Blog
Check out the latest in network management, cybersecurity, and DDI.
Palo Alto Networks Advanced Administration Tips
Introduction The Palo Alto Networks next-generation firewalls are a part of a security platform that provides a plethora of configuration options within its…
VitalQIP Migration: One Customer’s Experience
Recently, BlueCat hosted a half day summit where we invited several VitalQIP customers to discuss their migration strategies and goals. In order to make the…
DNS and the Cybersecurity Requirements for Lotteries
Lotteries fit into the same specialized cybersecurity category as banks, casinos and financial institutions. All four deal with tremendous amounts of…
DNS as the Foundation of Shared Services
DNS is not only a key foundation of shared IT services, but also delivers the functionality which makes those shared services thrive. 
The 3 Sides of a Successful VitalQIP Migration
Changes are underway – many customers of VitalQIP are now looking to find a new centrally managed DNS platform to suit their specific business needs.…
What We Learned at DODIIS
Another fantastic DODIIS conference is in the books, and BlueCat learned a ton about how DNS plays into the strategic priorities of the defense and…
Preparing for the Gradual JEDI Revolution at DOD
The final JEDI RFP has been released, and DOD agencies should start to think about how they are going to use cloud resources in their day-to-day…
How DNS stops cryptojacking
DNS may be the most reliable way to detect and eliminate cryptojacking cybercrime at an enterprise level. Learn how BlueCat Edge can help.
On Complexity and Cybersecurity with Mathew Chase
You’re reading the Cybersecurity Spotlight series, where we profile leaders in security and their insights.
Critical Infrastructure is Under Cyber Threat – Can DNS Help?
The U.S. Department of Homeland Security (DHS) announced this week that it is creating a center to help private industry defend critical infrastructure.
Indeni Sponsors F5 Agility 2018
We’re excited to announce that Indeni is sponsoring this year’s F5 Agility conference. From August 13th to the 16th we’ll be trading in our Philz Mint…
Kaspersky Lab Software Gone? Think Again
Kaspersky Lab has been in the news a lot lately, due to a series of leaks alongside troubling revelations ‚Äì and new discoveries just keep on rolling…
The 3 Types of DNS Security
Cybersecurity professionals are starting to move beyond mere DNSSEC towards leveraging DNS data, as part of a layered protection strategy.
How Customers Use Check Point Firewalls Around the Globe
Ever wanted to know how Check Point firewallls are being used around the World? With indeni Insights, you can get a glimpse into that data 24/7. See how.
Hired a Network Engineer? Here Are 3 Things They Will Forget to Do
When you start a new job there are is a lot to learn. When you are a security engineer, the learning curve is especially steep. There are hundreds of…
DNS Edge July Release Enables Hybrid Cloud and More
BlueCat continues its commitment and support of cloud-based infrastructures by extending BlueCat DNS Edge™ visibility, control, and detection capabilities…
Automating Configuration Backup
One of the most important tasks of a network and security administrator is to backup the configuration files of your device periodically. Frequency could be…
Three User Groups, Three Chances to Reflect
As proud DNS geeks, doing our homework is something we’re quite accustomed to. Recently, we hosted three BlueCat User Groups in order to get to know our…
Announcing Exclusive Indeni Crowd Rewards
A favorite saying of ours here at Indeni is “we could all use a little help from our [expert] friends.” While that statement stands strong, Indeni Crowd…
What DOD Can Do Now to Prep for the JEDI Cloud
The JEDI program is a critical strategic investment for DOD – one that has strong leadership support. Now that the contract is awarded, are DOD agencies…
Palo Alto Networks Administration Basics
What is Palo Alto Networks? Palo Alto Networks next-generation firewalls (NGFW) are security devices that possess a range of capabilities to meet current…
DNSSEC vs DNS security: What’s the difference?
DNSSEC validates DNS queries and responses, while DNS security leverages DNS data to better secure your network. Learn how they’re different with BlueCat.
Expert Review of Runbook Templates
Runbook templates are used by operations teams to automate routine maintenance and respond to system alerts and outages. Infrastructure is changing so…
Palo Alto Networks CLI Tips
Welcome to the Palo Alto Networks Palo Alto Networks has created an excellent security ecosystem which includes cloud, perimeter/network edge, and endpoint…
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.