Blog

Check out the latest in network management, cybersecurity, and DDI.

 
 
    Guide

    Network Programming Tips for Beginners

    As we already wrote, the results of a survey conducted by our team show that network scripting and automation still aren’t the number one priority in the…

    Read more
    Article

    How to write reusable scripts with Junos OS

    The purpose of this article is not to show you all the things that you can accomplish using Python libraries or how to write scripts in Python or any other…

    Read more
    Article

    BlueCat Rolls Out First DNS Management Platform on AWS GovCloud

    BlueCat is pleased to announce that its Adaptive DNS management platform is now the first AWS certified DNS management product in the AWS GovCloud region.

    Read more
    Article

    How Can Collaboration Between Operations & Engineering Be Enhanced?

    Increasing collaboration between various departments in an organization will help it become more agile. If disparate network administration and security…

    Read more
    Article

    Why You Need to Automate Your Business Operations

    Automation has been a buzzword in business circles for decades now, and with good reason. Organizations are looking to cut costs and increase efficiency in…

    Read more
    Article

    Is an IP address PII? The answer is nuanced

    ‘Is an IP address PII’ is a question with real implications for network admins. Explore how countries approach it and what companies should do about it.

    Read more
    Article

    Handling Breaches at the Bureau: A Conversation with Supervisory Special Agent Elvis Chan

    FBI Supervisory Special Agent Elvis Chan who manages a squad discusses how they investigate national cybersecurity incidents

    Read more
    Article

    IPv6 DDoS attack is a warning to protect your network

    The first IPv6 DDoS attack surfaced in 2018. While IPv6 is more secure than IPv4, if bad actors want to attack your network, they will find a way.

    Read more
    Article

    Why is Automated Provisioning last on the Priority List?

    The importance of provisioning network and security resources is often times overlooked. In the course of moving Data Centers from bare-metal infrastructure…

    Read more
    Article

    Which Network Administration Areas Do Organizations Have Skill Gaps?

    The nature of threats facing networks and data centers has been changing rapidly over the recent past and security infrastructure has been forced to evolve…

    Read more
    Article

    Cybersecurity Spotlight: Jeremy Conway, MAD Security

    At BlueCat, we freely admit that we are not deep experts in cybersecurity, and we are certainly not as knowledgeable as our customers who man the front…

    Read more
    Guide

    How to optimize your workload with scripts

    If you are thinking of expanding your network to support more clients, then you need to think about making your network more efficient and at the same time…

    Read more
    Guide

    How to do Cisco NEXUS Automated provisioning

    In this article we are going to discuss the automated provisioning options for NX-OS, their benefits and provide examples of useful provisioning scripts. We…

    Read more
    Article

    Two of the Most Common Mistakes Developing Scripts

    When you are learning something new there are always periods of trial and error – especially when it comes to scripting. After taking Indeni Knowledge…

    Read more
    Article

    BlueCat DNS Edge Just Got More Powerful

    The latest release of DNS Edge is now live and includes a number of new features like multi-namespace support for better routing, enhanced volumetric…

    Read more
    Article

    March Member of the Month: Sergei Chernooki

    Self-starters are flooding into Indeni Crowd with a vengeance! These motivated individuals not only seek answers to immediate networking issues but also are…

    Read more
    Guide

    Palo Alto Networks Runbook: Replacing a Dead Firewall

    Check out all of our runbooks for Palo Alto here: The criticality involved in maintaining uptime of IT infrastructure has always been on top of priority.…

    Read more
    Article

    How to Become a DevOps Enabler

    Are you striving to be a change agent? If yes, see below for a checklist of resources to help you on your journey of transforming IT to a secure, available…

    Read more
    Article

    How Malicious Hackers are Competing for Notoriety at the 2018 Olympics

    Over the past couple of weeks, all eyes have been on the athletes competing on the world’s biggest stage at the Winter Olympic Games.

    Read more
    Article

    Step into the Customer Portal: Getting the Most Out of BlueCat

    Are you a BlueCat customer looking to get more out of your enterprise software?

    Read more
    Article

    How to automate security operations

    Since you are interested in automating security operations, listen to this Intel Chip Chat with Indeni’s CEO, Yoni Leitersdorf. He discusses trends in…

    Read more
    Article

    APIs and data: The way to your IT organization’s heart

    Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.

    Read more
    Article

    What is Network Automation?

    It is very hard to keep up with technology trends, especially if you are a network or security professional. Networks are complex, and mistakes are an…

    Read more
    Article

    What we learned at Cisco Live Barcelona

    Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.