Blog
Check out the latest in network management, cybersecurity, and DDI.


Schedule workflows with Rundeck integration
BlueCat’s Gateway platform for automation now integrates with Rundeck, allowing users to schedule standard DNS automation workflows.

DNS Automation: Internet breakout and SD-WAN domains
All the modular layers of today’s corporate networks – clouds, data centers, branch office connections, and SD-WAN controllers – have their role to…

DNS Automation: Host records and selective deployment
Adding devices to a network is a basic, day-to-day responsibility of any DNS administrator. New computers, IoT devices, servers, and other equipment are…

Three Cloud Migration Myths Putting Organizations at Risk
Many organizations get so caught up in the promise of the cloud that they overlook the challenges associated with migrating to a new environment, and…

Swisslos automates field operations using the BlueCat API
In July, we asked our customers to share their best DNS automation use cases for a chance to win BlueCat’s inaugural Automation Impact Award and pocket a…

DNS Edge November Release: Insights, Fleet Management, Native Threat Protection
DNS data can be difficult to wrangle. Gleaning meaningful insights from the constant stream of data is a daunting task. But there’s a lot of insight for…

From Clashing to Collaborating
BlueCat Networks and IDG World surveyed hundreds of network and cybersecurity professionals. This infographic highlights the interesting truths around their…

Disrupting DDI @ Networking Field Day (In Tweets)
As first-time Networking Field Day presenters, the BlueCat team was thrilled to discuss the future of DDI (hint: it’s cloudy, plus a 100% chance of…

Why DNS is sexy again
DNS has evolved beyond mere infrastructure. Now it’s a business enabler which touches every part of the enterprise and every business initiative.

Why you should pay attention to DNS tunneling
DNS tunneling transmits information through the protocol that usually resolves network addresses. Your DNS data can provide clues to help keep it at bay.

The value of DNS response data for securing your network
Logging a DNS query only tells a fraction of the story. With Intelligent Security, we’ve changed the paradigm by logging DNS responses as well, uncovering…

Secure, cloud-managed network services through DNS
The cloud offers a whole new world of flexibility and functionality. But like every IT system, it comes with some tradeoffs. For all its advantages and…

Growing Our Network (The Other Kind) – Networking Field Day 19
Block your calendars for 10 am PST/1 pm EST on November 7th as our team of experts will dissect the future of DNS (hint: it’s all about the enterprise) at…

Domain Name System (DNS): It works, so why change?
There are a few things I’ve learned in my first year of working on Adaptive DNS solutions. I know what it means to provision networks, the difference…

Five reasons why BlueCat is your best bet for DNS
I’m going to give you five reasons why BlueCat is your best bet for DNS. Without further ado (or a fluffy intro)… 1. Customers have voted, and…

What I learned from SecTOR
BlueCat attended the annual event SecTOR for the first time in early October. This was also my first time attending an event in this dynamic industry. Who…

10 things you can do with BlueCat’s API
We have 10 ideas for DNS automation and integration with other systems using BlueCat’s API. And BlueCat’s Gateway platform makes it easy to build and…

Is Virginia’s DNS ready for a move to the cloud?
As the Commonwealth of Virginia moves to the cloud, learn how centralized and automated DNS is essential to their cloud migration strategy.

BlueCat: Best Workplaces™ for Millennials
BlueCat ranks amongst some of the Best Workplaces for Millennials in Canada 2018. “We hire for culture and we love our community. It’s not our…

DNS Automation: BlueCat Gateway meets Modern DDI Automation Demands
We’re excited to share some major updates to BlueCat Gateway which is now available to all BlueCat customers. BlueCat Gateway is an extensible platform…

Is your cyber “Great Wall” really just a Maginot Line?
Perimeter defenses seem to be the default for every security system. From the Great Wall of China to medieval castles to proposed “border walls”, we…
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.