Unwitting users frequently download malicious payloads viruses, and other nasty stuff, often initiated from a DNS connection. Organizations adhering to “least privilege” strategies can apply policies to reduce their attack surface through DNS. Security policies set by DNS Edge at the client level can reduce access to critical assets, blocking access to all but select accepted client IPs or zones. DNS Edge also locks down single-use connected devices like security cameras and point-of-sale machines by restricting them only to the domains and assets they truly require. In both cases, DNS Edge protects the network by preventing unauthorized users or devices from accessing sensitive data.
Check out our videos on DNS security use cases
Critical conversations on critical infrastructure
Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.
SUNBURST/Solorigate Situation Briefing
BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.
React faster at the wire with BlueCat and ExtraHop
With the BlueCat ExtraHop Plugin, automatically create missing PTR records, and detect and react to security threats before they reach DNS servers.
Yes, IT should see what developers do in the cloud
Errors and outages occur when admins lack visibility into DNS and IP allocation in the cloud. With Bluecat, central DDI visibility is within reach.
Why McMaster University didn’t want another CIO
McMaster’s CTO, Gayleen Gray, highlights the importance of her unique role in a world where expectations of the CIO and CTO are colliding.