Forensic investigation using DNS for faster incident response

When an incident occurs, either a policy is violated or infected machine is reported, incident response teams have to quickly get to the root of the issue,…

When an incident occurs, either a policy is violated or infected machine is reported, incident response teams have to quickly get to the root of the issue, identifying infected clients and potentially-breached services or data sources. This video demonstrates the forensic value of
DNS Edge to provide investigative insight, faster and more focus response and ability to reduce attack surfaces. Watch as we demonstrate a comprehensive, investigation of a breach, identifying the origination point and taking action to further protect the network.

Check out our videos on DNS security use cases

Critical conversations on critical infrastructure

Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.

Join the conversation

Read more

BlueCat Blueprint for AWS

Instructions provided allow BlueCat Address Manager (BAM) and BlueCat Gateway to discover and import data from an Amazon cloud environment.

Read more
SUNBURST/Solorigate Situation Briefing

BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.

Read more
React faster at the wire with BlueCat and ExtraHop

With the BlueCat ExtraHop Plugin, automatically create missing PTR records, and detect and react to security threats before they reach DNS servers.

Read more
Yes, IT should see what developers do in the cloud

Errors and outages occur when admins lack visibility into DNS and IP allocation in the cloud. With Bluecat, central DDI visibility is within reach.

Read more