Resources

Dive into our comprehensive library of DNS resources to learn more about our products, our customers and developments in our industry.

 
 
 
    Product video

    BlueCat DNS Edge

    BlueCat DNS Edge leverages your existing DNS infrastructure to give you visibility, control, and detection capabilities to help protect sensitive data and…

    Read more
    Webinar

    Making APIs Work for You (Part 6)

    Play video After introducing you to the world of API and taking a deep dive into BAM for the IP spaces, in the sixth installment of API services we will be…

    Read more
    Webinar

    Making APIs Work for You (Part 5)

    Welcome to Part 5 of Making APIs Work for You. Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security…

    Read more
    Webinar

    Making APIs Work for You (Part 4)

    Play video Community Specialist, Vivek Mistry, who will be taking you through our “Making APIs Work for You” Series. Today Vivek is going to focus on…

    Read more
    Webinar

    Making APIs Work for You (Part 3)

    Play video BlueCat APIs facilitate dynamic interaction with your network ecosystem that enable the rapid delivery of services while retaining complete…

    Read more
    Webinar

    The Threat Hunter’s New Weapon: DNS Data

    Chief Cybersecurity Officer for Cyxtera, Chris Day talks about the evolution of cybersecurity and rise of the threat hunter role.

    Read more
    Webinar

    Making APIs Work for You (Part 2)

    Part 2: Use APIs to get information from IP blocks, networks, and addresses, and learn how to search and filter data from BlueCat Address Manager.

    Read more
    Webinar

    Breach, Blame, Repeat

    World renowned cyber security expert, Dick Clarke, advises on breaking the cycle of breach and blame by evolving the role of the CISO.

    Read more
    Product video

    DNS as a Weapon in Cyber Security

    Bad actors know that DNS makes a great weapon in producing massive amounts of traffic for successful DDoS attacks. Here’s how.

    Read more
    Webinar

    DNS as Facilitator in Cyber Security

    The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.

    Read more
    Product video

    DNS as Hostage in Cyber Security

    DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.

    Read more
    Data sheet

    BlueCat DNS for Azure

    Powerful, software-driven DNS capabilities for Microsoft Azure Cloud

    Read more

    DNS glossary

    Understanding DDI can be challenging.

    All that jargon. All those acronyms. It’s why we’ve written an A-Z of DNS-related terms. You’ll never mix up ‘NSD’ and ‘NTP’ at a dinner party again…

    Want to speak to someone?

    Let’s talk about how our solutions can make your network faster and more secure.

    Contact us