DNS archives

BlueCat DNS Edge Solution Overview

In this video, you’ll get a high-level overview of how DNS Edge works, as well as its capabilities.

Read more

BlueCat DNS Edge

BlueCat DNS Edge leverages your existing DNS infrastructure to give you visibility, control, and detection capabilities to help protect sensitive data and…

Read more
Read more

BlueCat Adaptive DNS Solutions for Cloud

BlueCat DNS Integrity for Cloud solutions allow the configuration, management, and deployment of Adaptive DNS services in the public cloud.

Read more

BlueCat DNS Edge Just Got More Powerful

The latest release of DNS Edge is now live and includes a number of new features like multi-namespace support for better routing, enhanced volumetric…

Read more

BlueCat DNS Edge for Splunk

Gain critical insights into security policy events from all of your BlueCat DNS Edge service points using Splunk – – a central dashboard for relevant…

Read more

Step into the Customer Portal: Getting the Most Out of BlueCat

Are you a BlueCat customer looking to get more out of your enterprise software?

Read more

APIs and data: The way to your IT organization’s heart

Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.

Read more

What we learned at Cisco Live Barcelona

Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.

Read more

The Age of Network Automation: Takeaways from our New York User Group

What do you get when you combine DNS experts from some of North America’s leading brands? A collection of insights that serve as a compass for the…

Read more

Why the Cyber Threat Hunter Needs DNS

In our latest webinar in our cyber security series, we welcome Cyxtera Cyber Security Officer Chris Day.

Read more

The Threat Hunter’s New Weapon: DNS Data

Chief Cybersecurity Officer for Cyxtera, Chris Day talks about the evolution of cybersecurity and rise of the threat hunter role.

Read more