When an incident occurs, either a policy is violated or infected machine is reported, incident response teams have to quickly get to the root of the issue, identifying infected clients and potentially-breached services or data sources. This video demonstrates the forensic value of
DNS Edge to provide investigative insight, faster and more focus response and ability to reduce attack surfaces. Watch as we demonstrate a comprehensive, investigation of a breach, identifying the origination point and taking action to further protect the network.
Check out our videos on DNS security use cases
Everything you need to know about shadow IT
When users implement their own solutions behind the IT team’s back, that’s shadow IT. Learn about the risks and how to manage and reduce it with BlueCat.
Five network pros’ manual error horror stories
Members of BlueCat’s Network VIP community detail the errors they committed, the resulting fallout, and what important lessons they learned.
10 best Ansible modules for infrastructure as code
10 (plus a bonus) Ansible automation modules that anyone—from a beginner to a power user—can leverage to transform their network infrastructure to code.
How an agency IT chief innovated amid bureaucracy
Government IT innovation isn’t easy, but Chad Sheridan did it at the USDA by removing silos, earning top-level buy-in, and moving to a product mindset.