat Edge to gain visibility and control over DNS traffic, optimize DNS resolution paths, and secure networks.
Learning Certification Program Automation Stream
Self-paced and online, learn how to implement and manage BlueCat’s automation solutions, including Gateway, adaptive applications, and plugins and APIs.
How to budget for a DNS, DHCP, and IPAM solution
If you’re considering purchasing a DNS, DHCP, and IPAM solution, it can be difficult to calculate the actual costs and ROI. BlueCat is here to help.
Learning Certification Program DDI Stream
Self-paced and online, get product-agnostic foundational learning on the basics of DNS, DHCP, and IP address management.
Total visibility key to tame DDI hybrid cloud challenges
In an ONUG webinar, BlueCat’s Andrew Wertkin explains how DNS, DHCP, and IPAM visibility is key to automation and taming four hybrid cloud challenges.
How to talk to your boss about buying a DDI solution
You need a DNS, DHCP, and IPAM solution, but now you have to convince your boss of it, too. Learn more from BlueCat about how to broach the conversation.
What to ask a DNS, DHCP, and IPAM solution vendor
You’ve decided your DNS, DHCP, and IP address management are too complex to DIY. Learn more from BlueCat about how to find the right solution partner.
DNS sinkhole: A tool to help thwart cyberattacks
A DNS sinkhole supplies a false domain name in response to a DNS query, preventing connections to malicious or unwanted domains. Learn more with BlueCat.
Four major DNS attack types and how to mitigate them
In a DNS attack, DNS is compromised or used as a vector. Learn about the different attack types and how to prevent, detect, and mitigate them with BlueCat.
Our analysis: Gartner’s DNS security best practices
BlueCat has long known what Gartner now says: Your network needs DNS security. Learn how DNS data logs, threat feeds, and setting policies can help.