DNSDNS SecurityAccess Control via DNS Applied to Parental ControlMore and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...
DDIDNSDNS SecurityIPAMSOLIDserver 8.1: Simplifying Multi Cloud Management and App Access ControlThe Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...
DDIDNSDNS SecurityHybrid Workforce: Who’s Managing DNS?Post pandemic situation sees the confirmation of working from home but also working from anywhere. After COVID-19, 92% of eligible people expect to work from home at least 1 day per week, and 80% expected to work at least 3 days from home per week according to a survey by Owl labs. Most enterprises seem to accept this new paradigm as it improves the overall productivity of the workforce. Provided the logistics of working outside the Enterprise can be addressed,...
DNSDNS SecurityCybersquatting: The Basics Part 2 – How to Protect YourselfIn part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On a Kali distribution, one can find a number of ready-to-use tools for typosquatting.Among these tools, “urlcrazy” is probably the best known. It is a very powerful tool, which from a domain name is able to generate other domain names with strong similarities and test their...
DNSDNS SecurityCybersquatting: The Basics Part 1 – Strategies and Attack TypesDNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...
DNSDNS SecurityAugmenting Zero Trust: Why Using DNS Allow Lists is a No-BrainerYou can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation) and their related destinations. From there, security wise, one can decide what has to be done, allowing or denying source-destination combinations. Regarding granular visibility, DNS by nature sees all traffic intents at the earliest possible point in the IP traffic...
DDIDNSDNS SecurityIPAMNetwork AutomationTop 5 IT Network and Security Predictions for 2022Welcome to 2022, a year which promises to be full of turbulence with the pandemic still ongoing and organizations forced to adopt hybrid working models. Network security and privacy will no doubt be top of mind across all verticals, especially with users needing to access critical apps, services and data when working either on-premise or remotely. Risk limitation of IoT will also be essential as the number of devices grows exponentially driven by 5G, and smart cost-effective solutions for managing...
DDIDNSDNS Security2021 Year in Review: Networking and Security in a Pandemic WorldWith the Covid pandemic still ongoing, 2021 turned out to be a very disruptive year for organizations and their network infrastructures. For every industry, cyberattacks remained top of mind as cases of ransomware and data theft continued to rise, putting the spotlight on zero trust strategies and threat protection solutions such as DNS Security and Application Access Control. Hybrid work models and multi cloud adoption also brought their own challenges, particularly in the areas of resource visibility, network management efficiency...
DDIDHCPDNSIPAMSOLIDserver NOT Impacted by Log4j Security VulnerabilityThe EfficientIP SOLIDserver Solution is not affected by the security vulnerability described in the CVE-2021-44228 as it does not in any way use the Apache Log4j library. Following publicity around the Apache Log4j security vulnerability last week-end we have received a lot of calls from customers, partners and community friends asking about the possible impact on our DDI solution, especially on the API endpoint that may be used in all IT automation as the IPAM is the central source of...
DDIDNSDNS SecurityIPAMDDI for Telco: Improving Business Continuity, Operational Efficiency and ScalabilityFor Telecom operators and Internet Service Providers, IP networks are becoming increasingly complex to manage and evolve. Multi cloud, IoT, 5G and other digital transformation projects have introduced “anything-as-a-software”, SD-WAN, NFV and SDN architectures and opened up new usages requiring ultra-low latency. DNS, DHCP and IPAM (known collectively as DDI) are critical technologies for IP networks, and together with automation are mandatory for simplifying management via zero-touch operations, while ensuring service availability and enhancing user experience. EfficientIP’s all-in-one solution integrates...