Showing content for :
189 posts
BlueCat and Axonius Provide a New Level of Visibility into Network Devices and Activity
BlueCat and Axonius have teamed up to provide visibility into network devices which can only be detected through DNS traffic.
Protecting Your Data Migration
With BlueCat’s Intelligent DNS, you can protect against downtime by controlling the DNS resolution path.
Reduce attack surfaces with DNS
In this video, learn how to reduce your attack surface with BlueCat DNS Edge by setting client-level policies and locking down single-use devices.
Forensic investigation using DNS for faster incident response
In this video, learn how BlueCat DNS Edge provides investigative insight and faster responses for security breaches and helps reduce attack surfaces.
Harvesting DNS data for DNS security
Play video “So I’ve got a giant pile of DNS logs… How much is enough? Where do I start?” – Security Analysts…
Three Cloud Migration Myths Putting Organizations at Risk
IT teams make a lot of assumptions about network infrastructure when they’re migrating to the cloud. We dispel some of the myths about cloud DNS.
Intelligent Forwarding
BlueCat’s intelligent DNS simplifies DNS management across environments, reduces complexity, and avoids costly errors.
Why you should pay attention to DNS tunneling
DNS tunneling transmits information through the protocol that usually resolves network addresses. Your DNS data can provide clues to help keep it at bay.
The value of DNS response data for securing your network
Logging a DNS query only tells a fraction of the story. With Intelligent Security, we’ve changed the paradigm by logging DNS responses as well, uncovering…
Network Demo #1 Edge Can Reduce Complexity
Conditional forwarders are a major pain for network administrators, particularly in hybrid cloud environments. Here’s how BlueCat simplifies matters.
How Internal Dysfunction is Putting Your Network at Risk
In a recent report by IDG, it was found that 86% of organizations have suffered repercussions, including increased security breaches and data loss, due to…