Skip to content

IPAM

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

Using DNS to Defend Against IoT Botnets

Sometimes cyberattacks come from a direction you weren’t really expecting. We all know about threats from ransomware, nation-state actors, industrial espionage, or hacker collectives looking for personally-identifiable information (particularly for credit cards). But we probably weren’t expecting our sites and services to be collateral damage in a small but nasty war in the world of Minecraft gaming server providers. That’s what seems to be the reason for the rise of the Mirai botnet, and its attacks on the Dyn cloud...

Modern DDI: Your Quick Answer to Technical Debt

We live in a world of networks, where users expect instant access to online services, and where our services need to rapidly respond to changes in demand. It’s a world driven by digital transformation, but one that’s held back by the brakes of technical debt. What is technical debt? At heart it’s a simple concept, initially from the world of software development, a way of describing the work that needs to be done before a system can be upgraded or...

2016 in Review: A Year of Network Security Landscape Changes

Network security and data protection remain at the top of many CIOs and CSOs’ agendas, as increasingly powerful privacy regulations threaten significant fines for breaches and information leaks. Getting security right means protecting the user first, with the added incentive of protecting a company’s revenues. Dealing with an ever-evolving and increasingly complicated threat landscape, organizations, more than ever need both the right mechanisms and approaches in place and start treating the problem, not just the symptoms. From millions of records...

IPAM: The Foundation of the Modern ISP

To deliver IT services successfully you need a system of record- one place that holds the details of all the devices running on your network, where they are and what they are doing. In most modern service management methodologies, that one place is a configuration management database, where service managers monitor and control changes. But in the cloud and at scale that, model breaks down. That’s why ISPs and telcos are starting to take a different approach to finding the...

Get Ready For the Future of Retail with DNS

Walk into a modern shop and you’ll see this new interface to the world of retail. It’s chip credit card readers, barcode scanners, smart e-paper price labels, intelligent posters, and Bluetooth beacons- a list that goes on and on and into the cloud. They’re tools that are bringing about new ways of selling, and are changing the face of retail in ways you wouldn’t expect. For instance, at its recent Dreamforce event, Salesforce notably demonstrated a tool that used Bluetooth...

All or Nothing: Why Partial Automation Does Not Work

As we build out cloud applications and networks, we need to change the way we deliver and manage IP addresses. Many of the tools we currently use were designed for the good old days, when we had one or two, or maybe tens of servers to support a single application- a server was deployed once and it sat in the datacenter for years. That’s all changed. We’re now deploying hundreds, even thousands, of virtual servers; taking advantage of the speed...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface