What We Learned at DODIIS

Another fantastic DODIIS conference is in the books, and BlueCat learned a ton about how DNS plays into the strategic priorities of the defense and intelligence communities.  After three days in Omaha talking to agencies about their needs, here are some key takeaways:

  • JEDI is still an amorphous concept for most DOD agencies. Everyone seems to be aware that there’s a gigantic public cloud RFP out for bid, but few IT managers really know what that means for their day-to-day work.  There’s a sense that all the planning is happening “up there” with little guidance down to the combatant commands about how they’re going to implement the solution that comes down.  At BlueCat, we know that preparing the groundwork for JEDI will require some significant attention to network infrastructure and how it is managed.  We’ve been talking with many agencies now about the role that DNS can play in a successful cloud migration.
  • DNS security is the next big thing. It’s fun to be trendy, and that’s what DNS seems to be right now.  The underlying infrastructure of DNS is nothing new, of course.  But using all of that valuable DNS data for security purposes is something that DOD and intelligence agencies are just starting to wake up to.  As we’ve explained the critical role that DNS can play in security, we’ve seen a lot of lightbulbs go on.  Even more, DOD and intelligence agencies are starting to come to us – they’ve heard about this DNS security thing, and they want to know more.
  • When you say “we’ve got our DNS locked down” it rarely is. We’ve heard that line from quite a few people during DODIIS – “we’re all set on DNS, our DNS is locked down”.  The question is, locked down where?  When we explain that boundary-level filters and firewalls leave internal DNS traffic open to advanced persistent threats, we get a lot of surprised looks.  Placement of that DNS security is critical to truly securing the network. 
  • Visibility is key. There were quite a few folks at DODIIS who offer network mapping and other ways to figure out what large, complicated networks look like.  Unfortunately, most of these companies stop at the “where”, providing no sense of what all those devices are actually up to.  By collecting DNS data at the client level, BlueCat provides true visibility – not just into what’s on the network, but what all those devices are doing.

That’s a wrap for DODIIS 2018!  We’re already looking forward to the next iteration – see you all in Tampa next year.  (Mic drop.)

BlueCats at the ready to talk DNS!


Published in:


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Simplify NIS2 compliance with DNS management

Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

Read more

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

Deepen your security insight with Infrastructure Assurance 8.3

BlueCat Infrastructure Assurance 8.3, with an enhanced analytics dashboard, including interactive widgets and top 10 alerts, is now available.

Read more

BlueCat acquires Men&Mice and Indeni to add important capabilities in DDI orchestration and network infrastructure resiliency to improve visibility and management of networks.Learn more