Should you store DNS data in the cloud or data center?

There are tradeoffs to where you store DNS data. Whether in the data center or cloud, BlueCat’s custom logging feature can help you better manage it.

Mark E. Mikhail

October 30, 2020

As organizations gain access to seemingly limitless amounts of data, they must mitigate the business and financial risks that come with it. There is a bevy of challenges to address related to storage, data protection, privacy controls, and data threats.

Security and risk management leaders are establishing internal security requirements for where data can be stored. Their intent is to reduce critical data loss and risks to privacy.

However, it can be an internal battle to strike a balance between the competing requirements of protection and speed. Friction can result.

In the case of enterprise DNS data, organizations want the flexibility to both:

  1. Create redundancies between the data center and vendor-supplied cloud; and
  2. Exclusively store DNS data in the data center or private cloud.

This post will explore weighing the risks of storing DNS data in the cloud. Furthermore, it will show how BlueCat’s custom logging feature can help network teams better manage DNS data regardless of where it is stored.

Weighing the risks of cloud storage

Organizations must weigh the opportunity cost of exclusively storing DNS data in a local data center. By doing so, they forgo the agility of cloud-based threat protection for core networking solutions.

When deciding where to store DNS data, Gartner suggests basing cloud decisions around five public cloud risk domains:

  • Agility: ability to support unanticipated future needs
  • Compliance: regulatory and other legal requirements
  • Availability: service disruptions and data loss
  • Supplier: changes in the cloud provider business model of viability
  • Security: confidentiality and data control

BlueCat’s custom logging can help with DNS data storage

Regardless of the strategy for data storage, customers can use BlueCat custom logging to give network teams control over where DNS data is stored and how it’s transported. And you can do so while still adhering to enterprise security requirements. That means real flexibility to log your query data wherever you want: in the cloud, a local data lake, or both.

Below is a demo of creating a logging endpoint in BlueCat Edge:

BlueCat custom logging feature

For additional information on how to configure or set up these new features, please refer to the help section in your DNS Edge Cloud Console.

Why do 72% of enterprises struggle to realize the full value of the cloud? This report by EMA breaks it down.


Published in:


An avatar of the author

Mark is a Senior Product Marketing Manager at BlueCat Networks.

Related content

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

Deepen your security insight with Infrastructure Assurance 8.3

BlueCat Infrastructure Assurance 8.3, with an enhanced analytics dashboard, including interactive widgets and top 10 alerts, is now available.

Read more

Security, automation, cloud integration keys to DDI solution success

Only 40% of enterprises believe they are fully successful with their DDI solution. Learn how to find greater success with new research from EMA and BlueCat.

Read more

Our commitment to Micetro customers and product investment

From CEO Stephen Devito, a word on BlueCat’s ongoing commitment to supporting Micetro customers and Micetro’s evolution as a network management tool.

Read more

Seven reasons to rethink firewall monitoring and boost automation 

With BlueCat Infrastructure Assurance, you can better protect your network with automated alerts and suggested remedies for hidden issues in your firewalls.

Read more