When an incident occurs, either a policy is violated or infected machine is reported, incident response teams have to quickly get to the root of the issue, identifying infected clients and potentially-breached services or data sources. This video demonstrates the forensic value of
DNS Edge to provide investigative insight, faster and more focus response and ability to reduce attack surfaces. Watch as we demonstrate a comprehensive, investigation of a breach, identifying the origination point and taking action to further protect the network.
Check out our videos on DNS security use cases
Critical conversations on critical infrastructure
Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.
BlueCat Blueprint for AWS
Instructions provided allow BlueCat Address Manager (BAM) and BlueCat Gateway to discover and import data from an Amazon cloud environment.
SUNBURST/Solorigate Situation Briefing
BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.
React faster at the wire with BlueCat and ExtraHop
With the BlueCat ExtraHop Plugin, automatically create missing PTR records, and detect and react to security threats before they reach DNS servers.
Yes, IT should see what developers do in the cloud
Errors and outages occur when admins lack visibility into DNS and IP allocation in the cloud. With Bluecat, central DDI visibility is within reach.