ブログ
ネットワーク管理、サイバーセキュリティ、DDIの最新情報をチェック。


How the cloud has complicated network observability
Kentik co-founder and CEO Avi Freedman chats about the merits of network observability and how the cloud has changed the networking landscape.

8 Must-Have Capabilities For Firewall Monitoring Tools
The best firewall monitoring tools can quickly detect problems, recommend actionable remediation steps, provid

Indeni’s response to the PolKit vulnerability
Indeni became aware of the vulnerability in PolKit’s kexec component, tracked as CVE-2021-4034 on January 25,

When architecting cloud, geography still matters
Former Manulife AVP of Global Network Services Sandi Jones reminds us of the importance of considering geography when architecting cloud environments.

What AWS Outages Can Teach Us About Network Capacity Planning
Network capacity planning is the ongoing process of determining that a network has the resources it needs to p

Clarke: How to mitigate ransomware, protect the cloud
Renowned cybersecurity expert Richard Clarke delves into protecting your network from ransomware and what cloud adoption means for your security strategy.

In their own words: Cats reflect on 20 years of BlueCat
BlueCat turned 20, and to celebrate the milestone, we asked Cats to look back on where we’ve been and share what they love about working here.

Examining the Log4j2 vulnerability and our response
Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.

Firewall Trends And Priorities For 2022
In the past two years, companies have experienced an unprecedented shift toward remote work as a result of the

Indeni’s response to the Log4j vulnerability
At Indeni, as in many organizations, we took immediate actions following the details emerging around CVE-2021-

Planning IPv6 Address Assignment
Understanding how IPv6 addresses are assigned to hosts manually and dynamically on your enterprise network.

How to visualize network state data for stakeholders
With REST APIs and CLI parsers, present your network state data in a variety of consumable ways for developers and stakeholders. Learn how with BlueCat.

Fortinet Zero Touch Provisioning – Design, Configuration & Verification
Zero Touch Provisioning (ZTP) is a very popular technology on the feature list of networking products. ZTP is

How to budget for a DNS, DHCP, and IPAM solution
If you’re considering purchasing a DNS, DHCP, and IPAM solution, it can be difficult to calculate the actual costs and ROI. BlueCat is here to help.

Total visibility key to tame DDI hybrid cloud challenges
In an ONUG webinar, BlueCat’s Andrew Wertkin explains how DNS, DHCP, and IPAM visibility is key to automation and taming four hybrid cloud challenges.

How to talk to your boss about buying a DDI solution
You need a DNS, DHCP, and IPAM solution, but now you have to convince your boss of it, too. Learn more from BlueCat about how to broach the conversation.

What to ask a DNS, DHCP, and IPAM solution vendor
You’ve decided your DNS, DHCP, and IP address management are too complex to DIY. Learn more from BlueCat about how to find the right solution partner.

Customer Story: Scalable Automation Initiatives in the Healthcare Industry
This healthcare network’s IT team deployed repeatable, supportable automation using BlueCat Gateway to free up time for getting even more done.

A Cloud Guru: 4 ways to converge networks and cloud
Zurich and Kroger’s networking experts explain how to avoid cloud-networking dysfunction in a conversation with A Cloud Guru.

5 IT pros on joining enterprise and cloud provider DNS
Networking pros explore integrating enterprise and cloud DNS during the fifth Critical Conversation on Critical Infrastructure hosted in Network VIP.

DNS sinkhole: A tool to help thwart cyberattacks
A DNS sinkhole supplies a false domain name in response to a DNS query, preventing connections to malicious or unwanted domains. Learn more with BlueCat.

Four major DNS attack types and how to mitigate them
In a DNS attack, DNS is compromised or used as a vector. Learn about the different attack types and how to prevent, detect, and mitigate them with BlueCat.

Our analysis: Gartner’s DNS security best practices
BlueCat has long known what Gartner now says: Your network needs DNS security. Learn how DNS data logs, threat feeds, and setting policies can help.

Network orchestration with Micetro: open-source DHCP
Pairing your open-source DNS with similarly open-source DHCP makes a lot of sense, and Micetro can help you.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.