What We Learned at DODIIS

Another fantastic DODIIS conference is in the books, and BlueCat learned a ton about how DNS plays into the strategic priorities of the defense and…

Another fantastic DODIIS conference is in the books, and BlueCat learned a ton about how DNS plays into the strategic priorities of the defense and intelligence communities.  After three days in Omaha talking to agencies about their needs, here are some key takeaways:

  • JEDI is still an amorphous concept for most DOD agencies. Everyone seems to be aware that there’s a gigantic public cloud RFP out for bid, but few IT managers really know what that means for their day-to-day work.  There’s a sense that all the planning is happening “up there” with little guidance down to the combatant commands about how they’re going to implement the solution that comes down.  At BlueCat, we know that preparing the groundwork for JEDI will require some significant attention to network infrastructure and how it is managed.  We’ve been talking with many agencies now about the role that DNS can play in a successful cloud migration.
  • DNS security is the next big thing. It’s fun to be trendy, and that’s what DNS seems to be right now.  The underlying infrastructure of DNS is nothing new, of course.  But using all of that valuable DNS data for security purposes is something that DOD and intelligence agencies are just starting to wake up to.  As we’ve explained the critical role that DNS can play in security, we’ve seen a lot of lightbulbs go on.  Even more, DOD and intelligence agencies are starting to come to us – they’ve heard about this DNS security thing, and they want to know more.
  • When you say “we’ve got our DNS locked down” it rarely is. We’ve heard that line from quite a few people during DODIIS – “we’re all set on DNS, our DNS is locked down”.  The question is, locked down where?  When we explain that boundary-level filters and firewalls leave internal DNS traffic open to advanced persistent threats, we get a lot of surprised looks.  Placement of that DNS security is critical to truly securing the network. 
  • Visibility is key. There were quite a few folks at DODIIS who offer network mapping and other ways to figure out what large, complicated networks look like.  Unfortunately, most of these companies stop at the “where”, providing no sense of what all those devices are actually up to.  By collecting DNS data at the client level, BlueCat provides true visibility – not just into what’s on the network, but what all those devices are doing.

That’s a wrap for DODIIS 2018!  We’re already looking forward to the next iteration – see you all in Tampa next year.  (Mic drop.)

BlueCats at the ready to talk DNS!

Thinking about moving to the cloud?

See how Adaptive DNS helps organizations embrace a hybrid cloud solution.

Learn more

Read more

For DNS server caching, what is the ideal TTL?

Many factors affect how to set time to live (TTL) for DNS servers. Learn more, plus how BlueCat Edge’s TTL features can bolster your network.

Read more
NSA and CISA: Protective DNS key to network defense

U.S. cyber agencies now point to protective DNS as a defense strategy, confirming what BlueCat already knew: DNS is critical to detecting network threats.

Read more
UK National Cyber Security Strategy

BlueCat Edge alignment to the UK National Cyber Security Strategy.

Read more
SUNBURST/Solorigate Situation Briefing

BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.

Read more