Showing content for author: Rebekah Taylor
77 posts
77 posts
Examining the Log4j2 vulnerability and our response
Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.
Learning Certification Program Integrity Stream
Self-paced and online, learn how to use all of BlueCat Integrity’s features and functions, from architecting the IP space to advanced troubleshooting.
Learning Certification Program Edge Stream
Self-paced and online, learn how to use BlueCat Edge to gain visibility and control over DNS traffic, optimize DNS resolution paths, and secure networks.
Learning Certification Program Automation Stream
Self-paced and online, learn how to implement and manage BlueCat’s automation solutions, including Gateway, adaptive applications, and plugins and APIs.
How to budget for a DNS, DHCP, and IPAM solution
If you’re considering purchasing a DNS, DHCP, and IPAM solution, it can be difficult to calculate the actual costs and ROI. BlueCat is here to help.
Learning Certification Program DDI Stream
Self-paced and online, get product-agnostic foundational learning on the basics of DNS, DHCP, and IP address management.
Total visibility key to tame DDI hybrid cloud challenges
In an ONUG webinar, BlueCat’s Andrew Wertkin explains how DNS, DHCP, and IPAM visibility is key to automation and taming four hybrid cloud challenges.
How to talk to your boss about buying a DDI solution
You need a DNS, DHCP, and IPAM solution, but now you have to convince your boss of it, too. Learn more from BlueCat about how to broach the conversation.
What to ask a DNS, DHCP, and IPAM solution vendor
You’ve decided your DNS, DHCP, and IP address management are too complex to DIY. Learn more from BlueCat about how to find the right solution partner.
DNS sinkhole: A tool to help thwart cyberattacks
A DNS sinkhole supplies a false domain name in response to a DNS query, preventing connections to malicious or unwanted domains. Learn more with BlueCat.
Four major DNS attack types and how to mitigate them
In a DNS attack, DNS is compromised or used as a vector. Learn about the different attack types and how to prevent, detect, and mitigate them with BlueCat.
Our analysis: Gartner’s DNS security best practices
BlueCat has long known what Gartner now says: Your network needs DNS security. Learn how DNS data logs, threat feeds, and setting policies can help.
We’re using cookies on this website to improve your experience. Cookies help us learn how you interact with our website and remember you when you come back so we can tailor it to your interests.
To learn more about cookies and how we use them, read our cookie notice.
Some cookies are essential, while others help us to improve your experience by giving us insight into how you are using our website. You may adjust your preferences for non-essential cookies below.
To learn more about cookies and how we use them, read our cookie notice. You can also review our privacy policy for more details on the personal data we collect, use, hold, and disclose when you visit our website or use our products and services.
Functional cookies are essential cookies that allow us to remember choices or changes you have made (such as to language settings or your choices regarding the use of cookies). These cookies cannot be turned off since they are essential for the operation of our Websites.
Analytics cookies are non-essential cookies that collect information on how visitors use our Websites. We use this information with your consent to measure the number of visitors to our Websites, determine whether specific content or communication has been viewed, and to help us improve our Websites and communication. These cookies can be turned off.
Personalisation cookies are non-essential cookies that collect information when you fill out a form on this website. We only use this information with your consent to pre-fill other forms on the site. These cookies can be turned off.
Marketing cookies are cookies that are placed by third parties to collect information about your visits and actions on our Websites so that they or we can deliver ads to you later, such as when you are on certain third-party sites or platforms. These cookies may be used by those third parties to build a profile of your interests and show you relevant ads on other websites. These cookies also enable visitors to our Websites to share content on social networks and to enable and evaluate interactions with our communication and social media tools. These cookies can be turned off.