Blogs on DDI for Network Automation & Network Security DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance. Search Search Search Clear Categories Categories CategoriesNoneDDI (141)DNS (130)DNS Security (130)IPAM (104)Network Automation (68)Virtualization & Cloud (41)DHCP (32)Internet of Things (19)Application Traffic Routing (13)Privacy Laws (13)GDPR (11) Topics Topics TopicsNoneDNS (186)DDI Solutions (139)DDI (138)DDI Management (124)DDI Services (123)Network Automation (106)IPAM (102)DNS Security (99)DNS Solution (99)DNS Management (90) Sort Sort SortNoneBy NewestBy OldestBy Title (A-Z)By Title (Z-A) DNSDNS SecurityWhat Mr. Robot Can Teach Businesses About Network SecurityWe here at EfficientIP love a good scripted drama…and with the return of the USA Network series Mr. Robot last week, we’re ready for a summer of mixing business with pleasure. If you’re unfamiliar with the show, a basic plot...DNSDNS SecurityGDPRSecurity Meets Regulation – DNS and the GDPRThe newly announced GDPR (General Data Protection Regulation) is a European Union regulation which will further strengthen the protection of data within all the EU member states, replacing the Directive 95/46/EC of 1995. The regulation, in contrast to a directive,...DDIDNSDNS Security3 Ways To Rethink and Simplify Telecom DNSCyber-attacks and data leaks among telecommunication providers are a hot topic, especially after the DNS DDoS attack on UK’s ISP TalkTalk in October 2015. Four million customers were informed their sensitive personal information, including bank details, may have been stolen...DNS Security2016 Report – The Global DNS Threat SurveyThis year, EfficientIP pioneered the largest independent survey on DNS services and their importance in IT security attacks so far undertaken in the industry. Nearly 1,000 respondents have helped us better understand the technical and behavioral causes for the rise...DNSDNS SecurityUsing DNS To Protect Your Intellectual PropertyA typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards...DNS SecurityThe Internet of Things and DNS SecurityWhen we think of the Internet of Things, we usually think of smart home devices such as Nest’s intelligent thermostat, Amazon’s Echo or the recently announced Google Home. But they’re only a small part of a predicted explosion in the... Load more (223) 1234…373839Next
DNSDNS SecurityWhat Mr. Robot Can Teach Businesses About Network SecurityWe here at EfficientIP love a good scripted drama…and with the return of the USA Network series Mr. Robot last week, we’re ready for a summer of mixing business with pleasure. If you’re unfamiliar with the show, a basic plot...
DNSDNS SecurityGDPRSecurity Meets Regulation – DNS and the GDPRThe newly announced GDPR (General Data Protection Regulation) is a European Union regulation which will further strengthen the protection of data within all the EU member states, replacing the Directive 95/46/EC of 1995. The regulation, in contrast to a directive,...
DDIDNSDNS Security3 Ways To Rethink and Simplify Telecom DNSCyber-attacks and data leaks among telecommunication providers are a hot topic, especially after the DNS DDoS attack on UK’s ISP TalkTalk in October 2015. Four million customers were informed their sensitive personal information, including bank details, may have been stolen...
DNS Security2016 Report – The Global DNS Threat SurveyThis year, EfficientIP pioneered the largest independent survey on DNS services and their importance in IT security attacks so far undertaken in the industry. Nearly 1,000 respondents have helped us better understand the technical and behavioral causes for the rise...
DNSDNS SecurityUsing DNS To Protect Your Intellectual PropertyA typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards...
DNS SecurityThe Internet of Things and DNS SecurityWhen we think of the Internet of Things, we usually think of smart home devices such as Nest’s intelligent thermostat, Amazon’s Echo or the recently announced Google Home. But they’re only a small part of a predicted explosion in the...