Skip to content

Blogs on DDI for Network Automation & Network Security

DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance.

Integrated DDI: The Hidden Helper for Network Management Visibility

Technology provides a plethora of solutions to keep businesses innovating. But implementing these ideas into a successful IT transformation initiative involves making sure the basic IT infrastructure, on which this innovation is built, stays secure. This requires a modern network infrastructure as a foundational pillar and the implementation of a robust DNS, DHCP and IPAM (DDI) solution. Such a foundation can be far more strategic than it immediately seems. The hidden helper The smart integration of what many regard as...

Win the Battle Against Connected Devices with DNS Security

Connected cameras, vending machines and light bulbs have become the unexpected vectors of the latest cyberattacks. These are just the beginning of a long list of Internet of Things devices used by hackers to take down businesses or steal data. But where should the blame lie for this new DNS Security threat? The promise of connected devices was one of a better life. We loved the idea of making things easier with access to more services at the same time....

Using DNS to Defend Against IoT Botnets

Sometimes cyberattacks come from a direction you weren’t really expecting. We all know about threats from ransomware, nation-state actors, industrial espionage, or hacker collectives looking for personally-identifiable information (particularly for credit cards). But we probably weren’t expecting our sites and services to be collateral damage in a small but nasty war in the world of Minecraft gaming server providers. That’s what seems to be the reason for the rise of the Mirai botnet, and its attacks on the Dyn cloud...

Ensuring GDPR Compliance by Preventing DNS Exfiltration

The implementation of the EU’s new General Data Protection Regulation (GDPR) is now a bit more than a year away. It’s a wide-reaching set of rules which you must comply with if you’re holding data about European citizens. Compliance doesn’t need to be difficult though, as much of GDPR is focused on how you handle data loss and network breaches. To avoid catastrophic fines after breaches, the easiest way to become compliant is simple: you need to enhance your security....

Modern DDI: Your Quick Answer to Technical Debt

We live in a world of networks, where users expect instant access to online services, and where our services need to rapidly respond to changes in demand. It’s a world driven by digital transformation, but one that’s held back by the brakes of technical debt. What is technical debt? At heart it’s a simple concept, initially from the world of software development, a way of describing the work that needs to be done before a system can be upgraded or...

Public Sector Network Security: A Race Against Time

As we move more and more of our government-citizen interactions online, making sure we have access to those services becomes increasingly important. After all, we don’t want to be collateral victims of a DDoS attack on a government server just as we’re trying to submit our tax returns. Even more important is ensuring the personal information that the public sector (both local and national government) stores is secure. Databases of government-held information are the most worrying, whether they’re run by...

2016 in Review: A Year of Network Security Landscape Changes

Network security and data protection remain at the top of many CIOs and CSOs’ agendas, as increasingly powerful privacy regulations threaten significant fines for breaches and information leaks. Getting security right means protecting the user first, with the added incentive of protecting a company’s revenues. Dealing with an ever-evolving and increasingly complicated threat landscape, organizations, more than ever need both the right mechanisms and approaches in place and start treating the problem, not just the symptoms. From millions of records...

IPAM: The Foundation of the Modern ISP

To deliver IT services successfully you need a system of record- one place that holds the details of all the devices running on your network, where they are and what they are doing. In most modern service management methodologies, that one place is a configuration management database, where service managers monitor and control changes. But in the cloud and at scale that, model breaks down. That’s why ISPs and telcos are starting to take a different approach to finding the...

Fighting DDoS Attacks with Hybrid DNS

DNS security has been in the news again, with one of the largest DDoS attacks ever disrupting the Dyn cloud DNS service. At least 150,000 compromised devices (including IoT hardware) were used by the Mirai botnet to bombard cloud-hosted DNS servers with DNS requests, taking down access to many of the Internet’s most popular services. It’s not the only major service provider that’s had a DNS-based attack in the last few weeks, with Singapore’s StarHub reporting a similar incident. What...

Get Ready For the Future of Retail with DNS

Walk into a modern shop and you’ll see this new interface to the world of retail. It’s chip credit card readers, barcode scanners, smart e-paper price labels, intelligent posters, and Bluetooth beacons- a list that goes on and on and into the cloud. They’re tools that are bringing about new ways of selling, and are changing the face of retail in ways you wouldn’t expect. For instance, at its recent Dreamforce event, Salesforce notably demonstrated a tool that used Bluetooth...

Anyone For Tennis? Serving Up Secure DNS

If you think about the ideal scenario for a hacker to gain access to systems, you would come up with a large attack surface and lots of opportunity to disguise attacks as genuine network access. Imagine a network with thousands of potentially unauthenticated devices converging in a short period of time, producing extreme spikes in traffic. Sound like the crowd at a sporting event? Going for gold – the motivation of elite hackers In many ways, the attacks facing the...

IT Teams – Beware of Accidental Fame Thanks to GDPR

Fame is something most IT practitioners never experience, nor desire. However, this IT instinct to stay ‘below the radar’ is about to be challenged in a way many did not foresee, due to formidable EU data regulations. For those who do not exercise care, the outcome may make some IT infrastructure experts accidentally famous – in a bad way. While the new General Data Protection Regulation (GDPR) legislation may seem a world away from IT infrastructure and IP provisioning, it...