how to guide archives

Live Demo of BlueCat Gateway 18.10.1

Automating your DNS infrastructure has never been easier. This video shows how DNS Gateway simplifies the automation of standard DNS tasks such as adding…

Read more

How to Prepare DNS Infrastructure for a JEDI Cloud Migration

Now that the DOD JEDI cloud contract has finally been awarded, DOD agencies are starting to plan for their transition to the Microsoft Azure cloud.…

Read more

Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It

Development teams, especially at the world’s largest organizations, move at a lightning pace. Not just to keep their businesses competitive, but also to…

Read more

CSO Online: How to make security analytics work for your organization

Find out how to best configure security analytics so they drive meaningful and actionable insights for your organization.

Read more

eWeek: How to Alleviate the 15 Top Stressors in IT Systems

Most IT security professionals harbor a certain amount of conservatism: The enthusiasm for all things new and innovative is tempered by skepticism about…

Read more

8 Tips to Maximize Your BlueCat Solution

During our instructor-led BlueCat Customer training courses, there’s a great deal of interaction between the students and our trainers.

Read more

The Future of IT: How to Prepare for SDN and M2M

In this article, we demystify SDN and M2M and discuss the role of IP address management and automation in preparing your network and IT staff for an SDN and…

Read more

How to Actualize the Benefits of Virtualization

When first introduced, the driver for virtualization was consolidation and cost savings.

Read more

How to Reach the Full Potential of Cloud

There has long been a debate on what exactly cloud computing is and how it can benefit IT and business.

Read more

BlueCat has acquired LiveAction

It’s official! BlueCat has acquired LiveAction’s network observability and intelligence platform, which helps large enterprises optimize the performance, resiliency, and security of their networks.