Blog
Check out the latest in network management, cybersecurity, and DDI.

When to replace BIND DNS
BIND DNS is fine for small enterprises, but as networks grow it gets very complicated and costly to manage. Here’s when to replace BIND DNS.

Security Infrastructure Automation Transforms IT From Expense to Investment
Maintaining forward business momentum hinges on properly managing information and processes. Businesses unable to secure their infrastructure technology see…

Adapt 2.0: BlueCat’s Virtual User Group
What brings together network IT professionals from America, Canada, Germany, and Switzerland? Hint: it’s not a network outage. BlueCat has hosted user…

The community-powered advantage for your organization
Embracing open-source software and taking a community-powered approach to development can result in speed and agility. Learn more with BlueCat.

How to know if Internet of Things will break your network
Yesterday I spent some time with a new customer of ours, a Fortune 500 communications company. They are essentially the network over which a variety of…

Cloud DNS: Taming complexity in hybrid cloud
Public clouds handle their own DDI. But problems arise when applications have to access data or services through the native DDI of multiple environments.

3 Examples of Security Infrastructure Automation in Action
Prioritizing cybersecurity and security operations can feel like an overwhelming obligation for organizations. As threats continue to evolve and become more…

BlueCat Wins HR Awards’ Best Workplace Culture Award
On September 12, 2019, BlueCat proudly accepted the Ultimate Software Award for Best Workplace Culture. This is the second distinction we were awarded this…

Your IP address spreadsheet: A network menace
Are you still using a spreadsheet to manage IP addresses? IPAM is the only way to achieve secure, transparent, and efficient network management.

Cloud DNS: Securing complex hybrid environments
Managing security across hybrid cloud environments is a complex mess when the security team lacks visibility into cloud activity. Here’s how DNS helps.

BlueCat Named One of the Best Workplaces in Technology for Third Year
BlueCat has been named one of the Best Workplaces in Technology for the third year in a row! What makes working here so awesome? Check out these 3 things.

DNS automation: Simplifying the transition between GitLab and production
Moving automation workflows from development and testing labs into the production phase usually involves some administrative hassle.¬† Here’s how we fix…

How to choose the right DNS firewall for your network
Threat feeds, network integration, deployment, and placement are all critical aspects to consider when looking for the right DNS firewall. BlueCat can help.

Gartner Catalyst 2019: Forest Rangers, Cost-Driven Cloud, & Other Takeaways
BlueCat’s round up of significant topics (especially cloud-related) that dominated Gartner’s flagship tech conference.

Cloud DNS: IP address provisioning without compromise
Cloud IP address provisioning can pose systemic risks when done without knowledge of the network team. Here’s how BlueCat eliminates that risk.

Bolster DNS security with BlueCat and Cisco DNS Defense
Working together, BlueCat and Cisco Umbrella extend the breadth and depth of domain name system security across the enterprise.

Secure BlueCat root access credentials with CyberArk
Root access is much sought after as a feature of DDI management solutions. How to protect those credentials? With BlueCat and CyberArk, of course.

Cloud DNS: Addressing the visibility challenge
If your network team can’t see what’s happening in the cloud, you’ve got a serious challenge. Time for a DDI system that works in all environments.

Going for FedRAMP? Make DNSSEC a quick win.
DNSSEC is a key requirement of the FedRAMP and CMMC authorization process, as any 3PAO will tell you. Here’s how to make compliance quick and easy.

For IT Leaders: Four Strategies for a Successful Start in Network Automation
As the pace of business increases, CEOs are looking to IT to leverage technology differently and scale operations. As Gartner’s eBook “Jump-Start…

Looking for an IPAM solution? There’s something you should know.
IPAM tools alone do not solve the underlying issues with decentralized network infrastructure systems such as Microsoft DNS and BIND.

The Future of DNS: Privacy, DoT & DoH
In the first episode of ‘The Future of DNS’ series, BlueCat CTO Andrew Wertkin explores DNS privacy and the role that DoT and DoH can play.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.