Skip to content

EfficientIP

Why Protecting DNS Requires More Than Firewalls

(This week’s blog article was originally published in March 2017, but still rings true today). Way back when, in the early days of the Internet, all we needed to protect our systems was a firewall. You’d set up a Nokia box or a Cisco PIX, enable a few rules, and walk away, safe in the knowledge that your servers and services were protected. But the world has changed, and despite the hard work of the firewall vendors, the threat landscape...

GSLB & Automated Application Deployment

Deployment or migration of applications in multi-cloud infrastructures can be made simpler and faster by using GSLB configuration to connect users to the newly-released app. When automation is used in the context of application continuous deployment, making use of an automated DDI (DNS-DHCP-IPAM) solution which is capable of also handling applications is really valuable. This is what EfficientIP brings to automation teams with its application repository and its edge DNS GSLB solution. The multi-cloud mix of internal and external infrastructure...

Cloud to the Edge Brings IP Space Complexity

The future of cloud computing is near the edge. Edge computing brings compute and storage at the network perimeter, closer to usages. According to the ECCE (Edge Computing Consortium Europe) “The Edge Computing paradigm describes an approach to execute certain services closer to devices and thereby supplements centralized Cloud Computing solutions”. However, this new architecture approach brings with it infrastructure and network challenges. Included in this context of increased complexity are the IPAM repository and network functions such as DNS...

Why You Shouldn’t Rush Into DoH

While being a core component of the Internet, DNS remains one of the least secure protocols in active use. DNS security is a long-standing debate, with DNS privacy a much more recent matter and a source of division among the security community. Indeed, privacy matters and must weigh in the balance when considering DNS security. However, security is not only about confidentiality. Protocols such as DNS over TLS or DND over HTTPS must be leveraged wisely to strengthen network security,...

Application Traffic Routing with DNS GSLB

Application delivery to users is key in the digital transformation of enterprise processes. With the growing complexity of networks, hosting and application architecture, users still need to be directed to the best available component of the application. This is a challenge EfficientIP has accepted, and our DNS GSLB solution provides the answer with intelligent application traffic routing feature. IT systems have been shaken by multiple new approaches. Hybrid multi-cloud tends to distribute the workload on the most convenient and efficient...

SOLIDserver 7.1: Optimizing Application Traffic Routing & DNS Security Policy Management

The new release of SOLIDserver 7.1 confirms EfficientIP’s innovation and growth in key digital transformation areas concerning enterprise network security, IP resource management and application traffic routing, for both on-premise and multi-cloud environments. The release brings exciting new and updated functionality in three main sectors: 1) Application Traffic Management Maintaining accurate real-time visibility over deployed applications on a complex, multi-cloud, infrastructure and related IP resources is difficult. Ensuring the availability of these applications is an even greater challenge. The most...

Python Library for SOLIDserver

In the infrastructure as code and orchestration spaces, engineers frequently use programmatic languages such as Python. When using higher level automation tools like Ansible or Puppet the underlying language used is mostly one which is well known Python, Ruby or Golang. Communication with the network and system components needs to be performed with simple methods, REST APIs are very well designed for this purpose, they are easy to manipulate, actions are atomic, require no complex session to set up and...

Data Driven Network Security with Machine Learning

Today’s threats are sophisticated, malware deploys a long time prior to activation using complex command and control mechanisms, and theft of data and personal information is a strong motivation for hackers. In this context, DNS traffic plays a vital role in enterprise network security since it offers the possibility of seeing the intent of most traffic, whether it is legitimate or not. Countermeasures based on DNS provide an opportunity to filter a lot of malicious traffic, but DNS security requires...

IPAM Best Practices for Simplifying Network Management

We live in an IP-centric world. The explosion of IP addresses is being driven by increases in connected devices, apps, and mobility. The outcome is unmanageable network complexity, which is being magnified by IPv6 coexistence and multi-cloud. Network managers are consequently asking themselves: “how can I control my IP network if I can’t control IP resource allocation, access & routing?” Their top priority for the management of their networks has now become clear: simplification, driven by automation. This is achieved...

DDI – Measuring Real-World ROI

This week’s blog (originally published Feb 2017) is courtesy of guest author Kevin Tolly, Founder of The Tolly Group, an award-winning analyst, author and speaker with 30 years of experience in the Information Technology industry. Although almost always invisible to users, there would be no network communication at all without the humble IP address. Not only does every device – server, desktop and laptop PC, Mac, tablet, smartphone – have to have an IP address but those devices need also...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface