Blog
Check out the latest in network management, cybersecurity, and DDI.
Network Programming Tips for Beginners
As we already wrote, the results of a survey conducted by our team show that network scripting and automation still aren’t the number one priority in the…
How to write reusable scripts with Junos OS
The purpose of this article is not to show you all the things that you can accomplish using Python libraries or how to write scripts in Python or any other…
BlueCat Rolls Out First DNS Management Platform on AWS GovCloud
BlueCat is pleased to announce that its Adaptive DNS management platform is now the first AWS certified DNS management product in the AWS GovCloud region.
How Can Collaboration Between Operations & Engineering Be Enhanced?
Increasing collaboration between various departments in an organization will help it become more agile. If disparate network administration and security…
Why You Need to Automate Your Business Operations
Automation has been a buzzword in business circles for decades now, and with good reason. Organizations are looking to cut costs and increase efficiency in…
Is an IP address PII? The answer is nuanced
‘Is an IP address PII’ is a question with real implications for network admins. Explore how countries approach it and what companies should do about it.
Handling Breaches at the Bureau: A Conversation with Supervisory Special Agent Elvis Chan
FBI Supervisory Special Agent Elvis Chan who manages a squad discusses how they investigate national cybersecurity incidents
IPv6 DDoS attack is a warning to protect your network
The first IPv6 DDoS attack surfaced in 2018. While IPv6 is more secure than IPv4, if bad actors want to attack your network, they will find a way.
Why is Automated Provisioning last on the Priority List?
The importance of provisioning network and security resources is often times overlooked. In the course of moving Data Centers from bare-metal infrastructure…
Which Network Administration Areas Do Organizations Have Skill Gaps?
The nature of threats facing networks and data centers has been changing rapidly over the recent past and security infrastructure has been forced to evolve…
Cybersecurity Spotlight: Jeremy Conway, MAD Security
At BlueCat, we freely admit that we are not deep experts in cybersecurity, and we are certainly not as knowledgeable as our customers who man the front…
How to optimize your workload with scripts
If you are thinking of expanding your network to support more clients, then you need to think about making your network more efficient and at the same time…
How to do Cisco NEXUS Automated provisioning
In this article we are going to discuss the automated provisioning options for NX-OS, their benefits and provide examples of useful provisioning scripts. We…
Two of the Most Common Mistakes Developing Scripts
When you are learning something new there are always periods of trial and error – especially when it comes to scripting. After taking Indeni Knowledge…
BlueCat DNS Edge Just Got More Powerful
The latest release of DNS Edge is now live and includes a number of new features like multi-namespace support for better routing, enhanced volumetric…
March Member of the Month: Sergei Chernooki
Self-starters are flooding into Indeni Crowd with a vengeance! These motivated individuals not only seek answers to immediate networking issues but also are…
Palo Alto Networks Runbook: Replacing a Dead Firewall
Check out all of our runbooks for Palo Alto here: The criticality involved in maintaining uptime of IT infrastructure has always been on top of priority.…
How to Become a DevOps Enabler
Are you striving to be a change agent? If yes, see below for a checklist of resources to help you on your journey of transforming IT to a secure, available…
How Malicious Hackers are Competing for Notoriety at the 2018 Olympics
Over the past couple of weeks, all eyes have been on the athletes competing on the world’s biggest stage at the Winter Olympic Games.
Step into the Customer Portal: Getting the Most Out of BlueCat
Are you a BlueCat customer looking to get more out of your enterprise software?
How to automate security operations
Since you are interested in automating security operations, listen to this Intel Chip Chat with Indeni’s CEO, Yoni Leitersdorf. He discusses trends in…
APIs and data: The way to your IT organization’s heart
Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.
What is Network Automation?
It is very hard to keep up with technology trends, especially if you are a network or security professional. Networks are complex, and mistakes are an…
What we learned at Cisco Live Barcelona
Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.