Welcome to the LiveAssurance product hub
Guides, documentation, use-cases and support to get the most from LiveAssurance for DDI, firewalls and load balancers.
New customer?
Check out the getting started section of the BlueCat LiveAssurance guide.
Use case library
See how LiveAssurance helps to drive performance, security and uptime across:
LiveAssurance is alerting us on issues that were previously slipping through our net with very serious consequencesEnsuring network stability and preventing service disruption for Pelephone Communications
Quick links to useful resources
Want to get more value from Micetro? Use the links below to access product guides, documentation, customer support and the network VIP community.

BlueCat LiveAssurance 101
Get a crash course in how the basic principles of LiveAssurance (like proactive remediation and auto-triage) protect critical networks.

Network VIP community
Connect with over 1000+ networking experts in the world’s leading LiveAssurance community. Troubleshoot, get advice and tell us what you’d like to see in our next release.

Customer support
Log-in to the Care Community to submit cases, view solutions, and troubleshoot issues.
LiveAssurance for networking, security and load balancers
Quick-start guides, video tutorials, case studies and more to accelerate your journey with LiveAssurance.
Prevent network disruption
Learn about how BlueCat LiveAssurance integrates with BlueCat Integrity to identify, troubleshoot, and remediate issues.

Trust, but verify change requests
See how LiveAssurance’s Manifest Automation tool automatically verifies that your services are back up and running after change requests to critical…

Key use cases for BlueCat LiveAssurance for Integrity
See four ways LiveAssurance ensures that your DDI infrastructure is working as intended and that your organization’s DNS services are uninterrupted.

The codified knowledge base
Watch how BlueCat LiveAssurance provides clear remediation steps to get ahead of four examples of critical issues across DDI infrastructure

How LiveAssurance works
See about how automated DDI issue detection and insight into remediation proactively reduces network downtime

Five ways to avert issues with BlueCat LiveAssurance
By flagging and notifying you of hidden issues before they cause damage, you can go from reactive to proactive in your Integrity DDI environment.
Detect and mitigate security risks
See how BlueCat LiveAssurance automatically detects and resolves issues in your security infrastructure.

LiveAssurance for Firewalls
See the key capabilities and system requirements of LiveAssurance for firewalls.

LiveAssurance for… Fortinet Fortigate
Get specific examples from a variety of use-cases for Fortinet FortiGate customers to ensure maximum reliability and automate best practices.

LiveAssurance for… Palo Alto Networks Next-Generation Firewalls
Learn about how to use LiveAssurance to optimize the performance of your Palo Alto NGFW.

LiveAssurance for… Check Point Quantum
See 8 practical ways LiveAssurance integrates with Check Point Quantum firewalls and security gateways.

How LiveAssurance helped Pelephone Communications
Read about how we helped a leading mobile communications company ensure stability and prevent service disruption to their network.

Seven reasons to rethink firewall monitoring and boost automation
With BlueCat LiveAssurance, you can better protect your network with automated alerts and suggested remedies for hidden issues in your firewalls.
Maintain network performance and prevent service degradation
See how BlueCat LiveAssurance proactively alerts your IT teams to load balancers issues and provides remediation steps to resolve problems before impact.

Fewer than half of enterprises are fully successful with network observability tools
Fragmented tools and cloud blind spots are straining NetOps, but a new five-stage maturity model charts the path to excellence.

Black Hat MEA
Join BlueCat and CyberKnight at Black Hat MEA in Riyadh, Saudi Arabia December 2-4 and discover how our DNS security, threat protection, and packet capture…

Cisco Connect Canada
Visit the BlueCat team November 19 for Cisco Connect Canada in Toronto, and learn how to integrate DDI and observability into your Cisco networking and…

Microsoft Ignite
Visit BlueCat at Microsoft Ignite, November 18–21, and learn how our portfolio can orchestrate and extend visibility and performance assurance for…

Cisco Live Melbourne
Meet BlueCat at Cisco Live Melbourne, November 10–12. Connect with our experts and learn how Intelligent NetOps drives smarter, faster network…

Cisco Connect Atlanta
Visit the BlueCat team in Atlanta, Georgia October 30 for Cisco Connect, and learn how to integrate DDI and observability into your Cisco networking…

ONUG AI Networking Summit
Meet BlueCat at the ONUG AI Networking Summit in New York City, October 22–23. See how our Intelligent NetOps portfolio—spanning DNS, DHCP, IPAM, and…

SecTor
Meet with the BlueCat team at SecTor in Toronto, Canada September 30 to learn more about our policy-driven DNS security, threat protection, and packet…

Cisco Connect LatAm
Visítanos en Cisco Connect LatAm Septiembre 29 – Octubre 1 en Cancún para conocer la próxima generación de DNS, DHCP y Gestión de Direcciones IP…

BlueCat appoints Kevin Shone as Chief Financial Officer
Finance veteran to lead BlueCat’s financial strategy through its next phase of growth.

Route traffic intelligently with DNS-based GSLB for BlueCat Edge
Discover how DNS-based GSLB with BlueCat Edge empowers networking teams to control traffic steering, reduce costs, and improve resilience.

Making APIs Work for You (Part 5)
Welcome to Part 5 of Making APIs Work for You. Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security…

BlueCat Networks unveils channel-first strategy with launch of BlueCatalyst Partner Program
The BlueCatalyst Partner Program provides the support, resources, and incentives to solve your customers’ critical network challenges.

Cybersecurity Insiders: CISO Guide to AI-Enabled Firewall Operations
See how BlueCat LiveAssurance helps CISOs move from reactive to proactive with AI-driven observability for firewalls, compliance, and uptime.

Cybersecurity Insiders: CISO Guide to Proactive Threat Defense
Discover how CISOs can turn DNS into a frontline defense. Learn to block threats, enable Zero Trust, and simplify compliance with BlueCat Edge.

Exciting product update: Introducing BlueCat Integrity X
Introducing BlueCat Integrity X, a single platform for complete visibility and control over critical network services.

What is protective DNS (PDNS) and why is PDNS important?
Discover what protective DNS is, how it prevents cyber threats like phishing and malware, and why it’s essential for modern enterprise network security.

BlueCat OmniPeek
BlueCat Omnipeek, a best-in-class suite of network analytics software,…

BlueCat LiveSP
The BlueCat LiveSP platform is a multi-tenant network performance monitoring solution designed for service providers. It offers application-aware…

BlueCat LiveWire
BlueCat LiveWire is a high-performance packet analysis solution that captures and stores detailed packet data for network and application performance and…

BlueCat LiveNX
BlueCat LiveNX is a network and application performance monitoring platform with patented end-to-end visualization, from a global view to individual…

BlueCat Edge Resolver
This solution brief discusses Edge Resolver, which automates DNS mapping and provides reliable, unified resolution for hybrid and multicloud environments.

Helping O’Reilly keep pace with rapid expansion
This case study examines how O’Reilly Auto Parts strengthened its digital infrastructure and firewall security with LiveAssurance.

EMA Report: Readying Enterprise Networks for Artificial Intelligence
EMA examines how enterprises are preparing their networks to support artificial intelligence (AI) investments.


BlueCat Edge offerings
BlueCat Edge is our intelligent DNS resolver and caching layer that provides unprecedented visibility and control over
DNS traffic.

BlueCat Automation Support Subscription
Automation Support Subscription adds significant value to customers using BlueCat Plugins.

BlueCat highlights next generation of Intelligent Network Operations solutions at Cisco Live
Intelligent NetOps makes it easier to change and modernize the network as organizational requirements demand.

Unlock DNS Redundancy with BlueCat Micetro’s xDNS
Discover how BlueCat Micetro’s xDNS Redundancy simplifies hybrid cloud DNS management, providing seamless redundancy, robust protection against DNS…

Three technical reasons to let go of legacy tools and unify your DDI
Learn with BlueCat how security by design, cloud integration, and API programmability offer three technical reasons to adopt Unified DDI.

Combine BlueCat Integrity with LiveAction network observability for total awareness
Shift to proactive, intelligent network operations when you combine a DDI foundation with network performance monitoring solutions.

BlueCat Integrity + LiveAction for Network Intelligence
This solution brief covers combining BlueCat Integrity and LiveAction’s LiveNX and LiveWire for a new era of network intelligence.

Micetro simplifies hybrid cloud DNS and IP address management
Learn how Micetro can help you simplify and streamline DNS and IP address management across hybrid and multicloud environments.

Webinar: Ditch legacy DDI to unify your DNS, DHCP and IPAM
BlueCat’s Solutions Architects explore the potential created by unifying DNS, DHCP and IPAM, including challenges and real-world solutions (enterprise and…

EMA Report: Enterprise strategies for hybrid, multi-cloud networks
The Enterprise Management Associates’ report explores how enterprises design, build, and operate these types of networks, based on a survey of IT…

IDC InfoBrief: The Power of DDI in Network Transformation
This IDC InfoBrief explores the power of DDI (DNS-DHCP-IPAM) in enabling network transformation and essential guidance for transforming your network.

Three operational reasons to drop legacy tools and unify your DDI
Learn with BlueCat how visibility and control, process automation, and infrastructure reliability offer three reasons to adopt Unified DDI.

HD Supply: Bringing clarity, simplicity, and efficiency to the IP space
HD Supply found better control of IP provisioning and more efficient server configurations with Micetro by Men&Mice to support its 600 North American…

Fortune 500 multinational tech company: Upgrading the management of a critical network environment
Micetro by Men&Mice offers automated approval workflow to enable employees to request DNS changes and administrators to approve or deny them, reducing the…

International Monetary Fund: Stability is key
The IMF used Micetro by Men&Mice to implement a robust MS AD-integrated DNS infrastructure while maintaining functionality from their legacy applications.

Farmington Municipal Schools: Keeping up with a class act
Farmington Municipal Schools (FMS), based in Farmington, New Mexico, are a kindergarten-12th grade (K-12) school system with 18 schools within the district.…

HBPO Group: Delivering the need for speed
Micetro by Men&Mice allowed the HBPO Group to run mission critical networks with the optimal output all modern manufacturing facilities are dependent on.

NI: Leveling the learning curve with Micetro
NI was originally founded in Austin, Texas in the 1970s as National Instruments. NI has been working with Men&Mice since 2008 to manage their IP address…

Simplify Microsoft DNS, DHCP, and Active Directory with Micetro
Learn how Micetro makes it easy to administer Microsoft DNS, DHCP, and Active Directory sites and subnets and manage your DDI environment.

The Cost of Free
This eBook outlines the journey from the functional to the inevitable, when you realize your “free” Microsoft DNS is anything but.

Get insight into your DDI environment with Live DDI Analytics
Enroll in our technology preview today to use the Live DDI Analytics tool to get real-time reports and analysis for your DDI environment.

Manage AWS and Azure DNS with BlueCat Micetro
BlueCat Micetro transforms the way IT teams handle critical DNS and DHCP services by centralizing control, enhancing visibility, and streamlining…

Three business-focused reasons to embrace Unified DDI
Discover with BlueCat how cost optimization, risk reduction, and accelerated digital transformation offer three reasons to adopt Unified DDI.

Nine reasons to unify your DDI
This white paper explores strategic advantages for modernizing your DNS, DHCP, and IP address management.

BlueCat appoints Peter Brennan as Chief Revenue Officer
Peter Brennan has joined the company as its Chief Revenue Officer. Brennan is responsible for driving revenue growth and providing leadership for field…

Enhance RBAC for Microsoft DNS and DHCP servers with Micetro
Learn how easy it is to implement enhanced role-based access controls for Microsoft DNS and DHCP server environments with Micetro.

Simplify Microsoft DNS, DHCP, and Active Directory Sites and Subnets
BlueCat Micetro transforms the way IT teams handle critical DNS and DHCP services by centralizing control, enhancing visibility, and streamlining…


Role-Based Access Control in BlueCat Micetro
BlueCat Micetro simplifies managing access to Microsoft DNS and DHCP environments with robust Role-Based Access Control.

Webinar: Solving the cloud puzzle with self-service DNS and DHCP
BlueCat’s Chief Strategy Officer and Chief Product and Technology Officer share strategies for leveraging a cloud-connected network while still providing…

LiveAssurance for Firewalls
See the key capabilities and system requirements of LiveAssurance for firewalls.

LiveAssurance for… Fortinet Fortigate
Get specific examples from a variety of use-cases for Fortinet FortiGate customers to ensure maximum reliability and automate best practices.

LiveAssurance for… Palo Alto Networks Next-Generation Firewalls
Learn about how to use LiveAssurance to optimize the performance of your Palo Alto NGFW.

LiveAssurance for… Check Point Quantum
See 8 practical ways LiveAssurance integrates with Check Point Quantum firewalls and security gateways.

How LiveAssurance helped Pelephone Communications
Read about how we helped a leading mobile communications company ensure stability and prevent service disruption to their network.

Trust, but verify change requests
See how LiveAssurance’s Manifest Automation tool automatically verifies that your services are back up and running after change requests to critical…

Key use cases for BlueCat LiveAssurance for Integrity
See four ways LiveAssurance ensures that your DDI infrastructure is working as intended and that your organization’s DNS services are uninterrupted.

The codified knowledge base
Watch how BlueCat LiveAssurance provides clear remediation steps to get ahead of four examples of critical issues across DDI infrastructure

How LiveAssurance works
See about how automated DDI issue detection and insight into remediation proactively reduces network downtime

Micetro 11.1 boosts DHCP management for Cisco Meraki SD-WAN
Learn how BlueCat Micetro 11.1 can help you overcome the limitations of Cisco Meraki SD-WAN devices to manage your distributed DHCP architecture.

BlueCat GEN5 appliances
BlueCat’s rack-optimized GEN5 appliances support the highest performance demands and throughput for all BlueCat software.

BlueCat acquires LiveAction to drive network modernization and optimization
BlueCat’s acquisition of LiveAction will allow customers to expand their view beyond DNS and dive deeper into the health of their network.

Newest Micetro release unifies network infrastructure management with support for Cisco Meraki
Organizations can optimize their SD-WAN environments by centralizing DHCP for cloud-based applications and remote locations.

BlueCat enters agreement to acquire LiveAction to broaden its portfolio of network infrastructure management solutions
Expanded solutions to include LiveAction’s industry-leading network observability and intelligence platform, purpose built for enterprise-grade network…

Simplify NIS2 compliance with DNS management
Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

BlueCat LiveAssurance for Check Point Quantum
This solution brief presents how BlueCat LiveAssurance automates detection of operational device issues, which are often hidden, in your security…

Ensuring network stability and prevent service disruption
BlueCat LiveAssurance has helped Pelephone Communications avert numerous service outages by providing proactive alerts and remediation steps.

Tolly Report: Micetro Overlay DDI Orchestration
Men&Mice commissioned Tolly to evaluate its Micetro DNS, DHCP, and…

BlueCat LiveAssurance for F5 BIG-IP Local Traffic Manager
This solution brief presents how BlueCat LiveAssurance automates detection of operational device issues, which are often hidden, in your load balancers.

The Men&Mice DNS/DHCP appliance
Men&Mice is pleased to announce the release of the Men&Mice DNS/DHCP appliance. This new purpose-built appliance solution is specifically designed…

Men&Mice announces integration with runIP to transform network management
We announced today, at Men&Mice, that Micetro 10.1, will now integrate with the N3K runIP Platform. N3K is a leading specialist for DDI solutions and…

Spreading The Word For Sustainable Networking
At Men&Mice, the concept of Sustainability is fully ingrained into our philosophy as we continuously develop our state-of-the-art DDI management…

BlueCat Server Update Services – Feature of the Month
BSUS provides features such as scheduling updates, staging them before the upgrade, and applying patches to a group of servers. Check out the video for all…

Filtering DDI data using the RESTful v2 API BlueCat Integrity 9.5
Conduct advanced search via API by filtering DDI data or resource state based on time, DHCP scope utilization, and network names and ranges.

Bulk import DDI data with BlueCat Integrity 9.5
Users can quickly import IPv4 blocks, networks, ranges, addresses, and Mac addresses via CSV or JSON formats using the Import Entities via API.

RESTful API Swagger Docs BlueCat Integrity 9.5
Learn how you can use BlueCat’s interactive documentation of standard methods, based on the open API 3.0 schema, to test out API calls in the browser…


Health Monitoring – Feature of the Month
BlueCat Health Monitoring is a tool that provides greater visibility into the performance of your BDDS servers. Check out the video to learn more.

BlueCat Edge Resolver Demo
BlueCat Cloud Resolver is the first cloud-native DNS resolver that provides immediate resolution to and across any private virtual network.

Integrity 9.4: User Defined Links
User Defined Links are now more accessible by adding GUI capabilities for the creation of the links.

BlueCat Cloud Resolver – Feature of the Month
See how Cloud Resolver allows administrators to reduce complexity and easily manage their Cloud DNS zones.

Centralize DDI data from multicloud environments using Cloud Discovery and Visibility
Overview of BlueCat Cloud Discovery & Visibility.

Building a Micetro API collection
Build a Micetro API colleciton in Postman

Enhancing Microsoft DNS with Micetro
Learn how you can enhance your Microsoft DNS with Micetro

AD Sites and IPAM with Micetro
Learn how to use Microsoft Active Directory Sites with Micetro

Enhance Microsoft DNS, DHCP and IPAM with Micetro
Enhance your current Microsoft or multi-vendor DNS, DHCP, and IPAM (DDI) with Micetro.

Ease Microsoft troubleshooting with Micetro
Learn how you can troubleshoot your Microsoft DNS and DHCP environment more easily with the Micetro free trial

Postman and GET with Micetro API
Use the Micetro API to read (GET) information about your DNS, DHCP, and IPAM environment

Getting DNS records with Swagger
Use the Micetro API and Swagger to read (GET) information about DNS in your environment.

Postman authentication for Micetro
Understand how Postman authentication works with Micetro

Installing Micetro on Linux
How to deploy the Micetro Free Trial on Linux. This will help users install the free trial of Micetro to orchestrate their DDI (DNS, DHCP, and IPAM)…

Adding Windows DHCP
How to add DHCP information to your Micetro free trial

Connecting to AWS Route 53
How to connect to AWS Route 53 DNS from Micetro free trial.

Creating objects using Micetro API
Use the Micetro API and Swagger to create DNS, DHCP, and IPAM objects in your DDI environment automatically.

Building network templates
See how to make consistent networks using Micetro automation

Multicloud Asset Management
Understand more than just if your IPs are available, know what they’re being used for with Micetro, a DNS, DHCP, and IP (DDI) orchestration solution.

Enhancing Microsoft with Micetro automation
See how using Micetro’s API makes it easier to automate your Microsoft DNS, DHCP, and iP environments

Adding IPAM information – Micetro Deployment Tutorial
How to add IP information to your Micetro free trial.

GitHub for Beginners with Micetro
Use the Micetro documentation to get started understanding how to use GitHub

Enhancing Microsoft Access Management
See how Micetro’s granular RBAC gives you better access management in your Microsoft environment

Building reports with Micetro automation
See how you can build reports in real-time using Micetro APIs.

Adding Windows DNS
How to add DNS information to your Micetro free trial

Installing Micetro on Windows
How to deploy the Micetro Free Trial on Windows. This will help users install the free trial of Micetro to orchestrate their DDI (DNS, DHCP, and IPAM)…

Deploying Micetro from the Azure Marketplace
How to deploy the Micetro Free Trial from Azure Marketplace automatically. This will help users install the free trial of Micetro to orchestrate their DDI…

Connecting to Azure DNS
How to connect to Azure DNS from Micetro free trial.


BlueCat Cloud Discovery & Visibility
BlueCat Cloud Discovery & Visibility simplifies management of core DDI services regardless of your environment.…


Micetro Free Trial Getting Started Guide
Understand the value of the Micetro Free Trial for DNS, DHCP, and IPAM and learn where to get started.


Micetro Free Trial Deployment
How to deploy the Micetro Free Trial on any system.

Micetro Free Trial Best Practices
Get started with DDI (DNS, DHCP, and IPAM) in your environment today without ripping and replacing your current Microsoft or ISC DNS and DHCP services.

Check IP Count and Quality
Use a centralized DNS, DHCP, and IPAM (DDI) solution to make sure you’ve got a rock solid source of truth for your IPs and your entire network.

CyberEdge 2024 Cyberthreat Defense Report infographic
From ransomware to skills gaps, get top IT security trends by the numbers from CyberEdge Group’s 2024 Cyberthreat Defense Report infographic.

CyberEdge: 2024 Cyberthreat Defense Report
From current postures to AI, get insight into the minds of IT security professionals from CyberEdge Group’s 2024 Cyberthreat Defense Report.

PeerSpot Report: BlueCat Integrity- Choosing the Right DDI Solution
This paper examines one DDI solution in particular, BlueCat Integrity, and describes the five reasons customers selected it over competitors.

Strengthening cybersecurity and compliance
Integrating CIS Controls and DORA with BlueCat’s solutions offers a comprehensive approach to managing cybersecurity risks and regulatory compliance.

EMA Report: Network Management Megatrends 2024
This guide from EMA outlines critical factors to enhance network operations, addressing skills gaps, hybrid and multi-cloud challenges, and AI-driven…

Detect anomalies and CVE risks with LiveAssurance 8.4
The LiveAssurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

BlueCat partners with Pacific Tech to expand distribution in APAC
The new distribution agreement between BlueCat and Pacific Tech will help businesses and organizations in Southeast Asia accelerate network modernization.

BlueCat LiveAssurance for Fortinet Fortigate
LiveAssurance proactively alerts Fortinet FortiGate users to issues and provides remediation steps to resolve them before they cause harm.

BlueCat announces new capabilities to help organizations modernize their network infrastructure
Enhanced products and expanded portfolio offerings provide flexibility and control to manage, secure, and build complex, multicloud networks.

Get fast, resilient, and flexible DDI management with Integrity 9.6
With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

BlueCat appoints Scott Fulton as Chief Product and Technology Officer
An accomplished executive in software product management and engineering leadership, he will lead the next phase of product development and growth.

BlueCat LiveAssurance for Integrity
LiveAssurance provides deep visibility into BlueCat Integrity enterprise environments to flag early warning signs of issues.

BlueCat Micetro Multicloud DNS and IPAM with Azure
For Azure DNS and Virtual Networks, use Micetro to create a unified and consolidated system of record encompassing all your DNS footprints.

BlueCat Micetro Multicloud DNS and IPAM with AWS
For AWS Route 53 and Virtual Private Cloud, use Micetro to create and unified and consolidated system of record encompassing all your DNS footprints.

BlueCat Micetro for Microsoft environments
With BlueCat Micetro, keep using your existing Microsoft tools while centralizing visibility and control of your DNS, DHCP, and IP address management.

BlueCat Micetro: A preferred Microsoft partner
Recognized as Microsoft’s preferred DDI partner, Micetro stands out for its enhanced capabilities, user-friendly interface, and granular access.

BlueCat Micetro xDNS redundancy
Micetro’s xDNS redundancy feature replicates and synchronizes critical DNS primary zones across multiple DNS service provider platforms.

BlueCat LiveAssurance for Palo Alto Next-Generation Firewalls
LiveAssurance proactively alerts Palo Alto Networks Next-Generation Firewall users to issues and provides remediation steps to resolve them.

Deepen your security insight with LiveAssurance 8.3
BlueCat LiveAssurance 8.3, with an enhanced analytics dashboard, including interactive widgets and top 10 alerts, is now available.

BlueCat Quick Service
BlueCat Quick Service provides a self-service UI that adapts to user roles, reducing manual errors and boosting service levels for host and subnet changes.

BlueCat Micetro
BlueCat Micetro is an easy and intuitive DDI orchestration solution, centralizing your DNS and DHCP services using a software overlay.

IDC: The Power of Centralized DDI for Small and Medium-Sized Businesses: Advancing DNS, DHCP, and IPAM to accelerate Network Transformation
This white paper explores key trends among SMBs in IT investments and network management, with a specific focus on the opportunity for more integrated…

Security, automation, cloud integration keys to DDI solution success
Only 40% of enterprises believe they are fully successful with their DDI solution. Learn how to find greater success with new research from EMA and BlueCat.

BlueCat MSP Partner Program
If you’re an MSP, unlock potential and expand your network-as-a-service offerings in on-premises, hybrid, and multicloud environments.

Our commitment to Micetro customers and product investment
From CEO Stephen Devito, a word on BlueCat’s ongoing commitment to supporting Micetro customers and Micetro’s evolution as a network management tool.

Seven reasons to rethink firewall monitoring and boost automation
With BlueCat LiveAssurance, you can better protect your network with automated alerts and suggested remedies for hidden issues in your firewalls.

BlueCat LiveAssurance
BlueCat LiveAssurance provides automated DDI issue detection and insight into remediation to help proactively reduce network downtime.

EMA Report: DDI Directions: Strategies for the Multi-Cloud Era
Access the EMA research and discover how to improve the design and management of DDI services in multi-cloud environments.

Five ways to avert issues with BlueCat LiveAssurance
By flagging and notifying you of hidden issues before they cause damage, you can go from reactive to proactive in your Integrity DDI environment.

Solve DNS challenges in the cloud with BlueCat Cloud Resolver
Learn how you can use BlueCat Cloud Resolver to tame cloud DNS by simplifying zone discovery and conditional forwarding rule management.

BlueCat recognized as a leader and outperformer in 2023 GigaOm Radar Report for DDI
BlueCat has been recognized for the second straight year as a leader and outperformer in the 2023 GigaOm Radar Report for DDI.

Enhancing DDI automation and security with Men&Mice and Indeni
Following its recent acquisitions, BlueCat now offers DDI orchestration with Micetro and proactive monitoring of DDI devices with LiveAssurance.

EMA Report: DDI Maturity Drives Multicloud Success
EMA examines how DDI (DNS, DHCP, and IP address management) maturity is transforming enterprise networks in EMEA, LATAM, and APAC.

BlueCat partners with Grupo Dice to transform DDI management in Mexico and Latin America
New regional investments in sales and technical expertise will help customers tame network complexity

Indeni 8.2 Analytics Dashboard & Network Security Automation
New Platform Capabilities 1 – Analytics Dashboard Continuing our Analytics Dashboard journey, we’re excited to share a few more enhancements to the…

BlueCat Cloud DNS Service
BlueCat Cloud DNS Service is a cloud-hosted external authoritative DNS service integrated seamlessly with BlueCat Address Manager.

EMA Brief: BlueCat boosts DDI industry leadership with acquisitions
In this impact brief, EMA explores how the acquisitions of Men&Mice and Indeni strengthen BlueCat’s position as a leader in the DDI market.

Enhance DNS control with BlueCat Edge SPv4
With a multi-service architecture, BlueCat Edge SPv4 now supports simultaneous add-on modules for security, networking, cloud, and branch offices.

Ansible and Micetro DDI
Want to learn how you can start automating and orchestrating DNS, DHCP, and IPAM with Ansible? Micetro has an up-to-date Ansible collection and plug-in…

Cisco Live 2023: Introducing Zero Trust DNS
Unveiled at Cisco Live, Zero Trust DNS from BlueCat offers continuous verification, least-privilege access, and context and response to secure networks.

Finding Your True IP Count
Many IPAM solutions will charge by IP address, but what they won’t do is help you understand whether you’re actually using all your IPs. We…

Hybrid Mesh Firewall Management with Indeni
With the emergence of cloud and firewall as a service (FWaaS), network firewalls are evolving into hybrid mesh firewalls. In this magazine article (page…

BlueCat is now a Cisco SolutionsPlus partner
BlueCat’s alliance with Cisco delivers leading DDI solutions to Cisco customers as part of Cisco’s integrated networking and security environments.

BlueCat acquires network infrastructure monitoring and automation platform Indeni
With the acquisition, BlueCat customers will gain an enhanced ability to maintain network resiliency and proactively assess network health.

Webinar: Check Point Network Security – A Customer Perspective
I had the pleasure to speak with Peter Lyndley, Senior Security Engineer at Softcat, in a recent webinar. Softcat has been an Indeni customer for many…

No. 1 driver of DDI investment: automation
EMA research found that automation is the top reason small and medium international enterprises invest in DDI solutions. What drives your enterprise?

BlueCat acquires Men&Mice to boost its industry-leading DDI platform
With the acquisition, BlueCat’s enhanced portfolio will offer organizations of all sizes the tools to simplify and improve their network.

BlueCat hires Francisco Velasquez as Chief Financial Officer (CFO)
BlueCat will leverage his experience scaling businesses organically and through mergers and acquisitions as it embarks on its next phase of growth.

Indeni 8.1 Analytics Dashboard & Network Security Automation
New Platform Capabilities 1 – Analytics Dashboard We’ve been performing return on investment analysis using data from alert exports for business…

Indeni joins F5 Technology Alliance Program to deliver maximum availability
F5, a multi-cloud application services and security company, and Indeni have been leveraging each other’s strengths for many years to automate F5 BIG-IP…

Taming the storm of cloud complexity
Our illuminating infographic shows how an integrated DDI platform can tame network complexity, including poor visibility, zone conflicts, and outages.

BlueCat accelerates IT network automation and orchestration with Integrity 9.5
Latest software version establishes a new API benchmark for DNS, DHCP, and IPAM (DDI) management to help network teams automate manual DDI tasks.

Proactive and Preventative Actions for your DDI Environment
Vendors are always talking about how to stop being reactive, as if it had never occurred to an engineer that working proactively might be better. The truth…

BlueCat Edge for networking
Edge adds a much-needed layer of visibility, control, and detection for corporate DNS. Edge gives network and IT teams unprecedented access to DNS…

Gain More Insight with Indeni’s Network Security Automation – Rule Category
In this blog, we’ll do a deep dive into Rule Category. Although the use of Rule Category is somewhat limited today, we’ve planned to expand its use to…

Asset Management
What are two things that are assigned to every single device on your network? The answer is an IP address (at least one) and a DNS name. Why is this…

Manifest V3 doubts? Try a DNS-based solution
Learn how Google Manifest V3 changes may impact anti-tracking and ad blockers and how a DNS solution might be a better option for your enterprise network.

New Check Point Firewall Features, Highlights For 2023
After two years of shelter in place throughout much of 2020 and 2021 we welcomed back the in-person events in 2022, albeit, with some new safety measures.…

Indeni 8.0 Zscaler App Connector & Network Security Automation
New Devices Support 1 – Zscaler App Connector With a hybrid office environment going forward, you’re probably migrating from legacy VPN…

Inside our Serbia customer care center launch
Learn why Serbia is an ideal fit for expansion and go behind the scenes of the opening of our new Customer Care and Integration Development Center.

Migrating to BlueCat Adaptive DNS
In this whitepaper, explore our proven methodology and the processes we use to ensure successful migrations to BlueCat’s Adaptive DNS solution.

BlueCat announces international expansion with launch of Customer Care Center in Serbia
The Customer Care and Integration Development Center will help BlueCat support growing international demand for its DDI management platform.

5 Tips for Migrating to Kea
Wondering what to do now that ISC DHCP has reached End of Life? Read these tips for migrating to Kea DHCP.

Our process for a successful BlueCat migration
Explore BlueCat’s proven methodology and the specific processes we use to ensure successful migrations to our DNS, DHCP and IPAM solutions.

ISC DHCP is EOL
What do you do when your services reach EOL? Overlay services can make migration much easier.

Gartner 2022 Hype Cycle for Workload and Network Security
Gartner® recognizes Indeni as a sample vendor in the 2022 Hype Cycle™ for Workload and Network Security report. We are excited to be included as 1 of 8…

Four steps to succeed with your DDI solution
New EMA research on implementing DDI solutions highlights four ways to ensure success, starting with dumping DIY approaches. Are you ready to begin?

Webinar Series: Cloud Resolver
Learn how BlueCat Cloud Resolver tames cloud DNS by simplifying zone discovery and conditional forwarding rule management to improve service delivery.

BlueCat Learning Certification Program
A compendium of BlueCat’s Learning Certification Program offerings, including learning streams for Integrity, Edge, automation, and DDI.

Cloud, automation, security drive DDI pursuit
EMA research found that cloud, automation, and security are the three primary drivers behind investing time or money in DDI technology. What drives you?

DDI maturity drives multi-cloud automation and security
This infographic examines the evolving states of DDI maturity and how DDI maturity drives multicloud, automation, and security.

7 Reasons for Palo Alto Networks NGFW Automation
In this blog, we’ll look at seven reasons why you want to move beyond monitoring and consider automation to gain efficiency for your Palo Alto Networks…

Indeni’s response to the critical OpenSSL vulnerability
OpenSSL is one of the most widely used open-source libraries worldwide. On October 26th, the OpenSSL Project team announced a new critical vulnerability in…

Network Automation for Check Point and Palo Alto Networks NGFW with Indeni 7.12
Network Automation Elements New Auto-Detect Elements for Check Point Firewalls SNMP community string does not match requirement Management servers…

Two-thirds of enterprises employ full-stack DDI
EMA research found three distinct stages of DDI maturity, with 65% of enterprises realizing the value of a full-stack DDI solution. Is yours one of them?

EMA Report: DDI Maturity Drives Multi-Cloud Automation and Security
EMA examines how DDI (DNS, DHCP, and IP address management) maturity is transforming enterprise networks in North America and the United Kingdom.

Investment in DDI management platform driving benefits for two out of three enterprises: EMA survey
DDI maturity enables cloud migration, enhances security and resiliency, and accelerates network automation.

Comparing Check Point Skyline with Indeni
What is Check Point Skyline? Check Point Skyline is a new real-time monitoring solution for Check Point devices. It uses OpenTelemetry to report telemetry…


BlueCat recognized as a leader and outperformer in GigaOm Radar Report for DDI
Integrity portfolio identified as flexible, scalable, automated, and supported by safe, secure migrations.

Solarwinds NPM & Indeni: Firewall Monitoring
Many Indeni customers are current SolarWinds customers or previously used SolarWinds Network Performance Monitor (NPM) for firewall monitoring. As a result…

F5 Load Traffic Manager – 10 Best Practices for Application Monitoring
The F5 Networks BIG-IP platform allows you to manage network traffic so applications are always fast, available, and secure. In a large environment, it is…

5 Ways to Ensure High Availability of F5 Network Environments
Everyone has an IT Horror Story of taking parts of, or the entire network in many cases, down by accident. When an issue like this occurs it is important to…

Keep system issues at bay with health checks
Two levels of BlueCat support offer health checks to analyze customers’ system data for potential problems and fix them before they take networks down.

Top 5 Automation for FortiGate Firewalls
Authors: Vasilis Bouloukos & Ulrica de Fort-Menares Keep your FortiGate firewalls running smoothly and free from zero day attacks, here’s our list of…

Indeni 7.11 Uptime Report, Suppress Alerts, Grafana Dashboards & Automation
New Platform Capabilities 1 – Suppress Issues You may occasionally need to place your security device into maintenance mode. During maintenance,…

Audax Private Equity announces strategic growth investment in BlueCat Networks
This agreement to invest in BlueCat is a significant milestone for the company and for BlueCat’s customers, employees, and stakeholders.

Security, IT tools, and right policies key for hybrid work
Cisco Live 2022 emphasized the hybrid work future, but security, the right tools and skills for network teams, and policy alignment to technology are key.

BlueCat announces all new business will flow through its worldwide channel program
Channel-first strategy includes expanded benefits and investments and will drive more partner business from customers migrating to hybrid or multi-cloud.

Indeni’s multi-pronged approach to minimize alert noise
Alert fatigue is real. Just because Indeni on average has 60% more alerts than SNMP tools, it does not translate to more noise. Indeni keeps noise levels…

How cloud platforms build the business of experience
Accenture Managing Director Maya Agaskar discusses how a platform-based approach and the business of experience can aid digital transformation journeys.

Shift to cloud is shifting IT skill and training needs, too
CompTIA Chief Technology Evangelist James Stanger discusses why IT professionals need automation skills and how to take control of your own learning.

Access to the Micetro API
Use the same simple and secure access control with one DDI overlay solution to ensure proper access even while automating workflows through the API.

BlueCat names David Duncan as Chief Marketing Officer (CMO)
He will support the company’s growth and overall go-to-market strategy.

Top Network Automation for Palo Alto Networks NGFW
The support for Palo Alto Networks Next Generation Firewalls (NGFW) is one of our flagship products. The coverage spans a wide variety of use cases, all…

BlueCat ranked 17th on the 2022 list of Best Workplaces™ in Canada
BlueCat Networks moves up eight positions and marks its sixth straight year of recognition by Great Place to Work®.

Ultimate Guide to the Micetro REST API
Create consistent DDI (DNS, DHCP & IPAM) automation workflows using one REST API, no matter where your workloads currently reside or will reside in the…

Building Powerful Grafana Dashboards
By using Indeni, security infrastructure teams have access to many metrics. Between Check Point and Palo Alto Networks firewalls, Indeni collects over 500…

For network automation decisions, metrics are key
Uber engineer Ryan Patterson shares how data drives network automation projects, which must also be scalable, save costs, and meet user needs.

Indeni vs. Palo Alto Networks AIOps
Palo Alto Networks recently introduced AIOps for NGFW, the domain-centric AIOps solution. AIOps redefines the firewall operational experience by…

BlueCat evolves its DDI portfolio to empower IT and network admins
New features tame network complexity, reduce costs, improve security, and automate DDI tasks to drive rapid innovation.

Grafana Dashboards for Check Point & Palo Alto Networks Firewalls with Indeni 7.10
Curated Grafana Dashboards A critical part of managing security infrastructure is to collect telemetry data from firewalls, gaining deep visibility…

Indeni’s response to Spring4Shell
On March 29th, 2022, a remote code execution vulnerability in Spring Cloud Foundation was published. The vulnerability is known as Spring4Shell, tracked as…

Multi-tenancy & IP Address Management
Solving the IP range overlap management problem for Enterprises and MSPs

BlueCat Server Update Services
BlueCat Server Update Services provides flexible update and patch management for server farms to ensure resilient and secure infrastructure.

Key to DevOps success: avoid lift and shift to cloud
GM Financial’s DevOps VP Matt McComas offers key lessons on taking a systemic approach, breaking process roadblocks, and measuring automation success.

Fortinet FortiGate Automation
FortiOS 6.0 introduces Automation Stitches as part of the Security Fabric. Automation Stitches can be used to automate certain actions in response to…

The war in Ukraine: A message from CEO Stephen Devito
BlueCat has discontinued the export of our products and services, as well as support, for all customers owned and operated in Russia or Belarus.

Level up your DDI know-how with BlueCat training
Whether you’re a newbie or an expert, BlueCat training offers self-paced online learning, instructor-led training, and expert certification badges.

Indeni’s response to Dirty Pipe Exploit
Linux has yet another high-severity vulnerability known as Dirty Pipe that was disclosed on March 7, 2022. Dirty Pipe allows an attacker to overwrite…

BlueCat Migration services
BlueCat migration services help you methodically move DNS networks and workloads, mitigating risk to your data and core business functions.

How the cloud has complicated network observability
Kentik co-founder and CEO Avi Freedman chats about the merits of network observability and how the cloud has changed the networking landscape.

8 Must-Have Capabilities For Firewall Monitoring Tools
The best firewall monitoring tools can quickly detect problems, recommend actionable remediation steps, provide proactive alerts and validate best…

BlueCat Edge-enabled migrations
With BlueCat Edge, simplify migrations from legacy systems using intelligent forwarding and Adaptive Plugins while reducing downtime risk.

BlueCat Edge for security
BlueCat Edge allows security teams to leverage the DNS data that it captures for another layer of security intelligence and protection.

Indeni’s response to the PolKit vulnerability
Indeni became aware of the vulnerability in PolKit’s kexec component, tracked as CVE-2021-4034 on January 25, 2022. The PolKit vulnerability has come to…

Cisco DNA Center
The BlueCat Cisco DNA Center Adaptive Plugin enhances visibility into IP address utilization to maintain uptime of critical applications and services.

When architecting cloud, geography still matters
Former Manulife AVP of Global Network Services Sandi Jones reminds us of the importance of considering geography when architecting cloud environments.

Top Check Point Support Features For 2022
After another year of remote working and virtual events, we have learned new ways to drive innovation and manage remote workforces. This year, CPX 360 is…

What AWS Outages Can Teach Us About Network Capacity Planning
Network capacity planning is the ongoing process of determining that a network has the resources it needs to prevent an impact on business-critical…

Indeni 7.9 Security Infrastructure Automation & Usability Improvements
Label Management A label is a group of multiple devices. Labels let you organize your devices, so you can view information about a group of devices and…

Clarke: How to mitigate ransomware, protect the cloud
Renowned cybersecurity expert Richard Clarke delves into protecting your network from ransomware and what cloud adoption means for your security strategy.

In their own words: Cats reflect on 20 years of BlueCat
BlueCat turned 20, and to celebrate the milestone, we asked Cats to look back on where we’ve been and share what they love about working here.

Examining the Log4j2 vulnerability and our response
Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.

BlueCat celebrates 20 years leveraging DNS to enable digital transformation
Now in its 20th year of business helping global enterprises manage their DDI, BlueCat recognizes all those who have played a role in the company’s growth.

Firewall Trends And Priorities For 2022
In the past two years, companies have experienced an unprecedented shift toward remote work as a result of the COVID-19 pandemic. This brought new…

Indeni’s response to the Log4j vulnerability
At Indeni, as in many organizations, we took immediate actions following the details emerging around CVE-2021-44228. The Log4j vulnerability has come to be…

Planning IPv6 Address Assignment
Understanding how IPv6 addresses are assigned to hosts manually and dynamically on your enterprise network.

Detecting BGP Issues for Check Point Secure Gateways
Border Gateway Protocol (BGP) is the routing protocol underpinning the Internet. As networks connect with each other they require a way to communicate. BGP…

How to visualize network state data for stakeholders
With REST APIs and CLI parsers, present your network state data in a variety of consumable ways for developers and stakeholders. Learn how with BlueCat.

BlueCat announces HashiCorp Terraform plugin for resource deployment to cloud environments
With Terraform BlueCat Provider, networking teams can automate against a single source of truth when deploying key resources to public and private cloud.

Terraform BlueCat Provider
With the Terraform BlueCat Provider plugin, reduce time and costs spent on cloud environment changes by automating configuration management through code.

BlueCat announces integration with AWS to help enterprises manage IP space in cloud environments
Industry-first integration will help enterprises simplify collecting DDI data across multiple AWS accounts.

Fortinet Zero Touch Provisioning – Design, Configuration & Verification
Zero Touch Provisioning (ZTP) is a very popular technology on the feature list of networking products. ZTP is common in network devices like switches,…

BlueCat named a 2021 Best Workplace in Technology
BlueCat announces it has received a spot on the 2021 Best Workplace in Technology list from Great Place to Work®.

Learning Certification Program Integrity Stream
Self-paced and online, learn how to use all of BlueCat Integrity’s features and functions, from architecting the IP space to advanced troubleshooting.

Learning Certification Program Edge Stream
Self-paced and online, learn how to use BlueCat Edge to gain visibility and control over DNS traffic, optimize DNS resolution paths, and secure networks.

Learning Certification Program Automation Stream
Self-paced and online, learn how to implement and manage BlueCat’s automation solutions, including Gateway, adaptive applications, and plugins and APIs.

How to budget for a DNS, DHCP, and IPAM solution
If you’re considering purchasing a DNS, DHCP, and IPAM solution, it can be difficult to calculate the actual costs and ROI. BlueCat is here to help.

Learning Certification Program DDI Stream
Self-paced and online, get product-agnostic foundational learning on the basics of DNS, DHCP, and IP address management.

Total visibility key to tame DDI hybrid cloud challenges
In an ONUG webinar, BlueCat’s Andrew Wertkin explains how DNS, DHCP, and IPAM visibility is key to automation and taming four hybrid cloud challenges.

Recent Check Point Firewall Issues Causing Outages
Your firewall is the first line of defense against cyber attacks. No doubt firewalls are the most critical component of any security infrastructure for…

How to talk to your boss about buying a DDI solution
You need a DNS, DHCP, and IPAM solution, but now you have to convince your boss of it, too. Learn more from BlueCat about how to broach the conversation.

What to ask a DNS, DHCP, and IPAM solution vendor
You’ve decided your DNS, DHCP, and IP address management are too complex to DIY. Learn more from BlueCat about how to find the right solution partner.

Customer Story: Scalable Automation Initiatives in the Healthcare Industry
This healthcare network’s IT team deployed repeatable, supportable automation using BlueCat Gateway to free up time for getting even more done.

Indeni 7.8 – Device Backup Daily Digest & Check Point Infrastructure Automation
Device Backup Daily Digest Device backup is an important task for organizations to ensure their security infrastructure is safe from failure and…

Scalable Automation Initiatives in the Healthcare Industry
This healthcare network’s IT team deployed repeatable, supportable automation using BlueCat Gateway to free up time for getting even more done.

BlueCat Announces Partnership with UK-Based e92plus
BlueCat adds e92plus to its partner program to help deliver innovative IT solutions to enterprises in the UK and Ireland.

A Cloud Guru: 4 ways to converge networks and cloud
Zurich and Kroger’s networking experts explain how to avoid cloud-networking dysfunction in a conversation with A Cloud Guru.

BlueCat Hybrid DNS Update
BlueCat Hybrid DNS Update automates DNS updates for hybrid cloud environments, so network teams can move at the speed of business.

5 IT pros on joining enterprise and cloud provider DNS
Networking pros explore integrating enterprise and cloud DNS during the fifth Critical Conversation on Critical Infrastructure hosted in Network VIP.

DNS sinkhole: A tool to help thwart cyberattacks
A DNS sinkhole supplies a false domain name in response to a DNS query, preventing connections to malicious or unwanted domains. Learn more with BlueCat.

Security Infrastructure Automation for Check Point Firewalls
Without automation, IT operations teams would spend countless hours gathering diagnostics and device data to keep firewalls up and running. IT teams that…

Palo Alto Networks Best Practice Compliance with Indeni
Intro and goal of this post: Importance of best practice analysis How Indeni differs from manual checks and the Palo Alto Networks BPA tool. Best practices…

Four major DNS attack types and how to mitigate them
In a DNS attack, DNS is compromised or used as a vector. Learn about the different attack types and how to prevent, detect, and mitigate them with BlueCat.

Our analysis: Gartner’s DNS security best practices
BlueCat has long known what Gartner now says: Your network needs DNS security. Learn how DNS data logs, threat feeds, and setting policies can help.

Network orchestration with Micetro: open-source DHCP
Pairing your open-source DNS with similarly open-source DHCP makes a lot of sense, and Micetro can help you.

Now customize all response codes in DNS Edge
The ability to customize all DNS response codes for BlueCat DNS Edge namespaces conditional forwarding provides even more network resilience. Learn more.

IPv4 vs IPv6: What’s the difference?
The transition to IPv6 is here. Learn more with BlueCat about the necessity of it, the timeline, and the numerous benefits and challenges of IPv4 vs IPv6.

Hybrid Cloud and Intelligent Forwarding
Learn how to use BlueCat Edge to intelligently forward queries to eliminate DNS silos and reestablish authority when adopting hybrid cloud.

What causes a DNS outage? Humans, mostly
Human error is behind most DNS outages. Learn more from BlueCat about the dire impacts of outages and why homegrown DNS solutions increase outage risk.

Indeni 7.7 – Single Sign-on & Check Point Device Hardening
Single Sign-on with SAML 2.0 Organizations have been moving to centralize their user access either through third party identity management SaaS…

Customer story: Global multi-cloud visibility
For this global manufacturer, gaining global multi-cloud visibility became possible using DDI with BlueCat.

The enterprise guide to network automation tools
When it comes to automation, the right network automation tools are crucial. Learn what to look for and get insight into what’s available out there.

Architects agree: cloud networking needs collaboration
Two architects share firsthand with BlueCat the challenges when cloud and network teams don’t collaborate, and offer advice on how to do it right.

BlueCat named a Best Workplace™ for Inclusion, Mental Wellness 2021
Additionally, Cheryl Kerrigan appointed Chief People Officer in recognition of the company’s exemplary corporate culture programs.

Two ways to boost enterprise IT self-service delivery
To elevate self-service automation, tie in your IPAM solution and account for IP address over-allocation. Learn how BlueCat Gateway can help.

BlueCat Offers Managed Service Providers Adaptive DNS Solutions to Solve Hybrid Cloud DDI Challenges
BlueCat launches program to help MSPs fill a critical network management gap.

Misalignment Between Cloud and Network Teams Puts Enterprise Cloud Initiatives at Risk
Research by EMA and BlueCat demonstrates 72% of enterprises struggle to achieve the full benefits of the cloud.

BlueCat achieves record growth in 2020, the strongest year to date for the Adaptive DNS™ Company
The organization has also appointed two new executives amidst a period of immense growth, fueled by accelerated adoption of hybrid cloud.

3 cloud networking challenges architects should know
Collaboration is the key to gaining control over the cloud networking challenges of connectivity, security, and observability. Learn more with BlueCat.

Among cyber-attack techniques, what is a DGA?
What is a DGA? To evade detection, they churn out domain names and IP addresses for malware command and control servers. Learn more with BlueCat.

DDI scenarios that can hurt your hybrid cloud strategy
During Tech Field Day, BlueCat’s Andrew Wertkin whiteboards three scenarios to show how DDI challenges affect your hybrid cloud strategy.

Four ways to bridge the network and cloud team divide
The gulf between cloud and network teams inhibits the potential of cloud investments. Learn how CIOs can break down the silos from EMA research and BlueCat.

Customer story: Scalable global routing for hybrid cloud
For a multinational insurer, a secure, scalable, and interconnected hybrid cloud estate wouldn’t have been possible without input from networking.

MAC address vs IP address: What’s the difference?
MAC address vs IP address: One is a unique hardware identifier, while the other identifies a device’s network connection. Learn more with BlueCat.

Comparing cloud DNS capabilities
The public cloud presents major challenges for DNS management. Examine various capabilities and limitations of Azure, AWS, and GCP with BlueCat.

BlueCat launches Integrity 9.3 with improved DNS, DHCP, and IP Address Management (DDI) capabilities to enable business transformation and enterprise cloud adoption
BlueCat Integrity 9.3 provides customers with greater observability, comprehensive automation, and accelerates cloud adoption while enhancing overall system…

BlueCat Edge Intelligent Forwarding
Learn how Intelligent Forwarding helps network teams architect the most optimal and creative DNS resolution routes and how BlueCat Edge customers use it.

8 network automation tasks for anyone to get started
Automating your network can be daunting, but the payoff is huge. Here are eight easy automation tasks to help any network engineer get started.

9.3 Integrity Deep Dive On-Demand Replay
Learn how you can get more security data, ramp up automation, and adopt cloud without compromising performance.

For DNS server caching, what is the ideal TTL?
Many factors affect how you decide to set time to live (TTL) for DNS servers. Learn more, plus how BlueCat Edge’s TTL features can bolster your network.

Comparing AWS, Azure, and GCP cloud DNS services
The public cloud presents major challenges for DNS management. Examine various capabilities and limitations of Azure, AWS, and GCP with BlueCat.

DDI Day: Kudos, awards, and insights from pioneers
BlueCat’s DDI Day on April 13 celebrated network infrastructure professionals, gave awards to superstars, and drew insight from DNS and DHCP pioneers.

Infrastructure Automation with Indeni 7.6
Check Point Device Hardening Device hardening is a necessary step to ensure your security devices do not have any potential loopholes which can be…

Everything you need to know about shadow IT
When users implement their own solutions behind the IT team’s back, that’s shadow IT. Learn about the risks and how to manage and reduce it with BlueCat.

Five network pros’ manual error horror stories
Members of BlueCat’s Network VIP community detail the errors they committed, the resulting fallout, and what important lessons they learned.

10 best Ansible modules for infrastructure as code
10 (plus a bonus) Ansible automation modules that anyone—from a beginner to a power user—can leverage to transform their network infrastructure to code.

How an agency IT chief innovated amid bureaucracy
Government IT innovation isn’t easy, but Chad Sheridan did it at the USDA by removing silos, earning top-level buy-in, and moving to a product mindset.

Cloud Webinar Series: Part 3
Manage overlapping cloud networks like a boss.

Lexmark CIO & CTO on recognizing the right use cases for AI
Lexmark CIO & CTO Vishal Gupta wades through the murk surrounding AI, explaining what tech organizations should know when deciding whether to adopt it.

NSA and CISA: Protective DNS key to network defense
U.S. cyber agencies now point to protective DNS as a defense strategy, confirming what BlueCat already knew: DNS is critical to detecting network threats.

Cerner’s key to managing requirements is relationships
Cerner’s Jon Macy shares his keys for managing IT solution requirements: write them down first, allow nascent ideas, be flexible, and lean into conflict.

BlueCat Integrity 9.3: Deliver DNS like a boss
With the BlueCat Integrity 9.3 release, network admins can get more audit data, manage complexity, and ramp up automation, without compromising performance.

Cisco Live 2021 guide: How to ‘Turn IT Up’ virtually
Cisco Live! for the Americas is March 30-31. BlueCat has all the details, plus top session picks and tips for getting the most out of this virtual event.

GM Financial is driving the evolution of legacy QA roles
GM Financial’s cloud VP Thomas Sweet sees the death of standalone QA as an opportunity for automation and empathic team up-skilling to DevOps roles.

IT pros debate: Should network teams design cloud?
Networking pros dig into who should design hybrid cloud networks during the fourth Critical Conversation on Critical Infrastructure hosted in Network VIP.

Palo Alto Networks High Availability Health with Indeni
High Availability, or HA, as most of you reading this know, is a method of configuring firewalls, routers or appliances for redundancy. HA plays a…

Deloitte Deputy CEO on CIO’s shift to business partner
Deloitte’s Rich Penkoski sees CIOs shifting to be business partners instead of technology providers, embracing agile project approaches, and more.

Cloud Webinar Series: Part 2
Tame complex DNS forwarding in the cloud with BlueCat Intelligent Forwarding.

Net Health CIO: Remedying health care IT is possible
Net Health CIO Jason James shares how he transforms health care IT by thinking like a politician and embracing the death of going to work at the office.

Yes, you can optimize DNS routing for global SaaS use
Routing DNS for SaaS can lead to latency, non-local results, and messy internet breakouts. With BlueCat, optimize SaaS delivery and gain full DNS control.

UK National Cyber Security Strategy
BlueCat Edge alignment to the UK National Cyber Security Strategy.

Yes, you can tame hybrid cloud DNS traffic jams
Admins often use messy conditional forwarding DNS rules to fill hybrid cloud gaps. With BlueCat, automate and gain control over your data pathways.

In Atlanta, affordable housing also means tech access
Atlanta Housing Authority CIO Brian Benn shares how the data-driven agency delivers technology access for residents along with affordable housing.

Yes, networking can extend DNS control into the cloud
When cloud and on-premises DNS are separate, enterprise-wide control is out of reach. Learn how BlueCat can provide a single source of truth for DNS.

How UC Irvine’s IT team is driving healthcare innovation
Learn how UC Irvine Vice Chancellor Tom Andriola is leading IT to play a key role in the university’s mission to create and share knowledge.

Cloud Webinar Series: Part 1
Learn how to accelerate DDI-ready cloud provisioning, reestablish DNS authority and governance, and centralize visibility across multi-cloud environments.

BlueCat Blueprint for AWS
Instructions provided allow BlueCat Address Manager (BAM) and BlueCat Gateway to discover and import data from an Amazon cloud environment.

SUNBURST/Solorigate Situation Briefing
BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.

React faster at the wire with BlueCat and ExtraHop
With the BlueCat ExtraHop Plugin, automatically create missing PTR records, and detect and react to security threats before they reach DNS servers.

Yes, IT should see what developers do in the cloud
Errors and outages occur when admins lack visibility into DNS and IP allocation in the cloud. With Bluecat, central DDI visibility is within reach.

Why McMaster University didn’t want another CIO
McMaster’s CTO, Gayleen Gray, highlights the importance of her unique role in a world where expectations of the CIO and CTO are colliding.

Cloud DNS: Benefits and obstacles for hybrid networks
Unsure about cloud DNS services and hybrid-cloud enterprises? Learn more with BlueCat, including why it isn’t so simple for managing networks.

Customer situation brief on SUNBURST/Solorigate
Learn more about the attack via the SolarWinds Orion platform and how BlueCat products use DNS to help protect customers against compromises like it.

Sync ServiceNow tickets and IPAM with CMDB Plugin
With BlueCat’s ServiceNow Configuration Management Database, admins can break the silos between ServiceNow and IPAM to improve IT ticket fulfillment.

BlueCat ServiceNow CMDB Plugin
The ServiceNow CMDB enhances configuration management real-time visibility into BlueCat assets, improving ticketing automation and analysis.

On the road to platform hardening, consider a STIG
Security Technical Implementation Guides standardize security configuration on networks, servers, and devices. BlueCat uses them and you can, too.

E-BGP Peering with Cisco Nexus OS
Scenario Let’s consider a typical real-world BGP scenario: peering with your ISP. Maybe you don’t have a powerful enterprise router or maybe you want to…

IT pros debate: Who should own DNS in the cloud?
Six networking pros dig into who should own DNS in the cloud during the third Critical Conversation on Critical Infrastructure hosted in Network VIP.

Fortinet FortiGate HA (High Availability) Solutions
Importance of HA In this article, we will discuss the importance of HA (High Availability) solutions for your FortiGate firewall(s). We will compare two of…

Flexibility and security can co-exist for the Red Cross
American Red Cross CISO Vikas Mahajan discusses flexible security strategies for front-line operations and his roadmap for moving toward a SASE model.

9 tech leaders’ advice on running a technology organization (part 3)
A compilation of the best insight and technical takeaways from the first season of the Network Disrupted podcast, led by BlueCat CSO Andrew Wertkin.

Network admins’ top 10 checklist for holiday prep
From syncing NTP to having readily accessible DNS maps, here are 10 things you can do to keep your networks reliable during the holiday lull.

Check Point Infrastructure Automation – Indeni 7.5
Indeni’s infrastructure automation alerts you to important issues and automatically troubleshoots them in your environment. We are excited to announce…

Palo Alto Networks SSL Decryption Health with Indeni
With SSL encryption being such a crucial part of securing your network traffic, you can imagine it also is very important to your company that it works…

BlueCat’s Cloud Discovery & Visibility now available for Google Cloud Platform
BlueCat announced that its Cloud Discovery & Visibility application supports Google Cloud Platform (GCP), Amazon Web Services (AWS) & Microsoft Azure

9 tech leaders’ advice on running a technology organization (part 2)
A compilation of 8 tech leaders’ (+ BlueCat CSO Andrew Wertkin) advice on driving innovation and achieving overall success as a tech organization.

Check Point Maestro Infrastructure Automation
While customers are taking advantage of Check Point Maestro Hyperscale Network Security to scale out their security infrastructure, they demand…

9 tech leaders’ advice on sustaining business alignment (part 1)
Now that Season 1 of the popular podcast Network Disrupted has wrapped, it’s time to parse insights from the show and share them with you.

Temporary workaround for SAD DNS
Ahead of Linux’s patch taking effect, BlueCat Labs has a temporary workaround for protecting against the revived Kaminsky DNS cache poisoning attack.

IT pros debate: Should you DIY your DDI?
Five IT pros get real about DIY vs. enterprise DNS solutions during the second Critical Conversation on Critical Infrastructure hosted in Network VIP.

How to Export Palo Alto Networks Firewall Configuration to a Spreadsheet
Rohit Singla describes how to export Palo Alto configurations into a spreadsheet.

How to configure DHCP failover
In this demo, learn how to configure the DCHP failover protocol for BAM and BDDS, pairing DCHP servers to provide redundancy and load balancing.

How to configure crossover high availability (xHA)
In this demo, learn how to configure a crossover high availability (xHA) pair in BlueCat Integrity for disaster recovery through redundant servers.

Address Manager Role-Based Access Control
In this demo, you will see how BlueCat’s Address Manager permits the admin to control who can change the environment. Admins will ensure that only cretin…

Simply configure BAM DNS and DHCP
Learn how to configure DNS & DHCP (view, zone, record, DNS options, block, network, DHCP options) & UI options (Table View/Tree View).

Setup Metrics & Reports in Address Manager (BAM)
Learn how to configure SNMP on BDDS servers to generate reports like network and block utilization in different formats.

Adding widgets to MyIPAM Dashboard
Learn how to set up BlueCat Address Manager MyIPAM dashboard widgets for BDDS Servers. These widgets help you manage day-to-day tasks.

Are your DNS servers still architected like it’s 1999?
DNS hasn’t changed much, but networks have. Your traditional DNS server architecture might be due for some re-thinking to a cascading approach.

Should you store DNS data in the cloud or data center?
There are tradeoffs to where you store DNS data. Whether in the data center or cloud, BlueCat’s custom logging feature can help you better manage it.

Critical DDI challenges with cloud
BlueCat Chief Strategy Officer Andrew Wertkin discusses the benefits and challenges of cloud adoption. Presented at ONUG Fall 2020.

Five cloud challenges for DDI and how to beat them
The cloud-first transition has splintered network visibility and control for NetOps. But the DNS, DHCP, and IPAM hurdles they face can be overcome.

Seven best practices to keep your NTP resilient
When NTP, which synchronizes network clocks, gets off-kilter, DNS and other network disruptions follow. Keep your NTP in shape with BlueCat’s expert tips.

12 must-join communities for IT and tech professionals
A compilation of the most vibrant, helpful communities to join if you work in IT or technology, plus some tips for getting started.

Enhance Infrastructure Automation with Indeni 7.4
Knowledge Enhancements Indeni supports infrastructure automation by alerting you to important issues in your environment. Today, we have added a few…

Six non-hype network automation lessons from IT pros
Five IT pros get real about network automation during the first Critical Conversation on Critical Infrastructure hosted in the Network VIP community.

BlueCat’s DDI Adaptive Plugins and Applications help IT teams better leverage ServiceNow, Ansible, Microsoft, and more
A growing suite of Adaptive Plugins and Applications will help automate existing BlueCat capabilities along with adjacent customer technologies.

ServiceNow
With the ServiceNow Adaptive Plugin, enable self-service IT requests with automated fulfillment, such as hostname and IP address provisioning.

Cloud Discovery & Visibility
Discover cloud resources to integrate into the BlueCat platform, get updates in near-real-time, and automatically build DNS records and new target domains.

Adaptive Failover Package
With BlueCat’s Failover Package, get the flexibility to manually control or automate DNS server failover when an outage is detected.

Global Server Selector
With the simple UI in BlueCat‘s Global Server Selector, easily configure and update DNS for highly available services and distributed applications.

Device Registration Portal (DRP)
With the Device Registration Portal (DRP), register and track mobile and portable devices connected to your internal network.

BlueCat appoints Stephen Devito as Chief Executive Officer
BlueCat, the Adaptive DNS Company™, today announced that Stephen Devito has been named Chief Executive Officer effective September 11, 2020.

Cisco Nexus Review, Testing & Verification of the embedded NX-OS Packet Capture Tools
Introduction Cisco NX-OS offers a robust set of features to guarantee the uninterrupted operation of the Nexus series switches at the Data Centers. Taking…

ExtraHop
Enhanced visibility and resolution of errors and threats to help maintain resource uptime.

How DNS Edge Enables Cloud Innovation without Complication
The move to the cloud is fueling innovation, easing development and helping companies provide services to customers or enhance internal capabilities –…

OpenStack
Get visibility into OpenStack managed networks in BlueCat Address Manager and seamlessly automate DNS provisioning of new compute instances.

Splunk
Place BlueCat service points between your existing internal DNS resolution system and endpoints to pass query data to Splunk for further analysis.

DDI Reporting Package
With the BlueCat Reports Package, eliminate manual data wrangling and glean data-driven, actionable insights from industry-standard network reports.

vRO
BlueCat offers REST endpoints to provide the information needed to provision servers.

Ansible Module
With the BlueCat Ansible Module, extend the functionality of your Ansible playbooks to include automation of tasks within the BlueCat platform.

Cisco ACI
With this workflow, populate BlueCat Address Manager with data from your Cisco ACI environment, and import ACI tenants and fabric devices for visibility.

Cisco Identity Services Engine
Identify users by IP address or MAC address with this integration between BlueCat Address Manager, Cisco Identity Services Engine, and Palo Alto firewalls.

VMware NSX
With VMware NSX, allocate and record IP address space to the virtual network, and auto-update DNS records as new services are spun up.

Cisco DNS Defense
BlueCat’s integration with Cisco DNS Defense gives you the source IP of client devices and granular insights for rapid threat remediation and…

Illusive Networks
Get automated IP address provisioning that is synced with Illusive Networks’ deception technology, narrowing the circle of admins with the “need to…

IBM QRadar
With IBM’s QRadar SIEM integration, pinpoint attacks and threats by getting detailed information about devices on the network using DNS and DHCP data.

Axonius
With the Axonius integration, get visibility into network devices to assess risk, mitigate security gaps, and ensure compliance.

Technology Partners
Browse our ecosystem of technical partners to find out which solutions interoperate with ours, and to see if you’d like your solution to be part of it.

Supporting the CIS Palo Alto Firewall Benchmark
The Center for Internet Security (CIS) is a non-profit organization that works with security experts to develop a set of best practice security standards…

7 Use Cases for Network Automation
“You’re either the one that creates the automation, or you’re getting automated.” — Tom Preston-Werner, the co-founder of GitHub. The truth…

To better see the threats on your network, try DNS
DNS is a vector used in most cyber attacks. When it comes to DNS, BlueCat can enhance visibility, detection, and containment of threats to your network.

How to use Cisco Nexus OSFP over vPC Review
Cisco Nexus OSFP vPC Implementation & Verification Cisco Nexus virtual Port Channel (vPC) is a virtualization technology launched in the mid of 2009.…

SD-WAN and other network trends: hype vs reality
A Q&A with a networking engineer on automation and SD-WAN hype, architecting IT projects, and the career implications of skipping the latest trend.

You’re told to automate the network. Now what?
Enterprise Management Associates research reveals what steps you can take now to successfully adopt network automation (hint: it’s not learning Python).

The bigger the business, the more misguided the DDI
EMA research for BlueCat found an inverse relationship between commercial DDI use and business size, as well as more surprises about DDI adoption trends.

CEO Interview with Safety Detectives
Recently, I had the opportunity to sit with Aviva Zacks of Safety Detectives, share the story of Indeni and talk about customers’ challenges. It is…

A simple replacement for complicated GSLB
BlueCat’s Global Server Selector makes it easy to deliver highly available services and distributed applications, without increased network complexity.

Global Server Selector
Global Server Selector provides easy configuration and automatically updates DNS for highly available access to distributed applications and services.

BlueCat Gateway
BlueCat Gateway enables you to automate and transform mission-critical business requirements into DNS, DHCP, and IPAM workflows, plugins, and applications,…

How to get hired as a BlueCat intern/co-op
Applying for an intern/co-op position at BlueCat? Here are some tips.

BlueCat Enhances Cloud Discovery & Visibility
BlueCat’s Cloud Discovery & Visibility offering now supports Microsoft Azure, giving network teams a single source of truth over more of their…

Indeni 7.3.1 – More About Reducing Noise
We’re delighted to announce an Indeni release. The highlights are the ability to exclude issues items, the ability to specify a new threshold within a…

Webinar: The myth behind Active Directory and DNS
Graham Lockwood, Senior Solution Architect at BlueCat, discusses what Active Directory really needs from a DNS system and denounces AD and DNS myths.

Webinar: Threat Protection
BlueCat Solution Architect Steffen Probst discusses how intelligent security from BlueCat uses DNS to protect internal and external traffic against threats.

BlueCat brings DDI automation to ServiceNow
BlueCat now offers Gateway’s powerful automation capabilities through the ticketing infrastructure of ServiceNow.

Webinar: Cloud Discovery & Visibility
Brian Shorland, BlueCat’s Director of Product Management, walks our webinar guests through a demo of our Cloud Discovery & Visibility feature.

Patch is available for the Critical Vulnerability (CVE-2020-2021) Impacting Palo Alto Firewalls
Another vulnerability bug with a CVSS 10 severity score was disclosed last week. Palo Alto Networks has published the security advisory PAN-148988 for a…

BlueCat Overlay for Microsoft
Get visibility and control into Microsoft Active Directory by importing DNS records, updates, DHCP transactions, and network data.

Comparing indeni and Check Point’s SmartView Monitor
The summary: Check Point’s SmartView Monitor is great as a basic tool for identifying the operational health of your firewalls. However, if your…

Latest F5 Vulnerability Receives a CVSS 10 Severity Score
Have you been impacted by the latest F5 vulnerability that received a CVSS 10 severity score? F5 Networks has published a security advisory on July 1, 2020…

Indeni 7.3 – Increased Automation, Less Noise
While alerts help you stay ahead of problems with your security infrastructure, it can be challenging to create just the right amount of alerts to stay…

Tales from the Edge: DNS is so much more than a phone book
A conversation on Edge and enterprise use cases with BlueCat’s Chief Strategy Officer, Andrew Wertkin, and podcast hosts Stephen Spector and Rob Hirschfeld.

Cloud Discovery & Visibility Demo
Advanced DDI capabilities & visibility for your multi-cloud & private cloud environments

GAO report reveals difficulty of IPv6 migrations
How difficult are IPv6 migrations? A recent GAO report on DOD’s transition plan provides some sobering conclusions.

Instructor-led BlueCat Integrity Fundamentals
BlueCat’s four-day onsite instructor-led training course covers the administration of BlueCat Address Manager and BlueCat DNS and DHCP servers.

Instructor-led Security and Advanced Configuration
BlueCat’s eight-hour instructor-led training course covers DNS security and advanced IP address management concepts for network administrators.

Manage compute seamlessly with the BlueCat OpenStack Adaptive Plugin
The BlueCat OpenStack Adaptive Plugin provisions compute to support updates for DNS name resolution across the enterprise.

Drive DNS automation with the BlueCat Ansible module
The BlueCat Ansible module makes it easy to use playbooks to provision DNS, DHCP, and IPAM resources.

BlueCat adds new capabilities to its DNS automation offering
With its new automation offering, BlueCat is rolling out new ways to orchestrate network functions and increase efficiency.

Keeping networks secure during unprecedented WFH
As we work from home, DNS over HTTPS (DOH) use is up by 1,500%. Learn what DNS tells us about network security and how BlueCat and Cisco Umbrella can help.

How to interview for a BlueCat co-op/intern position
Ready to interview for a co-op/intern position at BlueCat? We have some advice.

Before migrating, cleansing your DDI data is crucial
During a DDI migration, it’s important to get ahead of any bad data and misconfigurations before they wreak havoc on your future solution.

IP infrastructure automation in action: the REST(ful) API
We demonstrate the flexibility and simplicity of using the REST API for automation within the Men&Mice Suite.

IPAM should work like a vending machine
There are alternatives to free-for-all service desk tickets for provisioning IP addresses: automation with an IPAM system.

BlueCat named Best Workplace for Mental Wellness for second year in a row
BlueCat is proud to be named a Best Workplace for Mental Wellness for 2020.

Domain Generation Algorithms in (cyber) threat hunting
Dissecting the malware technique that keeps threat hunters guessing. For cybersecurity professionals and threat hunters, it can feel like advanced…

DNS Automation: Managing DNS Options and Roles
Harmonizing DNS/DHCP options and server roles across multiple levels of IP address management can be a time-consuming task. Here’s how BlueCat helps.

Welcome to ADAPT 2.0
We all know the cloud is imperative and one of the final destinations for many organizations. What’s missing is a roadmap to get there and no two maps are…

How networks collapse: gradually, then suddenly
Hemingway said that bankruptcy comes “gradually, then suddenly”. We’ve discovered that network collapses often follow a similar pattern.

Automation to enable security teams to do more with less
Inside Auto-Triage Many enterprises are expecting to continue operating remotely through the end of the year. This new operating environment has…

Augmenting Your Team During Difficult Times
These past few months have seen an enormous negative economic impact on many organizations. One that is expected to remain longer after shelter-in-place…

BlueCat Migration Case Study: Federal System Integrator
Here’s how BlueCat migrated a spin-off of a Federal System Integrator with zero downtime.

Network virtualization needs enterprise-level DNS
Virtualization is part of every network’s DNA. But network virtualization requires an enterprise-grade DNS platform alongside it to be truly successful.

BlueCat enhances Adaptive DNS™ platform to help IT teams accelerate application deployments and stop advanced threats
Enhancements to BlueCat’s platform give businesses greater control, visibility, and agility by using DNS, DHCP, and IP address management (DDI).

How to block DoH with BlueCat’s threat feed option
The use of DNS over HTTPS (DoH) is surging. That’s bad news for security admins. If you’re looking to block DOH, BlueCat’s threat feed makes it easy.

Extend SD-WAN benefits with enterprise-grade DNS
An optimal SD-WAN implementation needs consolidated and automated network infrastructure, including a DNS management platform. Learn how BlueCat can help.

How BlueCat is scaling its WFH culture
With a worldwide shift to work from home culture, we thought we’d share what BlueCat is doing to enhance remote work.

Migrating DNS zones from DynDNS (or other DNS services)
Let’s see how you can migrate all your DNS data from one service to another in literal minutes.

BlueCat ranks as Best Workplace in Canada
BlueCat was recognized as a Best Workplace in Canada for the fourth year in a row.

Ensuring Availability of Check Point devices during COVID-19
Virtual Private Network (VPN) usage is surging as the number of employees forced to work from home increases due to the COVID-19 pandemic. Security…

2020 Networking Trends Report
NetOps teams are increasingly required to drive rapid changes to the network in support of their business’ digital transformation efforts.

How DNS powers DevOps in DOD “software factories”
DOD now has DevOps-led software teams to solve warfighter problems. Here’s how DNS will play a key role in powering their innovations.

Ensuring Reliability and Heightened Security of Palo Alto Networks devices during COVID-19
The COVID-19 pandemic remains a health and humanitarian crisis. It is exerting a profound impact on the global economy and our daily lives. Businesses are…

Bolster defense-in-depth with BlueCat threat feeds
Network security products are only as good as the threat intelligence you feed into them. Here are BlueCat’s threat feed options.

Enterprise tactics to manage DNS for remote work
When everyone’s working from home, there are a few network configurations you may want to pay more attention to. Here are some best practices to consider.

Indeni 7.2: Increased Automation and Simplicity
The release of Indeni 7.2 advances our mission to automatically detect issues and triage them. We have provided a snapshot below of several new capabilities…

Ensuring Maximum Reliability of Cisco ASA devices during COVID-19
We are facing difficult challenges as the COVID-19 pandemic disrupts the life of our communities and our families. At Indeni, we are responding to the…

Did Mozart malware break the mold?
Is this ‘new’ DNS-based malware really anything new?

BlueCat-Illusive integration enables effective deception
Thrive on deception, and protect your network with an Illusive Networks integrated Adaptive DNS platform from BlueCat.

BlueCat’s world-class customer care recognized by the 2020 Stevie® Awards
At BlueCat, our culture code informs everything we do. We know it makes us better teammates for each other and better service providers for our customers.…

Driving NetOps 2.0 with DNS Insights
Key takeaways from the 2020 Network Trends Report, moderated by Jim Malone, Senior Content Director at IDG.

We’re right here: Supporting customers during COVID-19
DNS is critical to our customers now more than ever. That’s why BlueCat is here to support customer needs during the COVID-19 pandemic.

Driving NetOps 2.0 with DNS Insights
NetOps teams are increasingly required to drive rapid changes to the network in support of their business’ digital transformation efforts.

Dealing with COVID-19 themed malware
Keeping laptops clean even when they’re not behind the firewall Cybercriminals are using COVID-19 as bait to trick users into installing malware. It’s…

Core Network Services Case Study: Federal System Integrator
Here’s how BlueCat built a new DDI architecture for a Federal System Integrator following a large merger.

DNS-Based Security: A New Model for FISMA Compliance
DNS data is an extraordinary valuable – and surprisingly underutilized – source of information that gets to the heart of FISMA compliance. Get the…

Exposing The Enemy Within
91% of cyberattacks leverage DNS, yet few security experts analyze DNS data. Get this eBook to learn the role that DNS play in cyberattacks and the goal…

DNS in the Cybersecurity Stack
Malicious actors exploit DNS every day to establish command and control, navigate through networks, and exfiltrate data. his eBook will show you how DNS can…

Don’t Rely on Mr. DNS
You know who they are. They’re the go-to person for everything DNS-related. While that’s a big burden to carry, relying on a single person also puts the…

DNS & Cybersecurity Compliance
Cybersecurity and compliance may be the most over-used and under-explained terms in the world of IT. We all want our networks to be secure. We all want our…

A House Divided
In this exclusive research report with IDG (International Data Group), we surveyed hundreds of networking and cybersecurity professionals to understand how…

NetOps 2.0: Driving better decisions for IT leaders
Ask any IT executive what their mandate is. Their answer is some version of faster and better service delivery for their customers. From DevOps and CloudOps…

Tracking Capacity Under COVID-19
Indeni users are reporting an unprecedented load on firewalls and load balancers from increased internet usage during the global COVID-19 response. Networks…

How to gauge the value of DDI plugins
The ideal DDI solution uses automation to manage data, and every DDI vendor has a laundry list of plug-ins. But not all plug-ins are created equal.

Intelligent Automation Datasheet
BlueCat’s automation offering makes it easy to drive rapid change in your organization and integrate DDI throughout the network stack.

DNS Edge for Splunk
BlueCat’s integration between DNS Edge and Splunk gives you the power to import all (or some) of your DNS data directly into a SIEM.

BlueCat Integrity
DNS Integrity is BlueCat’s flagship platform for management of DNS, DHCP, and IPAM.

Design & Architecture Datasheet
BlueCat brings 20 years of experience to the design and architecture of your DDI infrastructure.

Intelligent Security Datasheet
BlueCat’s DNS Edge secures internal and external DNS traffic right at the “first hop” of any query.

Cisco Umbrella & DNS Edge Datasheet
The integration of BlueCat’s DNS Edge and Cisco Umbrella offers a powerful combination to secure internal and external DNS traffic on your network.

Migration Services Datasheet
BlueCat’s migration process ensures a seamless transition from VitalQIP, Infoblox, Microsoft, and other DNS solutions.

BlueCat Threat Protection
BlueCat Threat Protection applies the power of Crowdstrike’s threat intelligence to all your DNS traffic.

Device Registration Portal
Use the power of DNS to manage and oversee network devices, all in a single pane of glass.

Gen4 Appliances
BlueCat’s Gen4 hardware offers more capacity and greater flexibility to your DDI infrastructure.

BlueCat Announces that its DNS Solutions are in Production on Ajinomoto’s Hybrid Cloud Network
TORONTO, ON – March 5, 2020 – BlueCat, the Adaptive DNS™ company, announced today that its DNS service points are in the process of being…

What is typosquatting and how to protect against it
Typosquatting occurs when URL typos, including for top-level domains, go to malicious sites. Learn how you can protect your network from it with BlueCat.

What BlueCat learned from five billion DNS queries
BlueCat’s 2020 Networking Trends Report illustrates how CIOs can use DNS data to uncover efficiencies, minimize threats, and improve customer experience.

Andrew Wertkin & Farsight CEO Paul Vixie Unpack Mozart Malware & DNS over HTTPS News
BlueCat’s Andrew Wertkin and Farsight CEO Paul Vixie break down the headlines.

Incident Investigation Made Easy with Indeni & Demisto
Incident investigation for Palo Alto firewalls vulnerabilities is made easy with automation, no matter how many different hardware models and PanOS versions…

BlueCat takes DNS training to the next level
DNS training is a key part of any core infrastructure transformation. BlueCat has a training model that gives your team all the skills they need.

What DNS data says about IoT devices in your home
What are all those IoT devices in your home actually doing on your home network? We ran a little test to find out, and found some interesting info.

The .ORG Domain Sale: Explained
Private equity firm Ethos Capital plans to buy the domain registry responsible for .org domains. Here’s why this matters.

Announcing the 2020 Check Point Deployment Trends Report
Indeni is pleased to announce the release of the 2020 Check Point Deployment Trends Report, analyzing the trends we observed for 2019. Indeni observed that…

Mizuho Unlocks DNS Visibility, Control and Security with BlueCat and Cisco Umbrella
“We see everything, both internal and external DNS traffic right down to each endpoint on the network. And we can enforce universal security policies at…

BlueCat training overview
In this video, get an overview of BlueCat’s range of training offerings, including instructor led-training and self-paced online learning.

How adversaries are using your DNS data
Find out how much can you learn about a company and their employees simply through DNS data?

Avoiding a Cloud Belly Flop
How can CIOs prevent problematic cloud deployments? We offer some strategic perspective on how core network infrastructure investments pay dividends in a…

The role of DNS in CMMC compliance
This datasheet provides a quick overview of how DNS security plays into the CMMC controls, and how BlueCat promotes compliance.

Know the eight most common DNS record types
There are dozens of DNS record types. Understanding the most common ones can help you detect threats and keep on top of what’s happening on your network.

Snapshots from Cisco Barcelona 2020
Even though Cisco Barcelona was just a week ago, can we say we already miss it? For the third year in a row, BlueCat made a splash at Cisco Live EMEA, the…

Leverage DNS for CMMC compliance
Learn how DNS security plays into Cybersecurity Maturity Model Certification (CMMC) and how BlueCat’s visibility and control promotes compliance.

Cisco DNS Defense + DNS Edge Product Feature Demo
Deep dive into a user and managed device to learn how the integration between Cisco DNS Defense and BlueCat’s DNS Edge enables you to detect, investigate,…

Why BlueCat remote jobs are inherently superior
I used to talk about my status as a BlueCat remote employee in terms of addiction. “I’m hooked. I can never go back.” After four years of…

DNSSEC, DNS over HTTPS & DNS Flag Day – What’s the Difference?
We rounded up industry experts to discuss the intersection of networking, cloud, storage, and virtualization. Here is their conversation.

The top four DNS response codes and what they mean
Every DNS query gets a response. Stay on top of your network activity with BlueCat by understanding the four most common DNS response codes.

BlueCat Appoints Senior Vice President of Global Sales
TORONTO, ON—January 27, 2020—BlueCat, the Adaptive DNS™ company, today announced that it has appointed Barry Saadatmand as Senior Vice President of…

BlueCat recognized as Best Workplaces™ for Inclusion 2020
Breaking down our three-pronged approach to an inclusive (and awesome) workplace culture.

IT Pros Debate: Guilty Networks, Speaking Up The Stack, and Essential Career Skills
In the spirit of breaking down barriers, IT professionals discuss guilty networks, speaking up the stack, and essential career skills.

SASE Hot Take with Andrew Wertkin & Jim Williams
Play video Gartner’s SASE convergence model has been creating quite a buzz in the industry. But what does it DNS have to do with it? Turns out, DNS is a…

Fortigate Firmware Upgrade: Dangers & Tips
New Firmware Releases As we know, network equipment vendors periodically release new software which should fix the issues from the previous release. Still,…

A future-ready network needs to support edge computing
If the last decade has taught us anything, there’s not much we can predict. At one point, we even thought 4.2 billion IP addresses would be enough. Sorry,…

What you can learn from an NXDOMAIN response
At a basic level, an NXDOMAIN response means “that site does not exist.” But it can also provide critical clues about your network’s security.

Trends that drove a decade of change in networking
While some changes were minimal, others were monumental.

3 Qualities You Need to Deliver a High-Quality Online Retail Experience
With online sales outpacing in-store buys, it’s more crucial than ever to offer users a high-quality retail experience. Here are three critical…

The JEDI Program
Play video Cloud migrations don’t happen overnight. It takes an average of 18 months for Federal agencies to plan, prepare, and implement their cloud…

Indeni Uses Ansible to Bring Automation to Security Infrastructure Operations
Indeni leverages Ansible simplicity and flexibility to automate security infrastructure operations and troubleshooting tasks in the most timely manner…

DNS automation: Adding host records with ServiceNow
With the certified BlueCat DDI Service Catalog, you can automate adding host records in ServiceNow and streamline your IP address management.

Is the Gartner SASE model the future of networking?
The Gartner SASE model foreshadows the convergence of network and security solutions, which will mean significant changes in network operations.

Fortify Your Defenses with Cisco DNS Defense and BlueCat
In this webinar, you’ll learn: How to identify threats faster through rapid correlation of external threat data with source IP.

What Retail Cybersecurity Strategies Can Teach Us About IT
Technology’s effect on retail is a double-edged sword. On the one hand, e-commerce, data-driven customer experiences, and other innovations simplify…

Protect your network from DNS hijacking
Learn about the three types of DNS hijacking, how to protect your network, and how BlueCat’s platform can further enhance your network security.

5 Ways Big Failures Grow from Accumulated Small Ones
Network engineers believe that outages, when they happen, usually come from unexpected causes, because if a network outage can be predicted, it can be…

What is DNS poisoning (DNS spoofing) and how to prevent it
DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

What you missed at Move the Dial’s Global Summit
Last week, 2800 people gathered in Toronto for the #movethedial Global Summit. With the mission to advance the leadership and participation of all…

Ease your transition to IPv6 DNS
Moving to IPv6 DNS may seem daunting. If you’re making the jump to IPv6, BlueCat’s platform is ready to help cushion your landing.

The key to successful security programs? Look to your business
Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.

Announcing ServiceNow Integration
We are announcing native integration with ServiceNow. ServiceNow is a software-as-a-service provider of IT service management. Indeni users can now leverage…

Service Points for Secure, Automated, Resilient Networks
Play video Remember when brick and mortar banks were the only option? It was pretty inconvenient. Now ATMs provide access to services everywhere at a…

5 Foundational Parts of a Cybersecurity Toolkit
Know the right combination of tools in each layer to strengthen your cybersecurity posture, and understand how DNS plays a part in it all.

DoD’s JEDI cloud contract is awarded. Now what?
Microsoft won DoD’s huge JEDI cloud contract (for now). BlueCat can help agencies prepare their networks for the coming migration to the cloud.

Tech Field Day 20: Everyone we’re psyched to see
Tech Field Day brings IT pros together each year. Here’s who we’re psyched to meet (or see again–which is even sweeter) at this year’s event.

3 Takeaways from the “DNS over HTTPS and Beyond” Webinar with Paul Vixie
Insights include the power of DNS, the challenges businesses face today, and the controversial DNS over HTTPS (and what it means for enterprises).

Adaptive DNS Video
How does DNS impact your digital transformation plans?

DNS over HTTPS: what, why, and who cares
Encrypting DNS queries and responses over HTTPS has long sparked robust debate, with interest from numerous stakeholders. Learn more with BlueCat.

Real Visibility Doesn’t Require Reaching for the Stars
Visibility has always been key to situational awareness. Imagine navigating the open ocean based on what stars could be seen, and where they were in the…

Paying it forward with BlueCat’s referral program
If you’re more concerned with a career than a job, just any role won’t do. You’re taking into consideration a company culture and growth…

Using BlueCat Adaptive DNS in the Cloud
This whitepaper describes the challenges that hybrid cloud presents for network teams, specifically related DNS, DHCP, and IP address management (DDI).

DNS Over HTTPS and Beyond: The Technology Leader’s Guide to DNS in the Enterprise
Play video In this webinar, Paul Vixie (CEO, Farsight Security) & Andrew Wertkin (Chief Strategy Officer, BlueCat) sat down for an hour to talk about…

Spot the DNS Attack: Halloween Edition
Domain Name System (DNS) attacks are no doubt scary. They interfere with your connection to the internet, invade your privacy, and cause lost productivity.…

Why Security Infrastructure Automation Needs Humans (And Vice Versa)
Calling something “autonomous” implies that it operates without human input. That’s a misguided notion. Take, for example, security infrastructure…

6 DNS Horror Stories that will Spook Your IT Team this Halloween
Working with DNS can be spooky. Here are 6 DNS horror stories to enjoy this Halloween, coming from IT teams just like yours.

How one BlueCat is contributing to the cybersecurity community
We know every October is Cybersecurity Awareness Month. Companies remind us how to spot phishing emails and create better passwords. The media tells us how…

IPv6 cheat-sheet, part 3: IPv6 multicast
Many IPv6 multicast addresses are well-known to software implementing IPv6, to simplify common routing needs.

Implementing Security Solutions to Support Your Business? Don’t Overlook These 3 Factors
In cybersecurity, a dangerous disconnect exists between what people think they know and what they actually know. Consider…

BlueCat Becomes Move The Dial Corporate Partner
BlueCat partners with Move The Dial to promote gender equality. Here’s what the partnership means and how you can support it.

DNS migration: Moving from homegrown BIND DNS to the BlueCat Adaptive DNS solution
In two recent posts, we talked about the operational downsides of homegrown BIND DNS infrastructures, and how it can stand in the way of digital…

How Security Infrastructure Automation Is Revolutionizing Cybersecurity
Cybersecurity is a top priority for organizations due to its increasingly important financial and public-facing ramifications. Experts predict…

How Brooklyn Nine-Nine S6E14 got cybersecurity all wrong
Brooklyn Nine-Nine’s writers have a great cybersecurity vocabulary, but not a great understanding of how cybersecurity works. BlueCat breaks it down.

New Feature: Knowledge Request
Indeni is pleased to announce starting October 2019 customers have a new simple method to request development of Indeni automation elements (Auto-Detect and…

How homegrown BIND DNS drags down digital transformation
BIND DNS is fine for small enterprises, but when things start to scale and become complex, a different feature set is required.

Best Firewalls of 2019 Reviewed
Both business owners and at-home computer users alike often make the mistake of assuming all firewalls are the same, when it actuality, this couldn’t be…

What Is Missing From Your Security Operations Strategy?
Countless companies consider cybersecurity a standalone issue. They view it as a task relegated for IT or a comparable department. Unfortunately,…

A Guide to Firewall Security in 2019
It’s no secret that firewall security is important. The online world is advancing at a record-breaking pace. And while the progress being made allows…

When to replace BIND DNS
BIND DNS is fine for small enterprises, but as networks grow it gets very complicated and costly to manage. Here’s when to replace BIND DNS.

Security Infrastructure Automation Transforms IT From Expense to Investment
Maintaining forward business momentum hinges on properly managing information and processes. Businesses unable to secure their infrastructure technology see…

Adapt 2.0: BlueCat’s Virtual User Group
What brings together network IT professionals from America, Canada, Germany, and Switzerland? Hint: it’s not a network outage. BlueCat has hosted user…

The community-powered advantage for your organization
Embracing open-source software and taking a community-powered approach to development can result in speed and agility. Learn more with BlueCat.

BlueCat Unveils New Intelligent Automation
BlueCat Gateway reduces risk of costly errors and network outages, speeds up service delivery and cloud provisioning, and fuels business performance.…

How to know if Internet of Things will break your network
Yesterday I spent some time with a new customer of ours, a Fortune 500 communications company. They are essentially the network over which a variety of…

Cloud DNS: Taming complexity in hybrid cloud
Public clouds handle their own DDI. But problems arise when applications have to access data or services through the native DDI of multiple environments.

3 Examples of Security Infrastructure Automation in Action
Prioritizing cybersecurity and security operations can feel like an overwhelming obligation for organizations. As threats continue to evolve and become more…

BlueCat Wins HR Awards’ Best Workplace Culture Award
On September 12, 2019, BlueCat proudly accepted the Ultimate Software Award for Best Workplace Culture. This is the second distinction we were awarded this…

BlueCat’s Cheryl Kerrigan Advises on the Human Element of Cybersecurity
Cheryl Kerrigan, discusses the importance of communication, soft skills and healthy employee cultures in modern cybersecurity companies.

BlueCat Joins Encrypted DNS Deployment Initiative
Participation is voluntary, and all participants agree to read and abide by the legal & privacy policies.

BlueCat Named a Best Workplace in Technology 2019
Great Place to Work® is pleased to announce the 2019 list of Best Workplaces™ in Technology. T

Canadian HR Award Winners Announced
The winners of the 2019 Canadian HR Awards were announced last night in front of 950 of the country’s top HR leaders at the Beanfield Centre in Toronto.

Your IP address spreadsheet: A network menace
Are you still using a spreadsheet to manage IP addresses? IPAM is the only way to achieve secure, transparent, and efficient network management.

Building PAN-OS Air Traffic Control
This blog post gives a high-level overview of Indeni’s “Air Traffic Control for your NGFW” webinar. You can access the recording here and accompanying…

Cloud DNS: Securing complex hybrid environments
Managing security across hybrid cloud environments is a complex mess when the security team lacks visibility into cloud activity. Here’s how DNS helps.

BlueCat Named One of the Best Workplaces in Technology for Third Year
BlueCat has been named one of the Best Workplaces in Technology for the third year in a row! What makes working here so awesome? Check out these 3 things.

DNS automation: Simplifying the transition between GitLab and production
Moving automation workflows from development and testing labs into the production phase usually involves some administrative hassle.¬† Here’s how we fix…

How to choose the right DNS firewall for your network
Threat feeds, network integration, deployment, and placement are all critical aspects to consider when looking for the right DNS firewall. BlueCat can help.

Gartner Catalyst 2019: Forest Rangers, Cost-Driven Cloud, & Other Takeaways
BlueCat’s round up of significant topics (especially cloud-related) that dominated Gartner’s flagship tech conference.

Cloud DNS: IP address provisioning without compromise
Cloud IP address provisioning can pose systemic risks when done without knowledge of the network team. Here’s how BlueCat eliminates that risk.

BlueCat-Cisco DNS Defense integration
BlueCat and Cisco have teamed up to offer comprehensive DNS security which touches every part of the enterprise.

Making Network Automation Work for You | Audit Log Info & Bulk Record Export
Play video In this episode, we take you through the powerful audit log information and bulk record export features that come out-of-the-box with Intelligent…

Bolster DNS security with BlueCat and Cisco DNS Defense
Working together, BlueCat and Cisco Umbrella extend the breadth and depth of domain name system security across the enterprise.

Secure BlueCat root access credentials with CyberArk
Root access is much sought after as a feature of DDI management solutions. How to protect those credentials? With BlueCat and CyberArk, of course.

Cloud DNS: Addressing the visibility challenge
If your network team can’t see what’s happening in the cloud, you’ve got a serious challenge. Time for a DDI system that works in all environments.

Going for FedRAMP? Make DNSSEC a quick win.
DNSSEC is a key requirement of the FedRAMP and CMMC authorization process, as any 3PAO will tell you. Here’s how to make compliance quick and easy.

BlueCat Announces Executive Leadership Team Expansion
TORONTO, ON—August 6, 2019—BlueCat, the leader in Adaptive DNS™, today announced an expansion of its executive team. Andrew Wertkin has been appointed…

For IT Leaders: Four Strategies for a Successful Start in Network Automation
As the pace of business increases, CEOs are looking to IT to leverage technology differently and scale operations. As Gartner’s eBook “Jump-Start…

Delivering from the Ground Up: Leveraging Core Infrastructure to Build Innovative IT Solutions
Play video In this webinar, you’ll learn:

Looking for an IPAM solution? There’s something you should know.
IPAM tools alone do not solve the underlying issues with decentralized network infrastructure systems such as Microsoft DNS and BIND.

The Future of DNS: Privacy, DoT & DoH
In the first episode of ‘The Future of DNS’ series, BlueCat CTO Andrew Wertkin explores DNS privacy and the role that DoT and DoH can play.

BlueCat adds Nutanix AHV to its VM deployment options
BlueCat now offers Virtual Machine deployments of its Adaptive DNS solutions on Nutanix AHV – a demonstration of our expanding implementation options.

How to Troubleshoot Check Point Firewall VPN Connection
Looking for a step by step guide on how to troubleshoot a VPN connection for Check Point Firewalls? Read Johnathan Browall’s detailed post with pictures…

Eight Ways to Tell if You’re Mr. DNS
There’s a special breed of network administrators out there. They go by many names: Mr. DNS, DNS Queen, the Doctor of DNS. The list goes on but one thing…

Case Study: U.S. Logistics Company
Read the case study on a private US logistics company using BlueCat Integrity and Edge solutions for core DNS functionality and security.

BlueCat Infrastructure Deployment
This whitepaper covers the common questions and trade-offs network administrators face when deploying DNS and DHCP resources.

DNS Edge and CDM BOUND-F
This brochure outlines the unique approach of BlueCat’s DNS Edge to the requirements of CDM Phase 3 BOUND-F.

Making Gateway Work For You | Workflows
Session 7: Explore the development process behind BlueCat’s Gateway workflow on GitHub and learn how you can easily manipulate them to suit your needs.

Effective network security starts with internal DNS
Internal queries (which are invisible to boundary-facing firewalls) compose 60% of all network traffic. The solution is internal DNS security.

Which top-level domains to block and how to do it right
Identifying malicious top-level domains to block is easy enough. But you can take it further with BlueCat to spot devices querying bad TLDs to begin with.

Banish network downtime with DNS high availability
If you have just one DNS server, what happens if it fails? Four avenues to DNS high availability are the key to a redundant and resilient network.

We are Launching a New Versioning Scheme
We are announcing that we are switching to a different versioning scheme along with quarterly releases. Moving to this new scheme displays our commitment to…

BlueCat’s Cisco Live 2019 adventures
BlueCat unveiled Adaptive DNS as the future of networking, talked about intent-based networking, and demoed its integration with Cisco DNA Center at Cisco…

5 Secrets DNS Can Uncover About Your Network
Play video “If you can’t see it, you can’t control. If you can’t control it, you can’t secure it.” Having blind…

Spring Release: 9.1 Integrity Webinar
In our 9.1 Spring Release, we’ll address a number of challenges to ensure optimal ROI of your BlueCat investment.

What BlueCat brings to CDM Phase 3
BlueCat is part of the CDM Phase 3 BOUND offering. Our DNS security system offers unique value which goes beyond standard filters and firewalls.

BlueCat’s Adaptive DNS Platform Helps IT Teams Extend, Secure, and Automate Hybrid Networks
The platform enables a new approach to tackling complexity at the network edge, driven by cloud, DevOps, and security demands. TORONTO, ON–June…

BlueCat CTO on Packet Pushers: Moving beyond mere DDI
How DNS can play a role in creating the fully integrated, orchestrated, flexible networks we all want.

Simplify network management with the BlueCat Cisco DNA Center integration
BlueCat has teamed up with Cisco to deliver simplified network management through an integration with DNA Center, Cisco’s intent-based networking tool.

Intent-based networking 101
What is intent-based networking? Intent-based networking (IBN) is a model designed to leverage the power of automation and software-defined networking in…

BlueCat integration with Cisco Application Centric Infrastructure
Increased visibility and automation for data center networks

Keep Traffic Moving: Lessons from the TSA.
What is Operations Assurance? Picture an airport. TSA has two important jobs. The most visible job of TSA is to detect and block questionable…

Making Gateway Work For You | ITSM Integration
Session 6: Integrate Gateway with your ITSM or ticketing system to get more done, and learn about common use cases and BlueCat’s ServiceNow integration.

Mythbusting Active Directory DNS integration
Active Directory DNS is a must, but it doesn’t have to be paired with Microsoft DNS. Learn how easy it is to migrate to BlueCat in Active Directory.

BlueCat Named on 2019 List of Best Workplaces for Mental Wellness
BlueCat is proud to be named on the 2019 list of Best Workplaces™ for Mental Wellness. This announcement follows Great Place to Work naming BlueCat on the…

Automating DHCP reservations at a U.S. government agency
BlueCat worked with a large U.S. government agency to bring automation to a task they perform over and over, all day long: DHCP reservations.

DNS Flex: BlueCat Platform
BlueCat brings all of your DNS, DHCP, and IPAM data under one roof. With BlueCat, your network team has the visibility, control, and functionality it needs…

A new model for securing deployments of DNS Edge
At BlueCat, we’ve recently taken steps to become more reliable in our deployment model and more robust in our back-end security practices.

DNS Flex: BlueCat Expert
With over twenty years of experience in the business, BlueCat’s subject matter experts are the masters of DNS.

Case Study: DNS data identifies network performance issues
In this case study, we see how DNS data provides critical clues to identifying and mitigating network performance issues.

Attack lessons: Shared responsibility and the cyber kill chain
Dr. Josephine Wolff joins BlueCat’s Andrew Wertkin to dissect significant cybersecurity attacks from the last decade and what we can learn from them.

My Automation Journey Part 4: Data Models and Templates
BlueCat invited John Capobianco, author of “Automate Your Network: Introducing the Modern Approach to Enterprise Network Management” to walk us through…

Making Gateway Work For You | Better Self-Service
Session 5: Implement automated self-service tasks in Gateway that are simplified down to a single screen from start to finish, and verify end results.

What is DNSSEC and how does it work?
DNSSEC authenticates DNS queries and responses by using cryptographic digital signatures. Learn more and how BlueCat can help to make implementation easier.

My Network Automation Journey, Part 3: Modernizing the Network Development Toolkit
In part three of our network automation blog series, we dive into the network tools which can improve the speed and agility of coding.

Great Place to Work™ names BlueCat 24th Best Workplace in Canada
BlueCat is proud to be named the 24th Best Workplace in Canada for 2019. Great Place to Work™ has recognized us for the third year with…

Lessons from the Aftermath
BlueCat’s CTO, Andrew Wertkin is joined by cybersecurity expert and author Josephine Wolff to dissect some of the significant cyberattacks from the last…

My Automation Journey, Part 2: Building in Ansible and Initial Impact
In part two of this blog series, we discuss getting started with Ansible playbooks and take a look ahead at the role of DNS.

Palo Alto Networks PAN-OS upgrades after a vulnerability announcement
Deployment Trends Case Study On March 20th, 2019, approximately 1 month before this post, Palo Alto Networks announced two security vulnerabilities, with a…

BlueCat Kick-Off 2020: Here We Go!
On a sunny morning in downtown Toronto, over 500 smiling faces made their way to the TIFF Bell Lightbox. The aroma of coffee and pastries couldn’t compete…

My Network Automation Journey, Part 1: Frameworks and Goals
Successful implementation of network automation requires planning, clear goals, and a strong deployment strategy. Blog series part 1: plans and goals.

10 Things I Learned about DNS in my First 30 Days at BlueCat
Hi there! I’m Jadecy Huynh, BlueCat’s new Marketing Content Manager. When I joined BlueCat a short month ago, I knew almost nothing about DNS. As…

Global Enterprises Reach DNS Modernization Tipping Point as Migration to the Cloud Accelerates
BlueCat announces record fiscal year results as footprint in large organizations expands.

DNS Security: Canadian Government Recommends a DNS Firewall
The Canadian government helps organizations take on cybersecurity. With BlueCat DNS Edge, organizations can maximize their security investments.

BlueCat and Axonius Provide a New Level of Visibility into Network Devices and Activity
BlueCat and Axonius have teamed up to provide visibility into network devices which can only be detected through DNS traffic.

Un-disrupt the Cloud Disruption
Cloud initiatives are great for end-users, but a nightmare for network administrators who have to deal with the DNS consequences.

DNS is the secret to next-level network automation
Reliable, easy, and secure network automation includes DNS. Learn how to reduce your IT team’s burden by fully automating your network and DNS back end.

6 Tips from Network Security Professionals to Re-Ignite Your Career
We all have moments when work-life balance collapses. Time fire-fighting takes over time dedicated for more meaningful work. Whether you’re beginning in…

BlueCat turns to open source collaboration to help customers automate infrastructure
BlueCat CTO Andrew Wertkin shares the vendor’s GitHub repositories.

DNS automation: Scheduling tasks using Gateway and Rundeck
Rundeck, an open-source scheduling platform, easily integrates with Gateway using our plug-in available on GitHub. With Rundeck and Gateway, you can create…

Making Gateway Work For You | Reporting
Session 4: Learn how to generate customized reports with Gateway that leverage data from BlueCat and from third-party IT service management tools.

How These Technology Mavens Fell Into the World of IT
Neither Judith Hurwitz or Kelly Shortridge set out to become IT leaders. But that’s exactly what they did. Maybe you’ve read one of Judith Hurwitz’s…

Indeni Complements Your Monitoring Solution for Palo Alto Networks Firewalls
Five Reasons why enterprises deploy Indeni with their existing monitoring solutions. 1. Automate High Availability readiness checks Proactively automate…

Get a handle on your conditional forwarder DNS rules
Conditional forwarder DNS rules are hard to manage at scale in the cloud. Learn how BlueCat’s centralized and automated DNS platform can help.

Case study: Major financial institution
BlueCat helped a major financial institution upgrade from VitalQIP to a modern, fully supported DDI solution.

Case Study: U.S. Government Laboratory
A U.S. Department of Energy laboratory complex approached BlueCat to centralize and automate their network to support collaboration among scientists…

Case Study: Medical Technology Company
Global medical technology company turns to BlueCat and significantly reduces their operating costs through the power of network automation.

Manageable Migrations II
Changing DNS vendors is daunting…to say the least. Often, the risks associated with managing the migration can undermine even the strongest business case…

Indeni 6.5.3 is now generally available
We know you rely on Indeni to notify you of important events relating to your infrastructure. Today, we have added a few enhancements to help you get on top…

Making Gateway Work For You | Scheduling
Session 3: Explore the integration between Gateway and Rundeck and learn how to automate scheduling reports and easily change and revert IP objects.

Network & Security Automation: When the Lego blocks don’t fit
Who doesn’t love playing with Lego blocks? Colorful blocks of different shapes and sizes, all fitting so nicely together thanks to “the…

DNS Edge: Our First 2019 Release (We’re just getting warmed up)
The polar vortex may have cooled things down, but BlueCat DNS Edge is getting warmed up. We just kicked off the first 2019 release, providing customers…

Protecting Your Data Migration
With BlueCat’s Intelligent DNS, you can protect against downtime by controlling the DNS resolution path.

DNS automation: Add multiple DNS entries with Gateway
Gateway is BlueCat’s application for creating custom workflows to automate common tasks, reducing day-to-day manual effort. Learn how to save time with…

How DNS reduces network complexity
Intelligent Networking eliminates the need for complicated forwarding rules and duplicate name records by controlling resolution pathways through DNS.

Reduce attack surfaces with DNS
In this video, learn how to reduce your attack surface with BlueCat DNS Edge by setting client-level policies and locking down single-use devices.

Integrate BlueCat, Cisco ACI, and Cisco DNA to save time and promote data integrity
BlueCat integrates with Cisco ACI and Cisco DNA center to simplify DDI connections with your entire network stack.

Making Gateway Work For You | Bulk Importing
Session 2: Optimize bulk importing with Gateway and learn how to write logic to resolve conflicts, address dependencies, and clean up data as it loads.

DNS Flag Day: Guidance for BlueCat Users
BlueCat is fully prepared for DNS Flag Day. BlueCat DNS Servers (both DNS Integrity and DNS Edge) will continue to function as normal.

DNS Solutions in 2019: From Breaking Point to Tipping Point
BlueCat is focused on delivering value to our customers and enabling their strategic initiatives through DNS. Here’s what we‚Äôll be focused on this…

Forensic investigation using DNS for faster incident response
In this video, learn how BlueCat DNS Edge provides investigative insight and faster responses for security breaches and helps reduce attack surfaces.

Reduce network complexity
Eliminate the need for complicated forwarding rules and duplicate name records by controlling resolution pathways. DNS Edge finds the right pathway by…

Cloud cybersecurity is a joint responsibility
Atlanta moved more of its enterprise to the cloud after a major ransomware attack. But simply moving to the cloud isn’t a cybersecurity strategy in and of…

DNS Automation: Getting Started with Gateway
Need help with the first steps in automating your DNS management system? Look no further – here’s a helpful guide to get you started.

BlueCat’s Hackathon: The Coolest Projects Of The Year
BlueCat’s annual Hackathon event is back and these are the coolest projects of the year. Check out the winning team’s projects here.

Can DNS finally secure government contractor networks?
Contractors present a cybersecurity risk to government agencies. Contracting language has failed to bring contractor networks up to par. Can DNS?

Al Rasheed: DNS is a Chump
BlueCat Networks kicked off #NFD19 as part of Tech Field Day.


Schedule workflows with Rundeck integration
BlueCat’s Gateway platform for automation now integrates with Rundeck, allowing users to schedule standard DNS automation workflows.

Indeni 6.4.9 is now generally available
We have added audit log to give you visibility to who has changed what, where and when. We have made changes to help you create reports like device health…

Making Gateway Work For You | Getting Started
Session 1: Learn to install Gateway from Docker, set it up, import our customizable workflow templates from GitHub, and put self-service within reach.

DNS Automation: Internet breakout and SD-WAN domains
All the modular layers of today’s corporate networks – clouds, data centers, branch office connections, and SD-WAN controllers – have their role to…

DNS Automation: Host records and selective deployment
Manual addition of host records to DNS can take a lot of time. That’s why BlueCat automated it, saving administrators a ton of time.

Three Cloud Migration Myths Putting Organizations at Risk
IT teams make a lot of assumptions about network infrastructure when they’re migrating to the cloud. We dispel some of the myths about cloud DNS.

Swisslos automates field operations using the BlueCat API
Swisslos streamlined IP address management on a complex network through the BlueCat API, saving tons of developer time and resources.

Case Study: Swisslos
The Customer Swisslos is one of two Swiss lottery companies. Based in Basel, it provides the German- and Italian-speaking parts of Switzerland (as well as…

Simplified Installation with Gateway 18.10.1
Automating your DNS infrastructure has never been easier. In this video, we run through how to obtain Gateway through quay.io and install it through a…

Live Demo of BlueCat Gateway 18.10.1
Automating your DNS infrastructure has never been easier. This video shows how DNS Gateway simplifies the automation of standard DNS tasks such as adding…

What’s New in BlueCat Gateway 18.10.1
What’s new in BlueCat Gateway?

DNS Edge November Release: Insights, Fleet Management, Native Threat Protection
The November release of DNS Edge has some amazing new features, including insights, fleet management, and native threat protection

Intelligent Forwarding
BlueCat’s intelligent DNS simplifies DNS management across environments, reduces complexity, and avoids costly errors.

Disrupting DDI @ Networking Field Day (In Tweets)
As first-time Networking Field Day presenters, the BlueCat team was thrilled to discuss the future of DDI (hint: it’s cloudy, plus a 100% chance of…

Why DNS is sexy again
DNS has evolved beyond mere infrastructure. Now it’s a business enabler which touches every part of the enterprise and every business initiative.

Why you should pay attention to DNS tunneling
DNS tunneling transmits information through the protocol that usually resolves network addresses. Your DNS data can provide clues to help keep it at bay.

Indeni Feature: Custom Reports
What does Custom Report do? Custom Report lets you create reports where you choose which dimensions should be displayed. This gives you insights into the…

The value of DNS response data for securing your network
Logging a DNS query only tells a fraction of the story. With Intelligent Security, we’ve changed the paradigm by logging DNS responses as well, uncovering…

Secure, cloud-managed network services through DNS
DNS can be a major headache in the cloud, but it doesn’t have to be. When centrally managed with tools for intelligent routing, DNS can be an asset.

Growing Our Network (The Other Kind) – Networking Field Day 19
Block your calendars for 10 am PST/1 pm EST as our team of experts will dissect the future of DNS at length with these forward thinkers.

Domain Name System (DNS): It works, so why change?
If your Domain Name System (DNS) seems to work, why would you change to anything else? Actually, there are plenty of reasons.

Five reasons why BlueCat is your best bet for DNS
I’m going to give you five reasons why BlueCat is your best bet for DNS. Without further ado (or a fluffy intro)… 1. Customers have voted, and…

What I learned from SecTOR
BlueCat attended Canada’s Premiere IT Security Conference SecTor in Toronto. Here are some of the important takeaways.

10 things you can do with BlueCat’s API
We have 10 ideas for DNS automation and integration with other systems using BlueCat’s API. And BlueCat’s Gateway platform makes it easy to build and…

BlueCat Gateway: A modern development platform for automating DNS operations
A modern development platform for automating DNS operations

Data Communication Platform Comparison: Apache Kafka vs. RabbitMQ vs. REST API
Before finalizing any major platform decision it is well known that extensive research must be conducted. This post highlights the process we went through…

Is Virginia’s DNS ready for a move to the cloud?
As the Commonwealth of Virginia moves to the cloud, learn how centralized and automated DNS is essential to their cloud migration strategy.

BlueCat: Best Workplaces™ for Millennials
Best Workplaces™ has named BlueCat as one of the Best Workplaces for Millennials 2018 in Canada. Why is BlueCat so great for millenials? Read on!

DNS Automation: BlueCat Gateway meets Modern DDI Automation Demands
BlueCat Gateway powers our customers with simplified and self-serviced DNS management through automation. With new updates this month, we’ve made it better!

Is your cyber “Great Wall” really just a Maginot Line?
Perimeter defenses are more likely to end up with a great wall that looks impressive but which is easily skirted by malicious actors.

BlueCat DNS Integrity & Gateway Fall Release Preview
We’re really excited about the new versions of DNS Integrity and Gateway coming in Fall 2018. We’re introducing significant new features and improvements…

A giant leap for BlueCat Integrity
The release of Integrity 9.0 improves hybrid cloud and automation support, enhances reliability and visibility, boosts security, and simplifies upgrades.

Announcing Symantec Blue Coat ProxySG Support
We are announcing support for Symantec Blue Coat ProxySG physical and virtual appliances. Kudos and credits are due to our Expert community for developing,…

Indeni Insight is Coming. Your Questions Answered.
Indeni Insight mandatory starting January 1st 2019 As of January 1st 2019, Indeni Insight will be mandatory in every Indeni installation. As an Indeni…

Network Demo #1 Edge Can Reduce Complexity
Conditional forwarders are a major pain for network administrators, particularly in hybrid cloud environments. Here’s how BlueCat simplifies matters.

How Internal Dysfunction is Putting Your Network at Risk
In a recent report by IDG, it was found that 86% of organizations have suffered repercussions, including increased security breaches and data loss, due to…

Fortigate’s FortiDDoS Review
DDoS attacks are becoming a plague for companies that rely on the Internet to operate their business. Scripts to operate a DDoS attack are easily accessible…

Checkpoint DDoS Protector Overview
Imagine this: You are sitting in your office thinking about your next project when a bunch of alarming emails and SMS messages ruins your day? While…

Network vs Cybersecurity: Can’t We All Just Get Along?
Network and cybersecurity professionals are struggling to collaborate, and everyone is feeling the consequences. We explore what exactly is bothering them.

Ignore DNS at your Peril
When organizations don’t leverage the power of DNS, they’re missing out on network security, visibility, etc. How can we convince executives they need DNS?

5 reasons why your business needs to leverage DNS
Get the highlights of “A Busy IT Executive’s Guide to Leveraging DNS,” a webinar with Mathew Chase on how some ignore DNS at their own peril.

Indeni Sponsors AnsibleFest 2018
The automation titans will be under one roof this October when Indeni sponsors AnsibleFest 2018. Here at Indeni, we are as eager to dive into a whole range…

DNS Edge: Addressing GAO’s “High Risk” Cybersecurity Findings
As cybersecurity risks increase, experts are beginning to think of strong solutions that can tackle many aspects of security at once. DNS is one of them.

Edge Product Update: Navigation ease, Reduce Attack Surface, and Anycast Support
The latest DNS Edge product update is now here! This post summarizes all of the exciting new features contained in this new release. Check it out!

How to Prove an Outage is Not Caused By the Firewall
Source We all know it. The Firewall is the scapegoat of the IT infrastructure stack. When something goes awry with the network, the firewall is the first…

September Member of the Month: Rahul Tiwari
Every month we like to showcase one of the many outstanding members of our Indeni Crowd Community. I’m delighted to announce Rahul Tiwari as September’s…

BlueCat: Among 2018 Best Workplaces™ in Technology
We’re happy to announce that we’ve made the list for Best Workplaces™ in Technology for 2018! Read on & find out why our company culture is one of the…

Network vs Cybersecurity: It’s Time to Come Together
A lack of collabortion between network and cybersecurity teams can seriously cost your business. The good news is, the solution is closer than you’d think.

The Cost of Dysfunction Between Network and Cybersecurity Teams
86% of U.S. and Canadian network and cybersecurity professionals admit to suffering outages, breaches, and more due to internal dysfunction.

Working as an Intern at BlueCat Networks
This post was written by Nathaniel Paquin, one of our past co-op students who recently graduated from the BlueCat Program – we wish him all the best in…

Four places where DNS automation is vital
Automating DNS is essential to overall IT automation efforts. Learn about four areas where DNS automation is vital and how BlueCat can help.

Palo Alto Networks Advanced Administration Tips
Introduction The Palo Alto Networks next-generation firewalls are a part of a security platform that provides a plethora of configuration options within its…

VitalQIP Migration: One Customer’s Experience
Recently, BlueCat hosted a half day summit where we invited several VitalQIP customers to discuss their migration strategies and goals. In order to make the…

Reduce the signal to noise ratio for issues up to 75%
IT operations are often experiencing alert fatigue as the influx of issues can be overwhelming. To alleviate this problem, we are introducing a new feature…

Busy IT Executive’s Guide to Leveraging DNS
Seasoned technology executive Mathew Chase and BlueCat’s Jim Williams discuss what separates technology leaders from their DNS and questions leaders can…

DNS and the Cybersecurity Requirements for Lotteries
Lotteries fit into the same specialized cybersecurity category as banks, casinos and financial institutions. All four deal with tremendous amounts of…

DNS as the Foundation of Shared Services
DNS is not only a key foundation of shared IT services, but also delivers the functionality which makes those shared services thrive. 

Keep Your Network Neat and Tidy with Automatic System Labels
Labels are a way to group your devices making it easier to manage your devices and saving time when you are changing thresholds, backing up devices, viewing…

The 3 Sides of a Successful VitalQIP Migration
Changes are underway – many customers of VitalQIP are now looking to find a new centrally managed DNS platform to suit their specific business needs.…

What We Learned at DODIIS
Another fantastic DODIIS conference is in the books, and BlueCat learned a ton about how DNS plays into the strategic priorities of the defense and…

Preparing for the Gradual JEDI Revolution at DOD
The final JEDI RFP has been released, and DOD agencies should start to think about how they are going to use cloud resources in their day-to-day…

How DNS stops cryptojacking
DNS may be the most reliable way to detect and eliminate cryptojacking cybercrime at an enterprise level. Learn how BlueCat Edge can help.

Indeni 6.4 is Now Generally Available
We are very excited to announce that Indeni 6.4 is available for download. This release brings many valuable features including: Role-based Access Control…

On Complexity and Cybersecurity with Mathew Chase
You’re reading the Cybersecurity Spotlight series, where we profile leaders in security and their insights.

Critical Infrastructure is Under Cyber Threat – Can DNS Help?
The U.S. Department of Homeland Security (DHS) announced this week that it is creating a center to help private industry defend critical infrastructure.

Indeni Sponsors F5 Agility 2018
We’re excited to announce that Indeni is sponsoring this year’s F5 Agility conference. From August 13th to the 16th we’ll be trading in our Philz Mint…

Kaspersky Lab Software Gone? Think Again
Kaspersky Lab has been in the news a lot lately, due to a series of leaks alongside troubling revelations ‚Äì and new discoveries just keep on rolling…

A House Divided: Bridging the Gap Between Network and Security Team
Challenges in Network Team-Cybersecurity Team collaboration & how to overcome them, featuring Matthew Devost & ELEVI Associates, LLC founder Phil Puccio

The 3 Types of DNS Security
Cybersecurity professionals are starting to move beyond mere DNSSEC towards leveraging DNS data, as part of a layered protection strategy.

How Customers Use Check Point Firewalls Around the Globe
Ever wanted to know how Check Point firewallls are being used around the World? With indeni Insights, you can get a glimpse into that data 24/7. See how.

Hired a Network Engineer? Here Are 3 Things They Will Forget to Do
When you start a new job there are is a lot to learn. When you are a security engineer, the learning curve is especially steep. There are hundreds of…

DNS Edge July Release Enables Hybrid Cloud and More
BlueCat continues its commitment and support of cloud-based infrastructures by extending BlueCat DNS Edge™ visibility, control, and detection capabilities…

Automating Configuration Backup
One of the most important tasks of a network and security administrator is to backup the configuration files of your device periodically. Frequency could be…

Three User Groups, Three Chances to Reflect
As proud DNS geeks, doing our homework is something we’re quite accustomed to. Recently, we hosted three BlueCat User Groups in order to get to know our…

Announcing Exclusive Indeni Crowd Rewards
A favorite saying of ours here at Indeni is “we could all use a little help from our [expert] friends.” While that statement stands strong, Indeni Crowd…

What DOD Can Do Now to Prep for the JEDI Cloud
The JEDI program is a critical strategic investment for DOD – one that has strong leadership support. Now that the contract is awarded, are DOD agencies…

Palo Alto Networks Administration Basics
What is Palo Alto Networks? Palo Alto Networks next-generation firewalls (NGFW) are security devices that possess a range of capabilities to meet current…

DNSSEC vs DNS security: What’s the difference?
DNSSEC validates DNS queries and responses, while DNS security leverages DNS data to better secure your network. Learn how they’re different with BlueCat.

Making APIs Work for You (Part 8)
After introducing you to different deployment options and taking a deep dive into how deployments work with API, in the eighth installment of this webinar…

Expert Review of Runbook Templates
Runbook templates are used by operations teams to automate routine maintenance and respond to system alerts and outages. Infrastructure is changing so…

Palo Alto Networks CLI Tips
Welcome to the Palo Alto Networks Palo Alto Networks has created an excellent security ecosystem which includes cloud, perimeter/network edge, and endpoint…

DNS Security in Six Star Wars Memes
Are you a Star Wars fan? Here are six memes that accurately depict DNS security- can you relate?

Cisco Live Orlando: our key takeaways
Read up on BlueCat’s key takeaways from Cisco Live Orlando 2018, including the role DNS plays to bolster network security and detect threats.

Why Microsoft DNS Isn’t Appropriate for the JEDI Cloud
While Microsoft DNS may be functioning just fine, you‚Äôll soon find yourself running into problems if you use it for your cloud migration. Here’s why.

An Engineer’s Reflections – Ignite 2018
That’s a wrap folks! Yet another successful Palo Alto Networks Ignite conference made up of countless conversations and deep dives into Indeni’s…

BlueCat integrates with Cisco ACI to deliver enhanced visibility and centralized management
Built with BlueCat’s API and DNS automation platform, the integration allows for discovering and configuring endpoints discovered by Cisco ACI.

Onsite Ignite 2018 Survey: The Results Are In
Amidst the hustle and bustle of Indeni’s lively booth at Palo Alto Networks Ignite 2018 conference, research was underway. Indeni’s booth visitors were…

DNS Integrity: The Need for Speed
This past month we’ve released new versions of our DNS Integrity™ solutions that are all about empowering our customers to automate their…

BlueCat’s Declassified Cisco Survival Guide
Heading to Cisco Live? Read our helpful guide to have the best experience possible. While you’re there, come stop by booth #1919 to say hi!

Key Takeaways: Gartner Security and Risk Management Summit
At our recent visit to Gartner Security and Risk Management Summit 2018, we gained some key insights into how the approach to cybersecurity is evolving:

JEDI will ease DOD’s FITARA woes, but when?
The latest FITARA scorecard released by the House Oversight Committee criticizes the Department of Defense yet again. Of the eight categories covered…

What DOD’s JEDI Cloud Contract Means for Your DNS
This is the second installment in a four-part series on the JEDI cloud. Come for the knowledge, stay for the Star Wars references.

BlueCat is part of the AWS Public Sector Partner Program
BlueCat is now part of the AWS Public Sector Partner Program. BlueCat’s DNS Integrity and Edge are seamlessly integrated with AWS.

Making APIs Work for You (Part 7)
After introducing you to error handling for API calls and taking a deep dive into advanced BAM reporting, in the seventh instalment of API services we will…

3 Reasons for Customers to Enable Indeni Insight
From day one, it was clear to us at Indeni that in order to make network and security operations easier, we needed to get everyone to work together.…

How to Prepare DNS Infrastructure for a JEDI Cloud Migration
The Department of Defense is about to award the JEDI contract ‚Äì and this means that agencies need to get ready for cloud migration. This episode…

Cybersecurity Spotlight: Matt Ahrens, Security Engineer at Coalition
This Cybersecurity Spotlight, Matt Ahrens, a security engineer for Coalition talks cybersecurity insurance coverage for small and medium businesses.

Make Point of Sale security a reality with DNS
Point-of-Sale systems are used to process a ton of customer transactions. But what happens when convenience gets in the way of security?

BlueCat DNS Edge Delivers Visibility and Control to Network and Cybersecurity Teams
With DNS exploit attacks surging, BlueCat releases new DNS security software that detects internal threats and secures vital assets. TORONTO – May 23,…

DNS Edge: Looking Back, and Looking Forward
It’s been just over one year since we released DNS Edge, BlueCat’s DNS-based security solution. We checked in with our CTO, Andrew Wertkin, to get his…

Where does Indeni fit in your environment?
We get it. The network and security software markets are difficult to navigate. There is an overwhelming list of technologies that you could use to…

We’ve just raised another $14M, here’s why
Today I’m excited to share that we have just closed another round of financing. The new investment, a total of $14M since our last funding announcement,…

BlueCat DNS Edge Solution Overview
In this video, you’ll get a high-level overview of how DNS Edge works, as well as its capabilities.

BlueCat DNS Edge
BlueCat DNS Edge leverages your existing DNS infrastructure to give you visibility, control, and detection capabilities to help protect sensitive data and…

New Indeni Feature: Centralized Authentication – LDAP
Many organizations have a central user account/role repository for managing their users and IT infrastructures. The directory is one of the most popular…

Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It
What happens when time pressures lead to development teams accessing rogue clouds? Here’s the lowdown on how IT visibility can protect your organization.

Making APIs Work for You (Part 6)
Play video After introducing you to the world of API and taking a deep dive into BAM for the IP spaces, in the sixth installment of API services we will be…

The Future of Network Automation
How to Move from Manual Operations to Self-driving IT It’s no secret that automation is entering IT, and specifically the network and security space. At…

Just Like Devices Need Software Upgrades, So Do Employees
Grow Your Talent From Within Through Certifications As your company transforms from a product to a platform, undergoes a merger and acquisition, or embarks…

BlueCat: Best Workplaces™ in Canada
This past year has been extremely exciting for BlueCat, from our swanky new Toronto headquarters to our latest executive appointments, we are…

A Smart, Secure Approach To Smart Cities
Smart cities will soon become essential. But without a plan that accounts for both infrastructure capacity and security, investments can easily go awry.

BlueCat Appoints CFO and VP of Corporate and Business Development
BlueCat, the leading provider of Adaptive DNS, today announced the appointment of Stephen Devito as Chief Financial Officer and Gautam Nadella as Vice…

Do you trust this [network] computer
How to set AI and Machine Learning up for Success in Enterprise Networks A documentary titled “Do You Trust This Computer?” was recently released, and…

On Hackers in Hoodies With Sean Plankey
You’re reading the Cybersecurity Spotlight series, where we profile leaders in security and their insights.

“It’s Not Our Product. It’s Our People”: BlueCat’s Secret to Success
If you dive deep into what’s at the heart of BlueCat’s success, you’ll realize that you’re asking the wrong question. The real question is who.

Network Programming Tips for Beginners
As we already wrote, the results of a survey conducted by our team show that network scripting and automation still aren’t the number one priority in the…

How to write reusable scripts with Junos OS
The purpose of this article is not to show you all the things that you can accomplish using Python libraries or how to write scripts in Python or any other…

BlueCat Rolls Out First DNS Management Platform on AWS GovCloud
BlueCat is pleased to announce that its Adaptive DNS management platform is now the first AWS certified DNS management product in the AWS GovCloud region.

Indeni Listed as Semi-Finalist JVP Start-up Competition
Last week JVP hosted a competition for disruptive startups that are ready to scale their operations. Indeni was selected as a finalist! We are thrilled to…

How Can Collaboration Between Operations & Engineering Be Enhanced?
Increasing collaboration between various departments in an organization will help it become more agile. If disparate network administration and security…

Why You Need to Automate Your Business Operations
Automation has been a buzzword in business circles for decades now, and with good reason. Organizations are looking to cut costs and increase efficiency in…

Is an IP address PII? The answer is nuanced
‘Is an IP address PII’ is a question with real implications for network admins. Explore how countries approach it and what companies should do about it.

Handling Breaches at the Bureau: A Conversation with Supervisory Special Agent Elvis Chan
FBI Supervisory Special Agent Elvis Chan who manages a squad discusses how they investigate national cybersecurity incidents

Announcing Automation for Check Point Scalable Platform Appliances: 41000 and 61000
When we work with a company who has Check Point 41000 and 61000 Security Systems chassis as part of their security infrastructure, we know we are dealing…

Announcing New Knowledge for Check Point GAiA Embedded
You may find a Check Point firewall running GAiA Embedded in any size organization, however they are most commonly seen and used in branch offices or even…

IPv6 DDoS attack is a warning to protect your network
The first IPv6 DDoS attack surfaced in 2018. While IPv6 is more secure than IPv4, if bad actors want to attack your network, they will find a way.

Why is Automated Provisioning last on the Priority List?
The importance of provisioning network and security resources is often times overlooked. In the course of moving Data Centers from bare-metal infrastructure…

Which Network Administration Areas Do Organizations Have Skill Gaps?
The nature of threats facing networks and data centers has been changing rapidly over the recent past and security infrastructure has been forced to evolve…

Cybersecurity Spotlight: Jeremy Conway, MAD Security
At BlueCat, we freely admit that we are not deep experts in cybersecurity, and we are certainly not as knowledgeable as our customers who man the front…

How to optimize your workload with scripts
If you are thinking of expanding your network to support more clients, then you need to think about making your network more efficient and at the same time…

How to do Cisco NEXUS Automated provisioning
In this article we are going to discuss the automated provisioning options for NX-OS, their benefits and provide examples of useful provisioning scripts. We…

Two of the Most Common Mistakes Developing Scripts
When you are learning something new there are always periods of trial and error – especially when it comes to scripting. After taking Indeni Knowledge…

BlueCat DNS Edge Just Got More Powerful
The latest release of DNS Edge is now live and includes a number of new features like multi-namespace support for better routing, enhanced volumetric…

March Member of the Month: Sergei Chernooki
Self-starters are flooding into Indeni Crowd with a vengeance! These motivated individuals not only seek answers to immediate networking issues but also are…

Palo Alto Networks Runbook: Replacing a Dead Firewall
Check out all of our runbooks for Palo Alto here: The criticality involved in maintaining uptime of IT infrastructure has always been on top of priority.…

How to Become a DevOps Enabler
Are you striving to be a change agent? If yes, see below for a checklist of resources to help you on your journey of transforming IT to a secure, available…

Making APIs Work for You (Part 4)
Play video Community Specialist, Vivek Mistry, who will be taking you through our “Making APIs Work for You” Series. Today Vivek is going to focus on…

How Malicious Hackers are Competing for Notoriety at the 2018 Olympics
Over the past couple of weeks, all eyes have been on the athletes competing on the world’s biggest stage at the Winter Olympic Games.

Step into the Customer Portal: Getting the Most Out of BlueCat
Are you a BlueCat customer looking to get more out of your enterprise software?

How to automate security operations
Since you are interested in automating security operations, listen to this Intel Chip Chat with Indeni’s CEO, Yoni Leitersdorf. He discusses trends in…

APIs and data: The way to your IT organization’s heart
Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.

What is Network Automation?
It is very hard to keep up with technology trends, especially if you are a network or security professional. Networks are complex, and mistakes are an…

What we learned at Cisco Live Barcelona
Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.

2018 Network & Security Automation Survey Results Are In
We partnered with GNS3® on a survey with the intention of uncovering existing trends in the network and security automation space. We’re excited to…

[Infographic] 2018 Network & Security Automation Trends
Indeni and GNS3® partnered on a survey to uncover existing trends in the network and security automation space. We’re excited to announce that the…

The Age of Network Automation: Takeaways from our New York User Group
What do you get when you combine DNS experts from some of North America’s leading brands? A collection of insights that serve as a compass for the…

February Member of the Month: Arun David Johnson
Indeni Crowd attracts IT professionals from far and wide. For the month of February, we all take a virtual trip to India to congratulate Arun David Johnson…

Making APIs Work for You (Part 3)
Play video BlueCat APIs facilitate dynamic interaction with your network ecosystem that enable the rapid delivery of services while retaining complete…

Why Trust is the Real Target of Your Data Breach
As Dick Clarke reminded us in our recent webinar, the needs and concerns of today’s CISO are unique and ever-changing as we hear reports of a new data…

Network & Security Professionals Need DevOps
This is an excerpt of the Indeni How it Works Whitepaper. Read more by downloading here. Why Network & Security Professionals Need DevOps For the last…

Five events to check out at Cisco Live in Barcelona
Catch BlueCat at Cisco Live EMEA in Barcelona from Jan. 29 to Feb. 2, 2018, to learn about the power of Adaptive DNS, plus five things not to miss!

BlueCat named Stevie Awards finalist
BlueCat is a 2018 Stevie Awards finalist for Customer Service Department of the Year. The final winner is determined by public vote, so cast your vote for…

Splunk, DNS logs, and why DNS data matters
Interested in downloading DNS Edge for Splunk? Download it from Splunkbase.

Make Your Point of Sale System a Point of Security
As the biggest season in retail winds down, Forever 21 was the latest retail target of a point of sale cyber attack, joining the likes of Chipotle and Game…

Announcing Fortinet FortiGate Support
Indeni automation platform delivers a level of proactiveness that easily prevents IT outages. Check Point and Palo Alto Networks firewall users have been…

SNMP Errors: Go Beyond The Basics for SolarWinds© Orion© Users
SNMP based monitoring & Syslog from SolarWinds If you are a SolarWinds Orion user, you are enjoying the benefits of NPM for SNMP-based monitoring. With…

Announcing Juniper SRX Next Generation Firewall (NGFW) Support
Indeni’s automation platform did it again! We are proud to announce support forJuniper SRX series Next-Generation Firewalls. Kudos and credits are due to…

5 New Year’s resolutions to combat cyber attacks
What changes should we commit to this year to keep our networks safe? Here are five resolutions for the coming year, including leveraging DNS.

January Member of the Month: Adam Erickson
As we usher in 2018 with new year’s resolutions, we find a few individuals have been working towards betterment well before the ball dropped at…

Forwarding in vPC through FHRP backup
In this post, we will cover the benefits introduced by Virtual Port-Channel (vPC) for First Hop Redundancy Protocols (FHRP). Hot Standby Router Protocol…

Overview of Juniper Security Appliances
With the rapid growth in data traffic in the past decade and the rapid expansion of computer networks, the necessity for network security and stability has…

VXLAN with static ingress replication and multicast control plane
This is the first part of a series covering VXLAN on NEXUS devices. Various control-plane approaches will be covered. In this first part, unicast and…

VXLAN with MP-BGP EVPN control plane
This is the second part of a series covering VXLAN on NEXUS devices using Multi-Protocol BGP(MP-BGP) as control plane. The first part looked at unicast and…

Manipulating traffic with flow mode on Juniper SRX Series
Every experienced Network Engineer and System Administrator will agree with the fact that firewalls are an essential part of every network. The Juniper SRX…

Two can play at that game: Thinking like a malicious adversary
In this whiteboard session, learn how DNS is critical to your cybersecurity strategy and how to keep adversaries in mind when structuring your domains.

Firewall Most Requested Change – Copy Rule on one Host to Another Host
Oftentimes, firewall administrators get requests either to change something or add up a couple of rules to help get things moving around the network. The…

Juniper JunOS Upgrade Technical Instructions
Scope of this document This document describes the list of operations to perform to upgrade Juniper JunOS devices from release 11.4Rx.x and 12.1Xxx to…

Why the Cyber Threat Hunter Needs DNS
In our latest webinar in our cyber security series, we welcome Cyxtera Cyber Security Officer Chris Day.

How to See a Network Flow Through the CLI in a Checkpoint Firewall
If you want to check the traffic flowing through a Checkpoint firewall without using the SmartView Tracker, you can use “fw monitor” command. I will…

The Threat Hunter’s New Weapon: DNS Data
Chief Cybersecurity Officer for Cyxtera, Chris Day talks about the evolution of cybersecurity and rise of the threat hunter role.

November Member of the Month: Johnathan Browall Nordström
November represents a month of gratitude and there is one member who deserves an Indeni Crowd shout out. After completing countless challenges and…

Are You Ready for the NIST 800-171 Compliance Deadline?
With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.

3 Reasons to Tune in to “The Threat Hunter’s Newest Weapon: DNS Data”
This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS…

The iPhone X Face ID Hack and the Weapon of Curiosity
In the era of large-scale breaches and cybersecurity protocols, even on the most basic level, everything needs a password.

One To One NAT On Palo Alto Firewall For Access To Internal Untrusted Network
Many implementations use NAT to provide public internet access (untrust) from an internal private network (trust) considering address preservation and…

Making APIs Work for You (Part 2)
Part 2: Use APIs to get information from IP blocks, networks, and addresses, and learn how to search and filter data from BlueCat Address Manager.

When Was the Last Time You Trusted Anything Free?
Let’s say you’re shopping around for a new car. You’re checking out your options when you are presented with Car 1 and Car 2.

Protect Your Network, Protect Your House: Takeaways from the Capital Cybersecurity Summit
On November 14 and 15, the Northern Virginia Technology Council hosted the second annual Capital Cybersecurity Summit in Virginia.

How the Medical University of South Carolina Became Future-Proof
The Medical University of South Carolina (MUSC) is complex, high performance environment.

Breach, Blame, Repeat
World renowned cyber security expert, Dick Clarke, advises on breaking the cycle of breach and blame by evolving the role of the CISO.

DNS as a Weapon in Cyber Security
Bad actors know that DNS makes a great weapon in producing massive amounts of traffic for successful DDoS attacks. Here’s how.

DNS as Facilitator in Cyber Security
The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.

DNS as Hostage in Cyber Security
DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.

BlueCat DNS for Azure
Powerful, software-driven DNS capabilities for Microsoft Azure Cloud

The Cold Hard Facts Behind Free DNS
Organizations rely on DNS for critical business applications with many enterprises using a combination of DNS, DHCP and IPAM solutions, including free…

Feeling Overwhelmed? Your Network Monitoring Tools Are The Ones To Blame
Have you ever found yourself sifting through logs or email alerts from the 101 networking monitoring and performance management tools your company uses?…

How Kohl’s freed Themselves from free Microsoft DNS
As one of America’s largest retail department store chains, Kohl’s manages a massive number of IP addresses.

DNS: A Security Differentiator for System Integrators
At BlueCat’s first annual System Integrator Summit, companies in the Federal system integrator and partner community met to learn more about the strong…

October Member of the Month: Vasilis Bouloukos
October brought forward countless networking Horror Stories but one standout community member saw the opportunity within those horror stories. Our very own…

Indeni Announces F5 Networks Runbook Automation
In the recent Indeni 6.0 release, we are excited to announce new knowledge and remediation best practices for F5 Networks! F5 is the leader in the load…

Vote NO on Exposed Voter Data
Do you remember where you were between June 1 and June 12, 2017?

Secure Electronic Voting Through DNS
With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Intel Chip Chat Network Insights ft. Speaker Yoni Leitersdorf
Recently, Indeni’s CEO was invited to participate in Intel’s Chip Chat Network Insights Podcast to discuss trends in Network Operations (NetOps) and…

Horror Stories from Microsoft DNS Users
What is your worst nightmare?
A break-in to your home while you’re asleep? Falling into a pit of snakes à la Indiana Jones?

7 Ways to Manage F5 LTM Traffic With Profiles
In a virtualized environment, configurations and connections can change on a dime. Leverage these 7 best practices from the Indeni Community to ensure the…

How DDoS attacks use DNS as a weapon
Bad actors know that DoS and DDoS attacks can use DNS as a weapon to cause spectacular web crashes that bring critical business services to their knees.

Making APIs Work for You (Part 1)
Part 1: Get all the basics on BlueCat APIs, including best practices and important tips on specific API calls and code workflows.

Breach, blame, repeat: The hard truths of today’s CISO
In this webinar, cybersecurity and counterterrorism expert DIck Clarke warns that it’s no longer a matter of if, but when, an IT breach will occur.

DNS in the Cloud: Where, When and Why
Chances are your organization is either working on a cloud strategy or has already implemented one.

Scaling the Business of Culture
When company growth calls for 100 new positions to be added to your ranks, attracting the right talent is likely your #1 priority.

BlueCat Welcomes JISA Delegates to Toronto HQ
Whether it’s translating domain names to IP addresses, or translating English to Japanese, there is never a dull moment at BlueCat.

Unified Goals of Network Engineers and CISOs: User Group Takeaways
When you get senior network engineers from world-class enterprises like Coca-Cola, Cox Automotive and The Home Depot, in a room together – and toss in a…

Is your DNS being held hostage?
In the second of this three-part series on DNS as a naïve enabler in malicious cyber activity, we introduce persona No. 2, DNS as a hostage.

BlueCat Among Canada’s Best Workplaces™ in Technology
It’s a good thing we’ve expanded our office space – we might need to install a trophy cabinet.

The Role of DNS in SCADA System Security
Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of.

September Member Of The Month
We are pleased to introduce the inaugural “Member of the Month” where we recognize a standout Indeni Crowd member. The Indeni team could not be…

Three things NIST taught us about DNS security
In this webinar, BlueCat turned to NIST computer scientist Scott Rose for advice on how network admins can harness the power of DNS to secure their systems.

DNS as Facilitator – A Naïve Resolver for Malware
Hackers are resourceful. They know that helpful DNS will always work to naively return an IP address when queried. DNS exists to connect clients to backend…

The Power of a Client-Facing DNS Firewall
Learn why Adaptive DNS is the foundation for scalable, secure networks and critical to all of your digital transformation strategies.

Manageable DNS Migrations: Moving to Adaptive DNS
Considering a DNS migration? Choose a company with a proven methodology to plan and validate, and the ability to see your data staged before deployment.

5 Common Mistakes Your Ops Team Should Avoid
We get it. Network operations isn’t an easy gig. And it’s getting harder by the day. More endpoints to manage, more threats to mitigate,…

Best Practices for Federal DNS Security
Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment Guide for DNS, about securing…

Modern Network Monitoring Goes Deep
Long Outages Prevented By Prediction and Simple-to-Understand Fixes Old-school monitoring provides network administrators simple metrics and indications…

Does Your Organization’s Infrastructure Boast A Clean Bill Of Health?
5 Steps To Get You There Ask any high-level athlete the importance of continuously monitoring their health and performance, and they’ll tell you it’s…

Three personas of DNS in cybersecurity
Cyber attackers leverage DNS differently for different outcomes: DNS as a facilitator, hostage, or weapon. How is your DNS being hijacked?

Is Network Resilience the New Metric for Federal Cybersecurity?
Here at the AFCEA Homeland Security conference, we’re hearing a very different tone on cyber security than in years past.

Easy on the eyes, hard on misconfigurations
What’s New in Indeni 6.0 The Indeni 6.0 release is a great leap in the user experience for our customers. It is the result of several years’ work…

Elevate Toronto 2017
There is a major festival going on in Toronto where thousands of people clutch their show passes and fill theatres to fawn over their idols.

Network Virtualization is Like a Driverless Car
How is Network Virtualization like a driverless car?

Manageable Migrations – Moving to Adaptive DNS
Find out why companies like Coca Cola, Home Depot, and TJX made the switch from VitalQIP to BlueCat from our migration experts

BlueCat Expands Board to Disrupt DNS Security Market
Internationally Recognized Security Expert, Richard Clarke, and Former CEO of Fieldglass, Jai Shekhawat, join BlueCat Board of Directors

DNS and the Challenge of Advanced Persistent Threats
Most cyber attacks are the online equivalent of a smash-and-grab robbery.

Vodafone Network Outage Caused by Router
September 25th 2016 6:00PM Local time Vodafone experienced problems with data, text and calls across Australia. Once becoming aware of the issue,…

TCP packet out of state
Alert Headline: TCP packets dropped due to “out of state” error Description: Some TCP packets, and therefore connections, are being dropped due…

TCP Connection States Issues For Check Point VPN
TCP packet out of state Wondering why this is happening? Wondering when this is happening? indeni will tell you when this is happening and will…

Network Management Proactive, Reactive or Predictive?
Proactive, Reactive or Predictive Network Management Enterprise infrastructure today is complex, where more and more devices are coming online and being…

Indeni Insight is your way of knowing where you stand
With Indeni Insight, CIOs and network architects gain more control and visibility over their networks. It works by supplying valuable insights and…

5.5 Release Notes
Build 107 (Dec 19, 2017) Build 106 (Nov 16, 2017) Build 105 (Sept 12, 2017) Build 102 (Sept 1, 2017) Build 100 (Aug 17, 2017) Build 99 (Jul 11, 2017) Build…

Connection Table Full
Alert Headline: Connection table limit approaching or reached Description: There are 24,125 concurrent connections while the limit is 25000. The connection…

Cluster Routing Table Mismatch: Check Point Firewall Alert Guide
Alert Headline: Two cluster members differ in their routing tables Description: The routing tables for the following two cluster members do not match: they…

Check Point Hardware Diagnostic Tool for Hardware and OS
Check Point Firewalls Diagnostic Tool Below are samples of hidden issues that maybe lurking in your network environment. Keep the clocks in sync…

The Road to Network Virtualization
Andrew Wertkin, BlueCat CTO, talks to Cerner and Dell about the core business drivers for implementing network virtualization and the impact of moving to a…

Why Client Facing DNS Firewalls are Critical to Network Security
What if DNS queries went to a CLIENT-facing firewall first? You’d have full knowledge of the query: person, device, context. A big step in network security.

Can traditional IT cut the cost of cybersecurity solutions?
Where is the line between traditional IT administration and cyber security operations?
Or is there a line at all?

Three Important Tech Trends For Infrastructure And Operations Teams
Three important tech trends for infrastructure and operations teams Regardless of industry, customer, or product, nearly all businesses today rely on…

DNS Edge Use Case – Compromised IOT Device
DNS Edge Use Case – Compromised IOT Device

Dispatch from DoDIIS 2017: The Incredible Shrinking Decision Space
Here at the DoDIIS 2017 conference, we’re hearing a lot about the role of cybersecurity in so-called “fifth generation warfare” – a concept with direct…

DNS Data: The New Cybersecurity Hero
There is cruel irony in DNS. By their very nature, Domain Name Systems facilitate an internet-friendly naming environment making it simple and seamless for…

Exposing the Enemy Within Webinar
Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network

Federal IT: Sure, Your DNS is Compliant. But are You Secure?
For Federal IT managers, compliance is a primary motivator.
…

DNS Digital Transformation Reduces Dell Outages to Zero
Stephen Stack, the former Global Head of Networks at Dell, shares how their digital transformation process started with DNS and ended with zero downtime.

The Risks of Rube Goldberg DNS
“A well-oiled machine.” That’s the highest compliment any network administrator can receive. In a business where people tend to focus on the negative,…

5 Burning Topics to Explore at Cisco Live 2017
On June 25, BlueCat will be in Las Vegas as a proud partner in Cisco Live 2017.

BlueCat’s Vivian Leung Receives Legal Award of Excellence
Vivian Leung, a classic “jack-of-all trades” lawyer, and is now the recipient of the 2017 Canadian General Council Awards (CGCA) for Excellence in…

Why Educational Institutions Need Unified DDI
It’s no secret that post-secondary students can be some of the biggest tech whizzes out there – between all the different devices they use on campus, they…

NotPetya: DNS-leveraging Malware
Hot on the heels of last month’s WannaCry ransomware attack comes a new threat: NotPetya.

Jim Randall’s Secret Platform for Establishing Global Cyber Security at PwC
If you want to get a grip on cyber security for a global, multi-billion dollar organization with thousands of employees, then you can’t be looking up…

BlueCat Takes Cisco Live by Storm with Network Security
There, amongst all the bright lights and excitement in Las Vegas, was Cisco Live 2017.

Indeni Extends Product Innovation with Knowledge-Based Solution for Palo Alto Networks Firewalls
New Knowledge-Based Solution for PAN-OS 8 increases admin productivity allowing IT to enhance security posture We hope everyone is having a great time at…

Adaptive DNS – Dopamine for your Bimodal IT Strategy
A CIO walks into a crowded room. Is he going to be the life of the party, or sit quietly in the corner?

BlueCat Hackathon 3D
It’s been just over a year since Resolve to Innovate, our first ever in-house Hackathon, and we’re now gearing up for our third three-day hackathon,…

DNS helped stop the WannaCry ransomware attack
In 2017, the world was confronted by a ransomware attack that demonstrated how DNS visibility and control are key to any layered security strategy.

What CIOs can Learn from San Francisco’s Incredible Sinking Tower
I couldn’t help but chuckle today reading that Joe Montana, the *second greatest NFL quarterback of all time (ahem, Brady) is the latest person to sue the…

Moving to BlueCat Adaptive DNS
An overview of organizations that have made the switch from VitalQIP

Case Study: CSC (now DXC)
CSC is a global IT services and solutions provider with 30 data centers around the world, managing over 16 million IP addresses for itself, and more than…

BlueCat: A Great Place to Work™
At BlueCat we’re proud of the innovation we are driving in the industry as well as the deep customer relationships we have forged with some of the largest…

Indeni: There’s More To A Name Than Meets The Eye
We updated our company identity and the Indeni logo to better represent the value we provide to our customers – happiness.

BlueCat Redefines Enterprise Security with BlueCat DNS Edge™
Leveraging the power of DNS to protect the enterprise
…

Celebrating Our Women… and All Women
There has been a lot of press recently about companies who are struggling to build a culture of inclusivity and gender equality.

Madison Dearborn Partners to Acquire BlueCat
MDP’s support will accelerate the expansion of BlueCat’s leading Adaptive DNS solutions

How to monitor F5 devices – SNMP vs API vs SSH
What is the best way to monitor F5 devices? Is it best to use SNMP, SSH or an API connection? See how indeni monitors these devices for optimal performance.

How to select script monitoring authentication types
Learn how to get the most out of your infrastructure by selecting different indeni configuration and authentication settings.

Are you working with the right DDI provider?
As more and more businesses transform through key IT initiatives such as cloud, ITaaS and automation, DNS can no longer be an afterthought.

Machine learning for logs, cut through the hype.
Splunk recently announced machine learning capabilities. Learn how indeni’s machine learning differs from log management and SIEM solutions like Splunk.

Vulnerabilities from SWEET32 in F5 Load Balancers Reveal
Worried about SWEET32 and OpenSSL vulnerabilities? Check out this step by step guide to fix issues before they become critical events. Read more.

Is your network ready for the holidays?
Retail is one of the most dynamic and challenging industries for IT. Here are four questions retail IT organizations should ask this holiday season.

Protect Against Malvertising with an Active Security Strategy
If you pay attention to the world of security you’ve probably heard about the upswing in a type of attack known as Malvertising.

BlueCat Networks CTO Talks about the Latest DNS Developments at IP Expo 2016
Joanne Turner, reporting for Telecoms Talks at IP Expo 2016 speaks with Andrew Wertkin, Chief Technology Officer of BlueCat Networks about some of the…

Managing Device Connectivity on Campus
Higher education institutions have been dealing with BYOT for some 15 years, making them pioneers of this massive technology transformation.

The Dyn DNS DDoS Attack, and What to Do About It
In October 2016, Dyn, a major internet DNS service provider, was attacked.¬†Here’s more about it, and how to protect your network against similar…

Predictive Analytics and the Future of IT
In this world of infinite connectivity we are using data more and more to make sense of our environments. One such technology being incorporated into…

CBC Interview with Andrew Wertkin on Mass Cyberattack
Chief Technology Officer at Bluecat, Andrew Wertkin, speaks with CBC News Network’s Michael Serapio in Toronto regarding the implications of a cyberattack…

AutoZone Selects BlueCat to Support Growth
TORONTO AND MEMPHIS – October 20, 2016 – BlueCat, a leading provider of DNS-based solutions, today announced that AutoZone Inc. [NYSE: AZO], has chosen…

No Compromise Network Service on the AWS Cloud
The time to build and implement cloud strategies is now and BlueCat DNS for AWS can help to ensure unification into your current network.

BlueCat Scores Top Marks in Company Culture, Earns Great Place to Work™
It’s official, BlueCat is now certified as a GREAT WORKPLACE by Great Place to Work® Canada. Earning this achievement was no small feat – the process…

New study: Cerner automates its multi -tenant network to ensure reliability
Cerner has entered into an agreement with BlueCat to automate its existing network and improve reliability.

Five Tips to Reduce Dwell Time
Dwell time is arguably the most accurate indicator of an enterprise’s security.

Pokemon Go: When Cybersecurity “Breaches” Real Life
Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim.

Fujitsu Selects BlueCat as Key Supplier for Implementation of UK Ministry of Defence Contract
Fujitsu Selects BlueCat as a Key Supplier for the Implementation of UK Ministry of Defence Global Connectivity Contract

Cerner taps BlueCat to automate and speed its cloud-based offerings
EHR vendor is making its multi-tenant network faster and better able to keep pace with innovations and emerging technologies.

Cerner Expands Use of BlueCat Solutions to Improve Automation, Reliability and Security
TORONTO & KANSAS CITY – July 12, 2016 – BlueCat, a leading provider of DNS, DHCP and IP address management (DDI), today announced that Cerner, a global…

Top Security Issues for the C-Suite: Q&A with BlueCat’s Director of Cybersecurity Solutions
Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular…

Take your PCI compliance to the next level
Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes.

Case Study: Alesund kommune
Unhappy with its Windows 2000 server, which did not provide the DNS/DHCP high availability that would eliminate any potential DNS/DHCP-related network…

Case Study: Universität Salzburg
With 16,500 students and around 2,700 employees in research, teaching and administration, the Paris Lodron Universität, founded in 1662, is the largest…

Case Study: University College Dublin
University College Dublin (UCD) was founded in 1854 as the Catholic University of Ireland by John Henry Cardinal Newman. After a few iterations as the Royal…

Case Study: TYROLIT
TYROLIT (www.tyrolit.com) is one of the world’s largest producers of grinding, cutting, drilling and dressing tools, as well as machines for the…

Passwords aren’t going anywhere anytime soon, so make sure you have a good one
Years ago, futurists predicted many advances such as flying cars, teleportation, a cure for old age to name a few things that would be available by now.…

Case Study: Hochschule Ostwestfalen-Lippe University
Located in North-Rhine Westphalia (NRW), western Germany, the Hochschule Ostwestfalen-Lippe – University of Applied Sciences (www.hs-owl.de), or HS-OWL,…

Case study: Medical University of South Carolina
With BlueCat, the Medical University of South Carolina centralized management and visibility for DNS, DHCP, and IP addresses on the network.

CBC Interview with BlueCat on the importance of happy workers
How important are happy workers? Some lessons learned on employee engagement from @mhyattbluecat w/@DianneBuckner

BlueCat Appoints New VP of European Sales and Business Development
Günter Sandmann Focused on Continuing to Expand BlueCat’s European Sales Team and Market Share

Why Cloud Security is essential for the success of Internet of Things
The integration of Internet of Things (IoT) into daily lives is a hot topic for the consumer market with smart home appliances, smart phones and wearables…

BlueCat Hackathon: Blows expectations out of the water
Think of a software feature you can’t remember life without. It can be anything: The “Like” button on Facebook, tagging in social media comments, the…

BlueCat Joins Riverbed-Ready Technology Alliance
TORONTO AND SAN FRANCISO – April 12, 2016 – BlueCat, a leading provider of DNS, DHCP and IP address management solutions (DDI), today announced that it…

Announcing 5.4: New rule engine, Check Point 61000/41000 support
Welcome 5.4! In this release we’ve included phase one of our infrastructure operations platform, added new content and as well as Check Point 41k/61k…

Announcing the future of infrastructure health
Today I’m excited to announce our platform for infrastructure health. Before I go into what we’ve just done, let me explain why. What’s the current…

CTO Andrew Wertkin Interviews with InformationWeek at RSA
Securing IoT & Supporting Innovation
…

Why does infrastructure operations still suck?
Last Friday, I met with an individual that leads a 300-person team, responsible for running the networking and computing infrastructure in 50 data centers…

What We’ve Learned From Speaking With Our Customers
A month ago I shared some of our plans for 2016 and mentioned that I’d be speaking with our customers, asking them a few questions. The survey was very…

How to Configure a VPN for DAIP Gateway Connected to Internet Using USB 3G-Modem
Find detailed steps required to configure and troubleshoot a VPN for the DAIP gateway connected to the Internet using USB…

Dark Reading: 7 Signs of Infosec’s Groundhog’s Day Syndrome
Irritations that plague security pros day in and day out.

2016: A Year Of New Opportunities
Welcome to 2016! By now you’ve probably read all of the vendors’ “predictions” for 2016, are done with the holiday celebrations and are ready to…

Release Notes 6.1.3
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.1.2
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.1.1
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.1.0
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.0.71
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.0.60
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.0.50
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.0.40
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. See below for the detailed…

Release Notes 6.0.30
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Interface. See below for the detailed…

Release Notes 6.0.20
What’s new in the latest version of Indeni? Enhancements in the core platform across Indeni Server, Collector, and Knowledge. In addition, the latest…

Release Notes 6.0.11
What’s new in the latest version of Indeni? Enhancements in the core platform across the Indeni Server, Collector, Development Tools and Indeni Insight to…

Release Notes 6.0
What’s new in the latest version of 6.0? Check out the story of 6.0 and see the detailed release notes below. Customers head over to the Indeni…

Release Notes 5.9.37
What’s new in the latest version of 5.9? Support for Check Point R80.10 and additional alerts and knowledge improvements for Check Point Technologies,…

Using cURL to Monitor Check Point VSX Firewalls
Find detailed steps required to create scripts, increase VSX visibility, understand the resulting output, create…

Check Point Firewall Guide Performance Optimization: The Dual Default Gateway Problem
The following excerpt from Timothy C. Hall’s latest book “Max Power: Check Point Firewall Performance Optimization” describes the Dual Default…

BlueCat Launches eLearning Fundamentals DDI Training
On-demand program enables customers to learn about their BlueCat solutions at a pace and time that works for them. November 24, 2015. Toronto, Canada. There…

Managing Cyber Attacks in the Health Care Industry
The health care industry is more susceptible to cyber attacks than any other industry today.

Announcing indeni 5.3: more than 400 improvements!
Welcome 5.3! In this release we’ve included over 400 improvements to the underlying infrastructure and bugfixes, added new content and expanded our Palo…

IT Strategy: Building Business Relevance- Kroger’s CIO did.
A solid IT strategy and the right leadership mindset are critical for success
…

How To Do an IPSec VPN Configuration Between PAN Firewall and Cisco ASA
Darshan K. Doshi describes how to configure IPSec VPN between Palo Alto and Cisco ASA.

Take Our Kids To Work Day: What does my parent do everyday?
What happens when you invite eight grade nine students into your workplace? Lots of laughter, learning and an insider’s view of BlueCat.

Scaling Agility: Real-World Insights
The momentum behind the adoption of Agile methodologies continues to build. Uptake has been growing over 10% year-over-year according to some research. As…

BlueCat Introduces Network Visualization for Network Insight at Scale
TORONTO, CANADA – October 28, 2015 – BlueCat, a leading provider of DNS, DHCP and IP address management solutions (DDI), today introduced Network…

Best Book Firewall Performance and Optimization
UPDATE: The book is no longer offered by indeni. Please go to www.maxpowerfirewalls.com to purchase the book. Below is the original blog post as it…

How to Export Check Point Log Files into a Readable Format Without Using Smartview Tracker
Rasheen Whidbee describes how to automate the export of Check Point log files into a readable format.

Comparing indeni and BackBox: In-depth intelligence vs simplicity
Safeway, a company headquartered in Rosh-Haain, Israel, has recently released BackBox version 4.5. In this new version, BackBox includes “Application…

How to Setup Authentication for Admins – WebUI / SSH/ SmartDashboard – Check Point GAIA
Looking for a step by step guide on how to set up authentication for admins via Check Point GAIA? Read Johnathan’s Browall post with pictures here.

How To Set Up Certificate Based VPNs with Check Point Appliances: CPFW Config Guide
Looking for a step by step guide on how to set up certificate based VPNs with Check Point Appliances? Read Danny Jung’s post with pictures here.

How to Reset Device Trust – F5 LTM Load Balancing Methods Troubleshooting ConfigSync and Device Clustering
Chris Spillane provides a quick guide to troubleshooting device clustering or config sync for version 11.x.

Check Point Users: You Are Not Ready for June 5th, 2016
UPDATE May 31st 2016: Check Point has updated the SK. The rollout of SHA-256 has been postponed to June 5th 2016. Back in April 2015, Check Point published…

Cisco vs Palo Alto Networks: The Hidden Battle
In my conversations with firewall users I often hear references to the “battle of the titans” between Check Point and Palo Alto Networks. Both…

FAQ on How CRL Check Mechanism on a Check Point Gateway Works
Maxim Bilyukov compiled this FAQ about How the Certification Revocation List (CRL) check mechanism works on a Check Point gateway. Maxim…

Check Point appliances refresh: how do you compare?
We often get asked if we have data pertaining to the upgrade processes and cycles of Check Point users around the world. The short answer is, YES. The…

v9.X To 10.2.4 Upgrade Guide: F5 LTM Load Balancing Methods
Chris Spillane urges the upgrade of your version 9.x of F5 and provides a concise guide for the upgrade to version 10.2.4. Chris is a Senior Security…

Palo Alto Networks Firewalls Alert Guide: Group ID Conflict Detected
This is a real life sample alert from indeni alert guide for Palo Alto Firewalls. Description: This cluster has the same Group ID as the other…

Proxy ARP Entries Removed – Check Point Firewalls Optimized Performance
Imagine getting this alert weeks in advance before the issue turned into downtime? Would you like to get these alerts via email? Find out how.

Firewall in Maintenance Mode. Palo Alto Network Alert Guide
This is a real life sample alert from our indeni alert guide for Palo Alto Networks Firewall. Description: The firewall has entered maintenance mode…

F5 bigd process down
This is a real life sample alert from indeni Description: The F5 bigd process is down and has not restarted. Among its responsibilities, bigd runs the…

How to Pull and View Logs Using Automation for Palo Alto Networks Firewalls
Are you looking to automate your log pulling process for your Palo Alto Firewalls? indeni is capable of accessing the SSH-only logs and analyze them. See…

Design and Architect for Change
IT is moving rapidly from an organization that automates and integrates value chains across their company and partners, to an organization that drives core…

NERC Compliance Best Practices for Critical Infrastructure Protection (CIP) v5
We have a number of US-based energy grid operators that are leveraging indeni’s capabilities to meet the NERC CIP v5 requirements, that are soon to be…

Configuration Management Tool Comparison: Multi-Vendor Deep Configuration Analysis: Cisco-Focused
Looking for a comprehensive comparison of configuration management tools for enterprise IT? Read our informative post for desired configuration. Learn more.

Palo Alto Networks firewalls: Job(s) stuck in pending
This is a real life sample alert from the indeni alert guide for Palo Alto Networks Firewalls. Description: One or more jobs running on this device have…

Pan(w)achrome for Palo Alto Networks firewalls from the indeni perspective
Pan(w)achrome is a chrome extension written by Luigi Mori, a solutions architect at Palo Alto Networks. The extension lets you connect to your Palo Alto…

RX Traffic Drastically Reduced Post Fail Over. Palo Alto Networks Alert Guide
This is a real life sample alert from indeni alert guide for Palo Alto Networks Firewall. Description: This device is receiving far less traffic than…

How To Find Out When Your SSL Certificate Expires on F5 BIG-IP DNS
Do you know when the SSL certificate expires on your F5 Load balancers? Every single deployment of LTM ® we’ve encountered has SSL termination…

F5 Too many RST packets sent
This is a real life sample alert from indeni from our F5 Load Balancing Methods Library Description: This device is being hit with too many connections that…

Comparing indeni and Check Point’s SmartWorkflow and Compliance blades
The summary: SmartWorkflow helps you track your rulebase, the Compliance blade helps you identify specific configurations that are not in compliance with…

Announcing indeni 5.2: Palo Alto Networks beta, improvements and bugfixes
Welcome 5.2! In this release we’ve included many improvements to the underlying infrastructure and bugfixes, as well as kicked off the beta for our…

Firewall Connection Table Limit Approaching or Reached – Check Point Firewall Alerts
Imagine getting this alert, weeks in advance: “Firewall Connection Table Limit Reached”. What would you do with that info? Time saved? See more..

indeni is Short-Listed for the 2015 Red Herring Top 100 North America Award
San Mateo, CA – May 18th, 2015 – indeni announced today it has been short-listed for Red Herring’s Top 100 North America award, a prestigious…

Pulling Data via SNMP, SSH or API – PAN Firewall Best Practices
If you’re want to integrate Palo Alto firewalls as part of some automated system – scripts, central NOC, SDN. What protocol is best? SNMP, SSH, API? Read…

F5 IPSec Tunnel Causing Traffic Issues
Having traffic issues to your F5s? Check out this alert generated by indeni for IPSec traffic issues. See alert.

Palo Alto Networks Proxy Session Pool Low
Looking for a solution to manage your Palo Alto Network firewalls for high availability of Enterprise IT? See samples of 100’s of checks run 24/7/365 here

Comparing Check Point’s SmartEvent and SmartReporter vs indeni
Check Point’s SmartEvent and SmartReporter blades have made quite some progress over the last two years. The database used for collecting log data has…

Gartner’s Magic Quadrant Enterprise Firewall Comparison
Are looking for a comprehensive comparison of enterprise firewalls? Gartner’s Magic Quadrant provides good info, indeni data shows in depth insight. Read…

F5 SIP might have issues in the current software version
This is a real life sample alert from indeni Description: indeni has determined that SIP profile is being used with 11.1.0 on this device. Manual…

High Memory Usage: FWM Process – Check Point Firewall Alerts
Imagine getting that alert 25 days in advance? How much time would be saved? Take a look at this and other alerts indeni comes up with 24/7/365. Read more.

Gold Standard Configuration for Network Devices
Looking to define the Gold Standard Configuration for your network devices? indeni contains a layer that translates the output of queries into structured…

Palo Alto Networks FQDN Resolution Failures
Looking for a solution to manage your Palo Alto Network firewalls for high availability of Enterprise IT? See samples of 100’s of checks run 24/7/365 here.

Tuesday And Wednesday Are The Busiest For NetOps/SecOps Teams
Network operations and security operations teams generally work around the clock. However, there are days and times they are clearly busier. Below is a…

F5 SNAT port exhaustion occurring
This is a real life sample alert from indeni Description: You are encountering SNAT port exahustion. The logs from /var/log/ltm are: 01010201:2: Inet port…

Jobs Failed Palo Alto Networks Alert Guide
Looking for a solution to manage your Palo Alto Network firewalls for high availability of Enterprise IT? See samples of 100’s of checks run 24/7/365 here

Check Point firewalls Alert of the Week: Two cluster members differ in their SecureXL configuration
This is a real life sample alert from indeni. Description: This cluster member has SecureXL disabled. This does not match the SecureXL configuration of…

The Rise of the VAR/MSP
The Managed Service Provider (MSP) market is exploding. It’s been this way for a few years now. It makes a ton of sense – MSPs can offer…

F5 Mirroring and production traffic using the same VLAN
This is a real life sample alert from indeni Description: SOL13478 recommends that you do not mix mirroring and production traffic on the same VLAN. Your…

F5 Configuration changes shouldn’t be made to the standby device
This is a real life sample alert from indeni for F5 Load Balancing Methods Description: You have made configuration changes to the standby device in a…

F5 Hash persistence profile shouldn’t be applied to FastL4 virtual servers
This is a real life sample alert from indeni for F5 Balancing Methods Description: You have applied a hash persistence profile to a FastL4 virtual server.…

Check Point Alert of the Week: High firewall kernel memory usage has been measured
This is a real life sample alert from indeni. Description: The firewall kernel memory usage has crossed the high threshold. It is now at 80.0%. Manual…

Possible multicast or broadcast loop on SFP NICs detected: F5 Alert of the Week
This is a real life sample alert from indeni for F5 Load Balancing Methods Description: According to F5’s SOL14455, SFP NICs on this OS version may…

Check Point Alert of the Week: Potential high latency on SFP cards
This is a real life sample alert from indeni. Description: The Tx queue batch size on this device is: 1. A too high Tx queue batch size may increase…

5 Questions to Ask When Investing in a DDI Solution
So you‚Äôre looking to invest in an enterprise DNS, DHCP and IP Address Management (DDI) solution? Here’s 5 questions you should ask when investing in a…

High inode usage, storage may malfunction soon
This is a real life sample alert from indeni. The alert applies to Check Point firewalls, F5 Load Balancers, and any other Unix-based device.…

The Seven Stages of (IT) Hell
We’ve all been there – where a specific IT scenario or event can be compared to a horror film, filled with suspense and terror.

Up Next: Crowd-sourced SaaS
Google released something today – a tool called The Customer Journey to Online Purchase. While this just a standalone tool at the moment, I’m…

F5 Active-Active in use, contrary to vendor recommendation
This is a real life sample alert from indeni Description: This device is part of an Active-Active HA configuration without an additional standby device.…

On-board NICs used on an open server: Check Point Firewalls Configuration Guide to Alerts.
indeni uses a series of tools, as well as data previously collected, to determine which NICs on an open server are the on-board ones.

Check Point Alert of the Week: A NIC and fw_worker shouldn’t be assigned to the same core
This is a real life sample alert from indeni. Description: Having one or more NICs assigned to the same CPU core as an fw_worker will result in degraded…

Questions May Return an Incorrect Value: F5© Alert of the Week: iRules using DNS
This is a real life sample alert from indeni for F5 Load Balancing Methods Description: The DNS::question iRule command may return an incorrect value. This…

VPN peer not responding or unreachable
This is a real life sample alert from indeni Description: Some of the device’s VPN peers are not responding to VPN traffic. Affected VPN Peers VPN…

Announcing indeni 5.1: F5© BIG-IP© support, many improvements
We’re excited to announce version 5.1. While this version has been generally available for a few months now, it has had improvements added to it over…

Network Device Configuration Standardization – Thoughts on Ethan Banks’ post
Network device configuration standardization can be a challenge even for the most experienced network engineer. Check our post on the matter. Read More.

F5 Self IP and unicast failover IP are not identical
This is a real life sample alert from indeni for F5 Load Balancing Methods Description: The F5 unicast failover IP must be the same as the self IP for…

5 holiday tips to make managing DDI a little easier
With the holiday season upon us, here are five tips to make managing your DDI environment a little easier in BlueCat Address Manager.

Check Point Alert of the Week: VPN phase two lifetime mismatch with a VPN peer
This is a real life sample alert from indeni. Description: The phase two life time values used by this device and by some of its peers are different. This…

Check Point Alert of the Week: Cluster member down due to NIC error
It’s so easy sometimes to disconnect the wrong cable. This is a real life sample alert from indeni. Description: The cluster member is in a critical…

iRules May Break in a Future Upgrade, or Today: F5© Alert of the Week:
This is a real life sample alert from indeni for F5 Load Balancing Methods Description: indeni has run a syntax check of the iRules currently configured on…

Monitored or Permanent VPN tunnels down: Check Point Firewalls Configuration Guide
indeni loads the VPN Community configurations and then tests the VPN tunnels on each gateway using the ‘vpn tu’ command. Read more.

“Renewing Indeni is a no brainer”
I just got off the phone with one of our customers, a multi-billion-dollar enterprise that I’m 100% certain every single US-based reader of this post…

DNS servers configured but responding too slowly: Check Point Firewall
indeni runs the command “nslookup www.indeni.com” (or the command for the given device being analyzed) every hour and times how long it takes to complete it

VPN Gateway Configuration Issues: Clear Packets Drop : Check Point Firewall Alert Guide
Are you having issues with your VPN gateway configuraion? See indeni alerts with remediation steps for fast resolution. Learn more.

F5 and Palo Alto Networksx: Preemption enabled on cluster member
NOTE: This sample alert is provided for F5 devices. indeni supports a similar alert for Palo Alto Networks firewalls, see DOC-7857. This is a real life…

cphaprob syncstat: What is it? What Can you do with it for Check Point Firewalls?
This is a real life example of interesting Check Point Firewalls commands we found: There is a command in the Check Point world that isn’t widely…

Disaster Recovery: BlueCat DNS to the Rescue
A BlueCat customer discusses why organizations can’t afford to overlook DNS, DHCP and IPAM when planning for a disaster.

F5 SSL transactions per second (TPS) limit nearing or reached
This is a real life sample alert from indeni Description: This F5 device is licensed to handle up to 200 SSL transactions per second. It is currently…

NIC Duplex Set to Half Instead of Full: Router and Switches Configuration Guide
indeni monitors the critical stats of all network interfaces and ports constantly. When issues are found, such as half duplex. Read More.

Check Point Alert of the Week: Policy installation resulted in high CPU load, cluster may failover
This is a real life sample alert from Indeni Description: A new policy has been recently installed. During the policy installation it appears that there has…

F5 Logging left on in BigDB
This is a real life sample alert from indeni Description: The logging database keys have been altered more than 60 minutes ago and have not been reverted to…

Check Point Alert of the Week: Sync redundancy should use a bond interface, not separate interfaces
This is a real life alert from Indeni Description: Sync redundancy should no longer be implemented using separate interfaces. This signature has been made…

Knowledge-Driven IT
At indeni, we’ve always been big believers in the need to use knowledge to get the job done. Since we’ve started, five years ago, we’ve…

Check Point Alert of the Week: Stateful Inspection disabled, possible security risk
This is a real life sample alert from Indeni Description: The Stateful Inspection feature on this firewall has been disabled. Since Stateful Inspection is a…

How to Keep a Bouncer Healthy – Comparing Algosec/Firemon/Tufin vs indeni
If you are an Algosec/Firemon/Tufin customer, you should seriously look into indeni as a means of providing you an overall solution for getting the job…

F5 Node availability issue detected
This is a real life sample alert from indeni Description: Node availability issue detected. Please see additional information below. Affected nodes:…

Check Point Alert of the Week: Certain 10Gb NICs in use may deliver slow performance
This is a real life sample alert from indeni Description: Certain 10Gb NICs on this device are using a driver known as IXGBE and a feature called Receive…

Bridgian and indeni joining hands in Minnesota
indeni is proud to be partnering with Bridgian as a Platinum partner in Minnesota. Each week more and more customers, partners and distributors are…

F5® Alert of the Week: BIG-IP device has changes pending synchronization
This is a real life sample alert from indeni Description: The configuration has changed but the changes haven’t synced between all devices in the…

Check Point Alert of the Week: NAT connections (fwx_alloc) table limit approaching or reached
This is a real life sample alert from indeni Description: There are 9210 NAT connections stored in the fwx_alloc kernel table while the limit is 10000. When…

F5® Alert of the Week: SSL certificate is about to expire
This is a real life sample alert from indeni Description: Some SSL certificates are about to expire or have expired. Certificates expired or about to…

LDAP server’s SSL fingerprint doesn’t match saved fingerprint: Check Point Firewalls Configuration Alert Guide
If a fingerprint is stored, indeni asks the management server to connect to the LDAP server over LDAPS and retrieve the certificate. Read more.

ARP table is approaching its limits: Check Point Firewalls Configuration Alert Guide
indeni continuously monitors the values of the gc_thresholds mentioned above as well as the size of the ARP table. Read more.

The “How to avoid in the future” section of a Root Cause Analysis report – any use?
You had a major network outage (like Time Warner just did). Panic, stress, sweat, people trying all kinds of crazy things. In the end, the issue is resolved…

Announcing indeni 5.0: Trending capabilities, easier UI navigation, better performance, tons of additions
We’re excited to announce the release of version 5.0! After being used for quite a while by some of our customers, we’re ready to have the whole…

Check Point Certificate(s) expired or about to expire
This is a real life sample alert from indeni Description: Some of the certificates configured on this management server have expired or are about to expire.…

F5® Alert of the Week: Pool member response time too high
This is a real life sample alert from indeni Description: The ping time for pool member A (10.10.15.52) in the IIS_server pool is too high compared to other…

Top 5 Check Point experts announced!
Thank you all for the amazing response to our effort to put the spotlight on the world’s top Check Point experts (read our original post). It was…

Check Point hosts file corrupted or missing entries
This is a real life sample alert from indeni Description: The operating system could not find the IP address associated with “localhost”. This…

Received Packets Have Been Dropped by NIC : Configuration Guide of Alerts
indeni monitors the critical stats of all network interfaces and ports 24/7/365. If issues are found, such as drops, indeni attempts to determine the…

Five Methods to Learning a Foreign Technology
Technology is always changing. Unstoppable topics like Cloud and IPv6 are still relatively young and all sorts of new technologies are popping up around…

Possible memory leak identified in confd: Check Point Configuration Alert Guide
indeni monitors the health of processes in the operating system. As memory usage grows, indeni attempts to determine if there is a memory leak. Read more

NTP Servers Configured but not Operational: Check Point Configuration Alert Guide
indeni uses different commands for different devices to determine if NTP is working. Examples: See here

8 Tips to Maximize Your BlueCat Solution
During our instructor-led BlueCat Customer training courses, there’s a great deal of interaction between the students and our trainers.

A NIC failed recently or port down
This is a real life sample alert from indeni Description: Some network interfaces or ports have gone from “working” to “not…

ClusterXL Magic MAC Conflict Identified – CPFW Configuration Guide to Alerts
If you connect 2 different clusters to the same network segment, traffic may conflict. See how indeni’s 24/7365 checks resolve this issue. Read more

Check Point Firewall Experts Wanted
Every now and then it’s time to say thank you to the people who help us regularly. We’d like to organize the Check Point user community to…

CPUG.org: The risks of centralized open-source
The recent events with CPUG.org (Barry shutting down the site) have led to many conversations between Check Point users around the globe. Who owns the…

Gateway Cannot Access Certificate Authority: Check Point Alert Guide
indeni connects to all gateways and management servers and determines which gateways are configured to connect to which certificate authorities.

RMA Do’s and Don’ts for Check Point Firewalls
While reviewing our customers Check Point firewalls I’ve identified a pattern that keeps repeating itself: many issues tend to happen post an RMA.…

Check Point and F5© BIG-IP© LTM© Alert of the Week: RX traffic drastically reduced post fail over, possible ARP issue
NOTE: The alert detailed below is given with a Check Point ClusterXL example, although F5 BIG-IP LTM is covered for this issue as well (see…

Software Version Mismatch Cluster Members. Palo Alto Networks Alert Guide
This is a sample from our indeni alert guide for Palo Alto Networks Firewall. Did you know? As part of the normal operation of your Palo Alto Networks…

NAT connections (fwx_alloc) table limit approaching or reached
This is a real life sample alert from indeni to identify Check Point Firewalls issues. Description: There are 9210 NAT connections stored in the fwx_alloc…

Two Check Point Cluster Members Routing Tables Differ
Check Point cluster routing table mismatch How many times did you run into an outage that was caused by the fact that the secondary cluster member, which is…

Check Point RX traffic drastically reduced post fail over possible ARP issue
NOTE: The alert detailed below is given with a Check Point ClusterXL example, although F5 BIG-IP LTM is covered for this issue as well (see SOL7332). This…

Check Point Two Cluster Members Routing Tables Differ
Description: The routing tables for the following two Check Point cluster members do not match: they show different static routes. This could cause in…

ALERT HEADLINE: FIREWALL KERNEL TABLE LIMIT APPROACHING OR REACHED
This is an example alert from indeni. Description: Some kernel tables are approaching their capacity. This may result in unexpected behavior and even…

Check Point Firewall Clusters Healthy Checklist
Do you need help to ensure future fail overs are smooth, even during peak times? Read our post to maintain your CPFW clusters healthy. Check it.

DNS Best Practices: Architectures that Work
DNS is a core network service. You’d be hard pressed to think of a service, public or private, that doesn’t rely on DNS at some point.

Top 5 Issues To Look For When Troubleshooting Your Check Point Firewalls
Looking for a troubleshooting guide for your CPFW? indeni runs 24/7 checks and compiled a guide to the top 5 misconfiguration issues consistently found. See

The Art and Science of Upgrading Infrastructure Services
How can upgrading a service infrastructure be an art AND a science? I just click a button, the stuff upgrades, and I’m good… right?

Fujitsu and indeni sign agreement to enhance security operations
London, UK – (June, 2014) – indeni has announced the signing of a new three year agreement with Fujitsu Ltd. The agreement, that focuses on…

BlueCat Receives HP AllianceOne Partner of the Year Award for HP Networking – Most Innovative Use of SDN
TORONTO – June 12, 2014 – BlueCat, the leading provider of IP address management, has been recognized with an HP AllianceOne Award for HP Networking…

Making the Case for SDN: A Real-World Example
There’s no denying that Software Defined Networking (SDN) is a very hot topic.

Explosion of Connected Devices Exposes Holes in IT Security
TORONTO – May 28, 2014 – Recent well-publicized attacks have demonstrated that both traditional mobile devices and non-traditional devices such as…

Using IPAM and Core Network Services to Defend Your Business
BlueCat is solely focused on delivering IP address management, DNS and DHCP solutions, which means that security is a big part of everything we do. More and…

Becoming an IPAM Expert: Why Training Makes All the Difference
If you’ve ever taken a BlueCat training course, there’s a good chance that I’m the guy who developed it.

The Elastic Network: 4 Keys to Building a More Agile Network with IPAM
No matter what industry or market you’re doing business in, chances are your network team is under enormous pressure to keep pace with business growth,…

OSPF Virtual Link Configuration
What do you do when the OSPF area has no direct connection to the backbone? Read our post on this and other solutions for IT Pros. Read more.

How to Upgrade OpenSSL to a Patched Version – Heartbleed Vulnerability
As you probably have heard already, a new OpenSSL vulnerability (called “Heartbleed” ) was recently found. A bounds checking bug made it…

Metro Ethernet
In today’s business networks, the demand for high bandwidth throughput, a flexible network and easy maintenance is critical. Metro Ethernet Area Network…

Introduction to Traffic Engineering with MPLS
Looking to learn more about traffic engineering with MPLS? Check out our informative post

Load Balancing, Configuration and Routing Guide for EIGRP
Need a step by step guide on how to do load balancing, configuration and routing of EIGRP? Check out our informative guide to achieve just that. Read here.

The Future of IT: How to Prepare for SDN and M2M
In this article, we demystify SDN and M2M and discuss the role of IP address management and automation in preparing your network and IT staff for an SDN and…

So What’s ”indeni”
Not a week goes by without someone asking me – “So, what’s indeni?”. Those who know me well, know that when I notice something repeating itself,…

BlueCat Brings Network Intelligence to Government of Canada
TORONTO – February 20, 2014 – Network intelligence becomes increasingly attainable as BlueCat, the leading provider of intelligent IP Address…

BlueCat’s Second Generation Hardware by the Numbers
BlueCat formally launched the company’s new line of hardware this week.

Under the Hood: BlueCat’s Second Generation Hardware Performance Testing
One of the great things about working at BlueCat is knowing that what we do is foundational to every network connection in an organization.

BlueCat Develops World’s Fastest Compact IPAM Appliance
TORONTO – February 13, 2014 – Reliability, scalability and performance of the network are critical to the enterprise. With increased demands and…

BGP Routing Protocol
So what is BGP? In this series of posts I will be explaining the main principles of BGP. BGP–Border Gateway Protocol–is the de facto core…

Network Summarizations Made Easy
Network summarization is rather simple to setup, yet may be potent if not done properly. In this post there’s insight regarding this topic. Read more.

Designing a Resilient DNS Architecture Part 1: Namespace Views
For most enterprise networks, there are typically four or more jobs for DNS servers.

How to Configure HSRP VIP Problems Using Next Hop Redundancy Protocol Alert
Having issues configuring routers in an HSRP’s Virtual IP setup? Check out how to solve the issue using indeni’s predictive analytics for IT. Learn More.

The DDI Gatekeeper
We’ve all run into this person before. I’m talking about the “BIND guy” a.k.a the only guy in the entire enterprise who truly knows why DNS or DHCP are…

The Path to Private Cloud: 6 Things You Need to Know
With virtualization now widely deployed in the data center, many large organizations are looking to private cloud for the next wave of business and…

BlueCat Appoints Andrew Wertkin as CTO
TORONTO – January 8, 2014 – BlueCat, the leading provider of intelligent IP Address Management (IPAM), has appointed Andrew Wertkin as the company’s…

An Indirect Approach to Tackling Legacy IT Problems
I got a quick lesson on the difficulty of fixing legacy IT management problems when I decided to start my own company.

How to Actualize the Benefits of Virtualization
When first introduced, the driver for virtualization was consolidation and cost savings.

BlueCat invests in the Nordic region to enable more enterprises to manage rapid growth of networks and devices
Stockholm – December 4, 2013 – With the growing recognition that the best-connected business wins, BlueCat expands its operations in the Nordics,…

How to Reach the Full Potential of Cloud
There has long been a debate on what exactly cloud computing is and how it can benefit IT and business.

BlueCat’s Solutions Pass Testing for Globally Recognized Security Standards
TORONTO – November 26, 2013 – BlueCat, the leading provider of intelligent IP Address Management (IPAM) solutions, has earned Common Criteria EAL 2+…

The Common Criteria For The Common Good
For many organizations, evaluating the security of a particular product can be difficult.

Five indicators of a poor performing IPAM infrastructure
I’ve seen hundreds of customer architectures and spoken with most of their admins who have switched to BlueCat.

BlueCat Brings Network Intelligence to Australia and New Zealand
MELBOURNE – October 23, 2013 – BlueCat, the leading provider of intelligent IP Address Management (IPAM) solutions, has expanded its operations in the…

BlueCat Wins Citrix ‘Best of Synergy’ 2013 for Networking SDX Ecosystem Category
Toronto, Canada – June 13, 2013 – This year at Citrix Synergy, BlueCat, a leading provider of intelligent IP Address Management (IPAM) solutions,…

BlueCat Networks Teams with Citrix to Deliver a Simple, All-in-One Solution for Elastic Cloud Access and BYOD
Toronto, Canada – October 3, 2012 – BlueCat Networks, the IPAM Intelligence™ company, today announced that it has teamed with Citrix® to help…

BlueCat Networks Partners with Thales to Deliver Ultra Secure DNS Security Extensions (DNSSEC)
Toronto, Canada – June 11, 2012– BlueCat Networks, the IPAM Intelligence™ company, today announced that its DNS, DHCP and IP Address Management…

BlueCat Networks to Join World IPv6 Launch
Toronto, Canada – June 6, 2012– BlueCat Networks, the IPAM Intelligence™ company, today announced its participation in World IPv6 Launch, a global…

BlueCat Networks Receives “Strong Positive” Rating in Leading Analyst Firm’s 2012 DDI MarketScope Report
Toronto, Canada – April 10, 2012 – BlueCat Networks, the IPAM Intelligence™ company, today announced that it has received the highest possible…

BlueCat Networks Announces Organizational Changes to its EMEA and APAC Business Unit
Toronto, Canada and Amsterdam, The Netherlands – January 19, 2012 – BlueCat Networks, the IPAM Intelligence™ company, today announced important…

UK Cabinet Office Looks to BlueCat Networks’ Expertise and Best Practices for Securing Public Sector Network
Toronto, Canada – January 17, 2012 – BlueCat Networks, the IPAM Intelligence™ company, today announced that it has collaborated with the UK Cabinet…

BlueCat Networks Helps Organizations Transition to IPv6 with HP
Toronto, Canada – January 12, 2012 – BlueCat Networks, the IPAM Intelligence™ company, today announced that its IP Address Management (IPAM)…

BlueCat Networks to Host Webinar on DNS, DHCP and IP Address Management (DDI) Featuring Independent Research Firm
Toronto, Canada – January 10, 2012 – BlueCat Networks, the IPAM Intelligence™ company, will host a live webinar on January 19 featuring Forrester…

BlueCat Networks Discovers Security Vulnerability and Works with Internet Systems Consortium (ISC) to Rapidly Test and Verify the Fix
Toronto, Canada – December 15, 2011 – BlueCat Networks, the IPAM Intelligence™ company, recently announced the availability of a patch for its…

BlueCat Networks Partners with SEC DataCom to Deliver IPv6-Ready IP Address Management (IPAM) Solutions in Denmark
Amsterdam, The Netherlands – December 8, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced a distribution agreement with…

BlueCat Networks Partners with Computacenter to Deliver Cloud-Ready IP Address Management (IPAM)
Toronto, Canada; Walldorf, Germany and London, England – November 22, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced a…

BlueCat Networks Ranked One of the Fastest Growing Technology Companies in Canada in the Deloitte Technology Fast 50™
Toronto, Canada – October 19, 2011 – BlueCat Networks, the IPAM Intelligence™ company, that it is ranked among the Deloitte Technology Fast 50™, a…

IBM and BlueCat Networks Sign Patent Cross-License Agreement
Toronto, Canada – October 5, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced that it has entered into a patent…

BlueCat Networks’ New IPAM Release Reduces Network Administration Time and Effort by 80%
Toronto, Canada – September 27, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced the latest release of Proteus, the most…

BlueCat Networks’ IPv6-Ready Solutions Pass Critical Initial Milestone for Meeting Rigorous International Security Standards
Toronto, Canada – September 14, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced that its IP Address Management, DNS and…

BlueCat Networks Raises $16.8 Million from Leading Silicon Valley Venture Firm Trident Capital
Toronto, Canada – July 21, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced the completion of a $16.8 million round of…

BlueCat Networks Signs Patent Agreement With Intellectual Ventures
TORONTO and BELLEVUE, Wash. — June 28, 2011 — BlueCat Networks and Intellectual Ventures (IV®) announced today that BlueCat Networks has acquired…

BlueCat Networks to Host Multi-City IPv6 Roadshow and Webinar to Share Insight and IP Address Management Expertise on IPv6 Readiness
Toronto, Canada – June 7, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced a North American IPv6 Roadshow to address the…

BlueCat Networks Partners with Westcon Group to Strengthen European Distribution Channel
Amsterdam, Netherlands – May 17, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced a partnership with Westcon Group, a…

BlueCat Networks Sets New Industry Standard with Five-Hour On-Site Repair for IP Address Management, DNS and DHCP Hardware Appliances
Toronto, Canada – May 4, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced a new 5×7 standard Customer Care program to…

BlueCat Networks’ Proteus IP Address Management (IPAM) Solution Extends Microsoft® Windows® DNS and DHCP Infrastructure
Toronto, Canada – April 12, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced the general availability of Proteus for…

BlueCat Networks Strengthens ANZ Presence with WhiteGold Solutions Partnership
Australia – March 22, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced a partnership with WhiteGold Solutions, Australia’s…

BlueCat Networks Joins World IPv6 Day Trial to Promote IPv6 Preparedness
Toronto, Canada – February 15, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced that it will participate in World IPv6 Day…

BlueCat Networks Offers First DDI (DNS, DHCP & IPAM) Software Available on Cisco UCS Express: Will Demo Solution at Cisco Live Europe (Booth 30)
Toronto, Canada and London, England – January 24, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced that its Proteus IP…

BlueCat Networks Strengthens MENA and South Africa Presence with Quintica Partnership
Dubai – January 22nd, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced its partnership with Quintica, the leading information and…

BlueCat Networks Joins the Cisco Developer Network as a Registered Developer
Toronto, Canada – January 13, 2011 – BlueCat Networks, the IPAM Intelligence™ company, today announced that it has joined the Cisco Developer Network…
Enjoying LiveAssurance?
Share your throughts about LiveAssurance on the review platform PeerSpot.