DNSDNS SecurityWhy Protecting DNS Requires More Than Firewalls(This week’s blog article was originally published in March 2017, but still rings true today). Way back when, in the early days of the Internet, all we needed to protect our systems was a firewall. You’d set up a Nokia box or a Cisco PIX, enable a few rules, and walk away, safe in the knowledge that your servers and services were protected. But the world has changed, and despite the hard work of the firewall vendors, the threat landscape...
Application Traffic RoutingDDIDNSIPAMGSLB & Automated Application DeploymentDeployment or migration of applications in multi-cloud infrastructures can be made simpler and faster by using GSLB configuration to connect users to the newly-released app. When automation is used in the context of application continuous deployment, making use of an automated DDI (DNS-DHCP-IPAM) solution which is capable of also handling applications is really valuable. This is what EfficientIP brings to automation teams with its application repository and its edge DNS GSLB solution. The multi-cloud mix of internal and external infrastructure...
DDIInternet of ThingsIPAMVirtualization & CloudCloud to the Edge Brings IP Space ComplexityThe future of cloud computing is near the edge. Edge computing brings compute and storage at the network perimeter, closer to usages. According to the ECCE (Edge Computing Consortium Europe) “The Edge Computing paradigm describes an approach to execute certain services closer to devices and thereby supplements centralized Cloud Computing solutions”. However, this new architecture approach brings with it infrastructure and network challenges. Included in this context of increased complexity are the IPAM repository and network functions such as DNS...
DDIDNSDNS SecurityWhy You Shouldn’t Rush Into DoHWhile being a core component of the Internet, DNS remains one of the least secure protocols in active use. DNS security is a long-standing debate, with DNS privacy a much more recent matter and a source of division among the security community. Indeed, privacy matters and must weigh in the balance when considering DNS security. However, security is not only about confidentiality. Protocols such as DNS over TLS or DND over HTTPS must be leveraged wisely to strengthen network security,...
Application Traffic RoutingDDIDNSApplication Traffic Routing with DNS GSLBApplication delivery to users is key in the digital transformation of enterprise processes. With the growing complexity of networks, hosting and application architecture, users still need to be directed to the best available component of the application. This is a challenge EfficientIP has accepted, and our DNS GSLB solution provides the answer with intelligent application traffic routing feature. IT systems have been shaken by multiple new approaches. Hybrid multi-cloud tends to distribute the workload on the most convenient and efficient...
DDIDHCPDNSIPAMNetwork AutomationSOLIDserver 7.1: Optimizing Application Traffic Routing & DNS Security Policy ManagementThe new release of SOLIDserver 7.1 confirms EfficientIP’s innovation and growth in key digital transformation areas concerning enterprise network security, IP resource management and application traffic routing, for both on-premise and multi-cloud environments. The release brings exciting new and updated functionality in three main sectors: 1) Application Traffic Management Maintaining accurate real-time visibility over deployed applications on a complex, multi-cloud, infrastructure and related IP resources is difficult. Ensuring the availability of these applications is an even greater challenge. The most...
DDIIPAMNetwork AutomationPython Library for SOLIDserverIn the infrastructure as code and orchestration spaces, engineers frequently use programmatic languages such as Python. When using higher level automation tools like Ansible or Puppet the underlying language used is mostly one which is well known Python, Ruby or Golang. Communication with the network and system components needs to be performed with simple methods, REST APIs are very well designed for this purpose, they are easy to manipulate, actions are atomic, require no complex session to set up and...
DNSDNS SecurityData Driven Network Security with Machine LearningToday’s threats are sophisticated, malware deploys a long time prior to activation using complex command and control mechanisms, and theft of data and personal information is a strong motivation for hackers. In this context, DNS traffic plays a vital role in enterprise network security since it offers the possibility of seeing the intent of most traffic, whether it is legitimate or not. Countermeasures based on DNS provide an opportunity to filter a lot of malicious traffic, but DNS security requires...
DDIIPAMNetwork AutomationIPAM Best Practices for Simplifying Network ManagementWe live in an IP-centric world. The explosion of IP addresses is being driven by increases in connected devices, apps, and mobility. The outcome is unmanageable network complexity, which is being magnified by IPv6 coexistence and multi-cloud. Network managers are consequently asking themselves: “how can I control my IP network if I can’t control IP resource allocation, access & routing?” Their top priority for the management of their networks has now become clear: simplification, driven by automation. This is achieved...
DDIDHCPDNSIPAMNetwork AutomationDDI – Measuring Real-World ROIThis week’s blog (originally published Feb 2017) is courtesy of guest author Kevin Tolly, Founder of The Tolly Group, an award-winning analyst, author and speaker with 30 years of experience in the Information Technology industry. Although almost always invisible to users, there would be no network communication at all without the humble IP address. Not only does every device – server, desktop and laptop PC, Mac, tablet, smartphone – have to have an IP address but those devices need also...