Blogs on DDI for Network Automation & Network Security DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance. Search Search Search Clear Categories Categories CategoriesNoneDDI (61)IPAM (50)DNS (40)Network Automation (35)DNS Security (30)Virtualization & Cloud (20)DHCP (10)Application Traffic Routing (8)Internet of Things (6)Privacy Laws (4)GDPR (1) Topics Topics TopicsNoneAPI (76)DDI Solutions (62)DDI (58)DNS (55)DDI Management (54)DDI Services (54)Network Automation (54)IPAM (49)DNS Management (47)IP Address Management (41) Sort Sort SortNoneBy NewestBy OldestBy Title (A-Z)By Title (Z-A) Privacy LawsUnderstanding Privacy ShieldDifferent parts of the world have different views of how we need to treat personally-identifiable information. Europe takes a much stronger view of personal privacy than the US, with a focus on giving users control of their personal information: no matter who holds the data, the user has the right to determine how it’s used – and must be informed of what’s being collected and why. For Europeans, personal privacy is a fundamental right, the result of a century of...DDIVirtualization & CloudDDI In Cloud ServicesThe promise of the cloud is one of scalability- of applications and services that can scale on demand according to the need, booking only appropriate compute and storage capacity. That means designing resource provisioning processes capable of handling both public and private cloud technologies, while building appropriate orchestration tools to automate them. In the cloud, you’re not working with one or two servers deployed for years. Instead it’s hundreds and thousands of dynamic instances, providing just the compute you need,...DNSDNS SecurityWhat Mr. Robot Can Teach Businesses About Network SecurityWe here at EfficientIP love a good scripted drama…and with the return of the USA Network series Mr. Robot last week, we’re ready for a summer of mixing business with pleasure. If you’re unfamiliar with the show, a basic plot synopsis: Hacktivist group FSociety is on a mission to overthrow E Corp, a conglomerate that manufactures phones, computers and devices, and also happens to run a giant banking and consumer credit division. Led by unhinged vigilante hacker Elliot Alderson, FSociety...DNSDNS SecurityGDPRSecurity Meets Regulation – DNS and the GDPRThe newly announced GDPR (General Data Protection Regulation) is a European Union regulation which will further strengthen the protection of data within all the EU member states, replacing the Directive 95/46/EC of 1995. The regulation, in contrast to a directive, needs no authorizing legislation to be passed by governments. More importantly, it is not just limited to the European Union- all non-EU organizations which share EU citizens’ personal data are also covered by the new law. That includes almost every...DDIDNSDNS Security3 Ways To Rethink and Simplify Telecom DNSCyber-attacks and data leaks among telecommunication providers are a hot topic, especially after the DNS DDoS attack on UK’s ISP TalkTalk in October 2015. Four million customers were informed their sensitive personal information, including bank details, may have been stolen by hackers. Cyber attacks are now clearly strategic threats for telcos, many of whom have fundamental issues related to the modernization of their core systems which have often evolved as the result of several merges and often not robust enough...DNS Security2016 Report – The Global DNS Threat SurveyThis year, EfficientIP pioneered the largest independent survey on DNS services and their importance in IT security attacks so far undertaken in the industry. Nearly 1,000 respondents have helped us better understand the technical and behavioral causes for the rise in DNS vulnerabilities and attacks, and the effects on businesses. The survey proves DNS servers have become much more exploited than ever, and hackers often owe their ‘success’ to weak DNS defenses that no longer suit the needs of a...DNSDNS SecurityUsing DNS To Protect Your Intellectual PropertyA typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards and personal information, or perhaps they’re after your intellectual property. But how do they get that data out of your network? Most intrusion detection software looks at the obvious patterns of data exfiltration: over HTTP connections and through FTP. This...DNS SecurityThe Internet of Things and DNS SecurityWhen we think of the Internet of Things, we usually think of smart home devices such as Nest’s intelligent thermostat, Amazon’s Echo or the recently announced Google Home. But they’re only a small part of a predicted explosion in the number of devices – and in the services they are going to use. Tomorrow’s internet is one where machines and devices outnumber the PCs and smartphones that access the information they deliver. Just take a look at the announcements from...DDIDNSDNS SecuritySecurity Protection Through Hybrid DNSThe more we use the internet, the more important DNS becomes. For such an important service it’s odd that DNS is virtually invisible. We rely on it for everything, but we don’t treat it like an essential service; instead we set it up and ignore it. DNS is far too important to be left alone. You need to manage it carefully, building a DNS architecture that scales and is secure. That last part is the hardest, and the most important.... Load more (66) 1234…678Next
Privacy LawsUnderstanding Privacy ShieldDifferent parts of the world have different views of how we need to treat personally-identifiable information. Europe takes a much stronger view of personal privacy than the US, with a focus on giving users control of their personal information: no matter who holds the data, the user has the right to determine how it’s used – and must be informed of what’s being collected and why. For Europeans, personal privacy is a fundamental right, the result of a century of...
DDIVirtualization & CloudDDI In Cloud ServicesThe promise of the cloud is one of scalability- of applications and services that can scale on demand according to the need, booking only appropriate compute and storage capacity. That means designing resource provisioning processes capable of handling both public and private cloud technologies, while building appropriate orchestration tools to automate them. In the cloud, you’re not working with one or two servers deployed for years. Instead it’s hundreds and thousands of dynamic instances, providing just the compute you need,...
DNSDNS SecurityWhat Mr. Robot Can Teach Businesses About Network SecurityWe here at EfficientIP love a good scripted drama…and with the return of the USA Network series Mr. Robot last week, we’re ready for a summer of mixing business with pleasure. If you’re unfamiliar with the show, a basic plot synopsis: Hacktivist group FSociety is on a mission to overthrow E Corp, a conglomerate that manufactures phones, computers and devices, and also happens to run a giant banking and consumer credit division. Led by unhinged vigilante hacker Elliot Alderson, FSociety...
DNSDNS SecurityGDPRSecurity Meets Regulation – DNS and the GDPRThe newly announced GDPR (General Data Protection Regulation) is a European Union regulation which will further strengthen the protection of data within all the EU member states, replacing the Directive 95/46/EC of 1995. The regulation, in contrast to a directive, needs no authorizing legislation to be passed by governments. More importantly, it is not just limited to the European Union- all non-EU organizations which share EU citizens’ personal data are also covered by the new law. That includes almost every...
DDIDNSDNS Security3 Ways To Rethink and Simplify Telecom DNSCyber-attacks and data leaks among telecommunication providers are a hot topic, especially after the DNS DDoS attack on UK’s ISP TalkTalk in October 2015. Four million customers were informed their sensitive personal information, including bank details, may have been stolen by hackers. Cyber attacks are now clearly strategic threats for telcos, many of whom have fundamental issues related to the modernization of their core systems which have often evolved as the result of several merges and often not robust enough...
DNS Security2016 Report – The Global DNS Threat SurveyThis year, EfficientIP pioneered the largest independent survey on DNS services and their importance in IT security attacks so far undertaken in the industry. Nearly 1,000 respondents have helped us better understand the technical and behavioral causes for the rise in DNS vulnerabilities and attacks, and the effects on businesses. The survey proves DNS servers have become much more exploited than ever, and hackers often owe their ‘success’ to weak DNS defenses that no longer suit the needs of a...
DNSDNS SecurityUsing DNS To Protect Your Intellectual PropertyA typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards and personal information, or perhaps they’re after your intellectual property. But how do they get that data out of your network? Most intrusion detection software looks at the obvious patterns of data exfiltration: over HTTP connections and through FTP. This...
DNS SecurityThe Internet of Things and DNS SecurityWhen we think of the Internet of Things, we usually think of smart home devices such as Nest’s intelligent thermostat, Amazon’s Echo or the recently announced Google Home. But they’re only a small part of a predicted explosion in the number of devices – and in the services they are going to use. Tomorrow’s internet is one where machines and devices outnumber the PCs and smartphones that access the information they deliver. Just take a look at the announcements from...
DDIDNSDNS SecuritySecurity Protection Through Hybrid DNSThe more we use the internet, the more important DNS becomes. For such an important service it’s odd that DNS is virtually invisible. We rely on it for everything, but we don’t treat it like an essential service; instead we set it up and ignore it. DNS is far too important to be left alone. You need to manage it carefully, building a DNS architecture that scales and is secure. That last part is the hardest, and the most important....