BlueCat Takes Cisco Live by Storm with Network Security

There, amongst all the bright lights and excitement in Las Vegas, was Cisco Live 2017.

There, amongst all the bright lights and excitement in Las Vegas, was Cisco Live 2017. If you were able to look through the chaos and crowds of 30,000+ attendees at the event, you could see us: BlueCat.

Our team had a fantastic time at Cisco Live, showing thousands of attendees how they, too, could unleash the power of Adaptive DNS. We gave out 30 lbs. of candy, distributed 900 superhero t-shirts (considering we had to order 300 more after just day one, we’d like to think they were a pretty big hit) and had some really fantastic conversations.

Noel Reynolds, our Solution Architect Manager (West) who also gave a fully packed speaker session at Cisco Live, reflected on a particularly great discussion he had at the event with the CISO of one of the largest business software firms in the world.

“He was asking how he could turn on query logging on all of his edge DNS servers so that he could get the data for his security team,” Reynolds said. “What he really wants is a product that does what BlueCat’s Edge does.”

This turned out to be a common theme amongst attendees. Yes, they were interested in how DNS can help deliver better service to the business, streamline operations and give them more control and visibility. But inevitably, the conversations turned to improving their security posture.

What became obvious is that people know that DNS is a goldmine of data indicating who is on their network and what they are doing. But they just don’t have the means to unearth that gold.

Besides security, one of the most common things our team heard from attendees was that many of them were looking into ACI (Application Centric Infrastructure), though few had actually moved to it. Another frequent comment/concern was that everyone wanted to automate and integrate, but were struggling to find the resources or learn the skills themselves.

If you want to have your own Edge on the competition (you like puns? We’ve got puns too), check out how BlueCat can help your enterprise become that much stronger.

Big thanks and congratulations to our Cisco Live team for all their hard work last week!


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

Deepen your security insight with Infrastructure Assurance 8.3

BlueCat Infrastructure Assurance 8.3, with an enhanced analytics dashboard, including interactive widgets and top 10 alerts, is now available.

Read more

Security, automation, cloud integration keys to DDI solution success

Only 40% of enterprises believe they are fully successful with their DDI solution. Learn how to find greater success with new research from EMA and BlueCat.

Read more

Our commitment to Micetro customers and product investment

From CEO Stephen Devito, a word on BlueCat’s ongoing commitment to supporting Micetro customers and Micetro’s evolution as a network management tool.

Read more

Seven reasons to rethink firewall monitoring and boost automation 

With BlueCat Infrastructure Assurance, you can better protect your network with automated alerts and suggested remedies for hidden issues in your firewalls.

Read more