Resources
Dive into our comprehensive library of DNS resources to learn more about our products, our customers and developments in our industry.

DNS as Facilitator in Cyber Security
The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.

DNS as Hostage in Cyber Security
DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.

BlueCat DNS for Azure
Powerful, software-driven DNS capabilities for Microsoft Azure Cloud

Making APIs Work for You (Part 1)
Part 1: Get all the basics on BlueCat APIs, including best practices and important tips on specific API calls and code workflows.

The Power of a Client-Facing DNS Firewall
Learn why Adaptive DNS is the foundation for scalable, secure networks and critical to all of your digital transformation strategies.

Best Practices for Federal DNS Security
Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment Guide for DNS, about securing…

Manageable Migrations – Moving to Adaptive DNS
Find out why companies like Coca Cola, Home Depot, and TJX made the switch from VitalQIP to BlueCat from our migration experts

The Road to Network Virtualization
Andrew Wertkin, BlueCat CTO, talks to Cerner and Dell about the core business drivers for implementing network virtualization and the impact of moving to a…

DNS Edge Use Case – Compromised IOT Device
DNS Edge Use Case – Compromised IOT Device

Exposing the Enemy Within Webinar
Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network
DNS glossary
Understanding DDI can be challenging.
All that jargon. All those acronyms. It’s why we’ve written an A-Z of DNS-related terms. You’ll never mix up ‘NSD’ and ‘NTP’ at a dinner party again…

Want to speak to someone?
Let’s talk about how our solutions can make your network faster and more secure.