ブログ

ネットワーク管理、サイバーセキュリティ、DDIの最新情報をチェック。
dns-blog-header
 
    Article

    Indeni’s multi-pronged approach to minimize alert noise

    Alert fatigue is real. Just because Indeni on average has 60% more alerts than SNMP tools, it does not transla

    Read more
    Article

    How cloud platforms build the business of experience

    Accenture Managing Director Maya Agaskar discusses how a platform-based approach and the business of experience can aid digital transformation journeys.

    Read more
    Article

    Shift to cloud is shifting IT skill and training needs, too

    CompTIA Chief Technology Evangelist James Stanger discusses why IT professionals need automation skills and how to take control of your own learning.

    Read more
    Article

    Access to the Micetro API

    Use the same simple and secure access control with one DDI overlay solution to ensure proper access even while automating workflows through the API.

    Read more
    Article

    Ultimate Guide to the Micetro REST API

    Create consistent DDI (DNS, DHCP & IPAM) automation workflows using one REST API, no matter where your workloads currently reside or will reside in the…

    Read more
    Article

    For network automation decisions, metrics are key

    Uber engineer Ryan Patterson shares how data drives network automation projects, which must also be scalable, save costs, and meet user needs.

    Read more
    Article

    Indeni’s response to Spring4Shell 

    On March 29th, 2022, a remote code execution vulnerability in Spring Cloud Foundation was published. The vulne

    Read more
    Article

    Multi-tenancy & IP Address Management

    Solving the IP range overlap management problem for Enterprises and MSPs

    Read more
    Article

    Key to DevOps success: avoid lift and shift to cloud

    GM Financial’s DevOps VP Matt McComas offers key lessons on taking a systemic approach, breaking process roadblocks, and measuring automation success.

    Read more
    Article

    The war in Ukraine: A message from CEO Stephen Devito

    BlueCat has discontinued the export of our products and services, as well as support, for all customers owned and operated in Russia or Belarus.

    Read more
    Article

    Level up your DDI know-how with BlueCat training

    Whether you’re a newbie or an expert, BlueCat training offers self-paced online learning, instructor-led training, and expert certification badges.

    Read more
    Article

    Indeni’s response to Dirty Pipe Exploit

    Linux has yet another high-severity vulnerability known as Dirty Pipe that was disclosed on March 7, 2022. Dir

    Read more
    Article

    How the cloud has complicated network observability

    Kentik co-founder and CEO Avi Freedman chats about the merits of network observability and how the cloud has changed the networking landscape.

    Read more
    Article

    8 Must-Have Capabilities For Firewall Monitoring Tools

    The best firewall monitoring tools can quickly detect problems, recommend actionable remediation steps, provid

    Read more
    Article

    Indeni’s response to the PolKit  vulnerability

    Indeni became aware of the vulnerability in PolKit’s kexec component, tracked as CVE-2021-4034 on January 25,

    Read more
    Article

    When architecting cloud, geography still matters

    Former Manulife AVP of Global Network Services Sandi Jones reminds us of the importance of considering geography when architecting cloud environments.

    Read more
    Article

    Clarke: How to mitigate ransomware, protect the cloud

    Renowned cybersecurity expert Richard Clarke delves into protecting your network from ransomware and what cloud adoption means for your security strategy.

    Read more
    Article

    In their own words: Cats reflect on 20 years of BlueCat

    BlueCat turned 20, and to celebrate the milestone, we asked Cats to look back on where we’ve been and share what they love about working here.

    Read more
    Article

    Examining the Log4j2 vulnerability and our response

    Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.

    Read more
    Report

    Firewall Trends And Priorities For 2022

    In the past two years, companies have experienced an unprecedented shift toward remote work as a result of the

    Read more
    Article

    Indeni’s response to the Log4j vulnerability

    At Indeni, as in many organizations, we took immediate actions following the details emerging around CVE-2021-

    Read more
    Article

    Planning IPv6 Address Assignment

    Understanding how IPv6 addresses are assigned to hosts manually and dynamically on your enterprise network.

    Read more
    Article

    How to visualize network state data for stakeholders

    With REST APIs and CLI parsers, present your network state data in a variety of consumable ways for developers and stakeholders. Learn how with BlueCat.

    Read more
    Article

    Fortinet Zero Touch Provisioning – Design, Configuration & Verification

    Zero Touch Provisioning (ZTP) is a very popular technology on the feature list of networking products. ZTP is

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.