BlueCat is solely focused on delivering IP address management, DNS and DHCP solutions, which means that security is a big part of everything we do. More and more, we are speaking with security teams that recognize that IPAM and core services can be a powerful tool for enhancing security operations and emergency response.
The ability to manage, map, audit and track every connected device and user, as well as centrally control business-critical DNS and DHCP services is the core functionality that we provide for customers around the world every day. We’ve always worked closely with network and data center teams to build more agile and elastic networks, but a recent trend we’re seeing is that network and security teams are moving out of their traditional silos and working together to solve network and security challenges because their roles are becoming so intrinsically linked.
As a security operator, you’re asked to assess and mitigate risk daily – and fight the fires that will inevitably occur. But without adequate visibility and a single point of truth to know the “who, what, where and when” of network activity, responding to threats can be onerous and time consuming. Pinpointing the source of threats often starts with trawling logs and trying to reverse-engineer security events. BlueCat’s unique ability to audit and track every user (laptops, tablets, phones, etc.), as well as every device (smart swipe cards, IP-enabled video cameras and door locks, wireless access points etc.), and consolidate this information in a single system of record is a huge benefit to security teams as part of their arsenal in managing and responding to threats and events.
In addition to the advantages of centralized IPAM, BlueCat Threat Protection for DNS Server is a new product that stops malicious activities in DNS before they can reach business-critical data and applications. BlueCat Threat Protection leverages a hosted BlueCat Security Feed to automatically update BlueCat DNS servers with the latest data on known sources of threats including malware, botnets, exploits, viruses and spam.
By linking IPAM and core services with device registration and DNS-based threat protection, BlueCat allows security teams to detect when new devices enter the network, and contain them until they identify and authenticate themselves. This is especially beneficial in environments where there’s a highly transient user base, such as colleges and universities or guest Wi-Fi networks, for example.
BlueCat delivers three unique capabilities for ensuring secure network connections:
- A single authoritative source for information about every user and device connected to your IP network, and a single version of the truth to assist with security investigations
- The ability to detect, register and authenticate new users and devices entering the network, reducing the threats posed by unknown or rogue devices
- The ability to detect “patient zero” and contain and control infections before they become outbreaks
These are just a few of the ways that security operations and response teams can leverage our solutions and expertise in the networking domain to help secure the business and sleep better at night. Ultimately, this additional layer of defense helps everyone in the organization – because no one wants to have to deal with a stressed-out security guy!
Critical conversations on critical infrastructure
Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.
Temporary workaround for SAD DNS
Ahead of Linux’s patch taking effect, BlueCat Labs has a temporary workaround for protecting against the revived Kaminsky DNS cache poisoning attack.
IT pros debate: Should you DIY your DDI?
Five IT pros get real about DIY vs. enterprise DNS solutions during the second Critical Conversation on Critical Infrastructure hosted in Network VIP.
How to Configure DHCP Failover
The DHCP failover protocol provides a method for two DHCP servers to communicate with each other.
How to configure Crossover High Availability (XHA)
In this demo, learn how to configure an XHA pair in BlueCat Integrity.