Skip to content

DNS

Access Control via DNS Applied to Parental Control

More and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...

Hybrid Workforce: Who’s Managing DNS?

Post pandemic situation sees the confirmation of working from home but also working from anywhere. After COVID-19, 92% of eligible people expect to work from home at least 1 day per week, and 80% expected to work at least 3 days from home per week according to a survey by Owl labs. Most enterprises seem to accept this new paradigm as it improves the overall productivity of the workforce. Provided the logistics of working outside the Enterprise can be addressed,...

Cybersquatting: The Basics Part 2 – How to Protect Yourself

In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On a Kali distribution, one can find a number of ready-to-use tools for typosquatting.Among these tools, “urlcrazy” is probably the best known. It is a very powerful tool, which from a domain name is able to generate other domain names with strong similarities and test their...

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation) and their related destinations. From there, security wise, one can decide what has to be done, allowing or denying source-destination combinations. Regarding granular visibility, DNS by nature sees all traffic intents at the earliest possible point in the IP traffic...

Top 5 IT Network and Security Predictions for 2022

Welcome to 2022, a year which promises to be full of turbulence with the pandemic still ongoing and organizations forced to adopt hybrid working models. Network security and privacy will no doubt be top of mind across all verticals, especially with users needing to access critical apps, services and data when working either on-premise or remotely. Risk limitation of IoT will also be essential as the number of devices grows exponentially driven by 5G, and smart cost-effective solutions for managing...

2021 Year in Review: Networking and Security in a Pandemic World

With the Covid pandemic still ongoing, 2021 turned out to be a very disruptive year for organizations and their network infrastructures. For every industry, cyberattacks remained top of mind as cases of ransomware and data theft continued to rise, putting the spotlight on zero trust strategies and threat protection solutions such as DNS Security and Application Access Control. Hybrid work models and multi cloud adoption also brought their own challenges, particularly in the areas of resource visibility, network management efficiency...

SOLIDserver NOT Impacted by Log4j Security Vulnerability

The EfficientIP SOLIDserver Solution is not affected by the security vulnerability described in the CVE-2021-44228 as it does not in any way use the Apache Log4j library. Following publicity around the Apache Log4j security vulnerability last week-end we have received a lot of calls from customers, partners and community friends asking about the possible impact on our DDI solution, especially on the API endpoint that may be used in all IT automation as the IPAM is the central source of...

DDI for Telco: Improving Business Continuity, Operational Efficiency and Scalability

For Telecom operators and Internet Service Providers, IP networks are becoming increasingly complex to manage and evolve. Multi cloud, IoT, 5G and other digital transformation projects have introduced “anything-as-a-software”, SD-WAN, NFV and SDN architectures and opened up new usages requiring ultra-low latency. DNS, DHCP and IPAM (known collectively as DDI) are critical technologies for IP networks, and together with automation are mandatory for simplifying management via zero-touch operations, while ensuring service availability and enhancing user experience. EfficientIP’s all-in-one solution integrates...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface