Showing content for author: Rebekah Taylor

77 posts

Examining the Log4j2 vulnerability and our response

Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.

Read more

Learning Certification Program Integrity Stream

Self-paced and online, learn how to use all of BlueCat Integrity’s features and functions, from architecting the IP space to advanced troubleshooting.

Read more

Learning Certification Program Edge Stream

Self-paced and online, learn how to use BlueCat Edge to gain visibility and control over DNS traffic, optimize DNS resolution paths, and secure networks.

Read more

Learning Certification Program Automation Stream

Self-paced and online, learn how to implement and manage BlueCat’s automation solutions, including Gateway, adaptive applications, and plugins and APIs.

Read more

How to budget for a DNS, DHCP, and IPAM solution

If you’re considering purchasing a DNS, DHCP, and IPAM solution, it can be difficult to calculate the actual costs and ROI. BlueCat is here to help.

Read more

Learning Certification Program DDI Stream

Self-paced and online, get product-agnostic foundational learning on the basics of DNS, DHCP, and IP address management.

Read more

Total visibility key to tame DDI hybrid cloud challenges

In an ONUG webinar, BlueCat’s Andrew Wertkin explains how DNS, DHCP, and IPAM visibility is key to automation and taming four hybrid cloud challenges.

Read more

How to talk to your boss about buying a DDI solution

You need a DNS, DHCP, and IPAM solution, but now you have to convince your boss of it, too. Learn more from BlueCat about how to broach the conversation.

Read more

What to ask a DNS, DHCP, and IPAM solution vendor

You’ve decided your DNS, DHCP, and IP address management are too complex to DIY. Learn more from BlueCat about how to find the right solution partner.

Read more

DNS sinkhole: A tool to help thwart cyberattacks

A DNS sinkhole supplies a false domain name in response to a DNS query, preventing connections to malicious or unwanted domains. Learn more with BlueCat.

Read more

Four major DNS attack types and how to mitigate them

In a DNS attack, DNS is compromised or used as a vector. Learn about the different attack types and how to prevent, detect, and mitigate them with BlueCat.

Read more

Our analysis: Gartner’s DNS security best practices

BlueCat has long known what Gartner now says: Your network needs DNS security. Learn how DNS data logs, threat feeds, and setting policies can help.

Read more

Attending Cisco Live in San Diego?

See how you can accelerate network transformation using Intelligent NetOps.