React faster at the wire with BlueCat and ExtraHop

With the BlueCat ExtraHop Plugin, automatically create missing PTR records, and detect and react to security threats before they reach DNS servers.

It’s no secret among network admins that the closer you can get to real-time data, the faster you can react. But without the tools to interpret data at the wire and automate with rule-based business logic, network teams can’t intervene before the business feels the impact. This gap in tools can result in poor user experiences or increased risk of security breaches.

Get closer to the wire with the ExtraHop Plugin

Today’s enterprise network teams leverage the BlueCat ExtraHop Plugin to get closer to the wire. With it, they can:

  1. Reduce time to detect threats before they reach DNS servers.
  2. Improve service-level agreements by creating missing records for critical services and users.
  3. React faster with AI to detect threats.

Let’s look at two everyday situations that organizations face today:

The elusive PTR record

One of the most critical services that keeps business moving is email. A missing PTR record can mean a user is unable to access email services. It’s not uncommon for these records to go missing or become stale, especially during migration or integrations with other tools. To fix this, network teams must create a new record in BlueCat Address Manager.

With BlueCat Gateway, ExtraHop can self-heal when a missing record is detected. It triggers automation tasks to create a missing record based on rules defined by admins. By leveraging BlueCat Gateway, ExtraHop can intervene to ensure a good user experience and reduce business revenue risks.

Stopping threats in their tracks

Traditionally, meeting a threat head-on meant detecting and stopping it at the DNS server level. Although BlueCat Edge provides advanced DNS security with powerful threat intelligence tools, organizations can bolster security by applying it at the wire. Today’s advanced network teams can meet cyber threats in real-time as they reach the server. To add this additional security layer, network and security teams use machine AI from ExtraHop to detect threats and apply BlueCat Edge blocking policies before they reach DNS servers.

Network teams need tools to accelerate the detection and remediation of errors and threats. Having an ear to data at the wire provides a more immediate, economic, and stable solution for automation than “log all” approaches. The BlueCat ExtraHop Plugin enhances the visibility and resolution of errors and threats to help maintain resource uptime. Consequently, it helps ensure that users can successfully and safely access critical services and apps.

Visit the BlueCat Adaptive Catalog to learn more.


Published in:


An avatar of the author

Mark is a Senior Product Marketing Manager at BlueCat Networks.

Related content

Banner announcing BlueCat's acquisition of LiveAction, displaying both logos and the phrase "We're about to get bigger."

BlueCat acquires LiveAction to drive network modernization and optimization

BlueCat’s acquisition of LiveAction will allow customers to expand their view beyond DNS and dive deeper into the health of their network.

Read more

Simplify NIS2 compliance with DNS management

Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

Read more

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

BlueCat has acquired LiveAction

It’s official! BlueCat has acquired LiveAction’s network observability and intelligence platform, which helps large enterprises optimize the performance, resiliency, and security of their networks.