Resources

Dive into our comprehensive library of DNS resources to learn more about our products, our customers and developments in our industry.

 
 
 
    Product video

    DNS as a Weapon in Cyber Security

    Bad actors know that DNS makes a great weapon in producing massive amounts of traffic for successful DDoS attacks. Here’s how.

    Read more
    Webinar

    DNS as Facilitator in Cyber Security

    The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.

    Read more
    Product video

    DNS as Hostage in Cyber Security

    DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.

    Read more
    Data sheet

    BlueCat DNS for Azure

    Powerful, software-driven DNS capabilities for Microsoft Azure Cloud

    Read more
    Webinar

    Making APIs Work for You (Part 1)

    Part 1: Get all the basics on BlueCat APIs, including best practices and important tips on specific API calls and code workflows.

    Read more
    Product video

    The Power of a Client-Facing DNS Firewall

    Learn why Adaptive DNS is the foundation for scalable, secure networks and critical to all of your digital transformation strategies.

    Read more
    Webinar

    Best Practices for Federal DNS Security

    Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment Guide for DNS, about securing…

    Read more
    Webinar

    Manageable Migrations – Moving to Adaptive DNS

    Find out why companies like Coca Cola, Home Depot, and TJX made the switch from VitalQIP to BlueCat from our migration experts

    Read more
    Webinar

    The Road to Network Virtualization

    Andrew Wertkin, BlueCat CTO, talks to Cerner and Dell about the core business drivers for implementing network virtualization and the impact of moving to a…

    Read more
    Product video

    DNS Edge Use Case – Compromised IOT Device

    DNS Edge Use Case – Compromised IOT Device

    Read more
    Product video
    Read more
    Product video
    Read more

    DNS glossary

    Understanding DDI can be challenging.

    All that jargon. All those acronyms. It’s why we’ve written an A-Z of DNS-related terms. You’ll never mix up ‘NSD’ and ‘NTP’ at a dinner party again…

    Want to speak to someone?

    Let’s talk about how our solutions can make your network faster and more secure.

    Contact us