Skip to content

API

NetSecOps: Why Source of Truth & Automation is Key to IT Success

From management perspectives, IT automation is a useful solution for issues related to productivity, agility, scalability and lack of resources of the IT teams. But implementing automation in IT is not an easy transformation. It requires having technical leadership, defining the most suitable actions to target, using appropriate tooling, storing data, writing automation code and globally transforming the entire organization and processes in place. Organizations today have realized that trusted data is key for enabling automation. Therefore, many of their...

DNS Security for Retail: Protecting Revenue & Brand

The work-from-anywhere environment has accelerated the transition to the cloud, e-commerce and in-store retailers are experiencing heightened security risks. Risks that lead to more network downtime and data theft potential. Cybersecurity incidents can hit a retailer’s reputation hard, causing customers to switch allegiance to a competitor. Smart DNS security offers the network visibility and analytics that retailers require for having the confidence to withstand potential cyber-attacks. Confidence in their capability to recover quickly and safeguard consumer data. While maintaining a...

SOLIDserver 8.2: Enhancing Network Automation and Cloud Asset Management

With the Release 8.2 of SOLIDserver, IT teams including CloudOps, DevOps, and NetSecOps are provided with two new products that strengthen their capability to better view cloud instances and network objects to accelerate their automation journey, increasing their agility and help decision-making to sustain business needs. Complementary benefits can be envisaged around enhanced cost control, risk management, and meeting compliance. These significant benefits are brought by the following two major products introduced with Release 8.2: Cloud Observer: Centralized Visibility Over...

How Telcos Overcome Rising DNS Attacks

Telecommunication operators control and run the critical infrastructure vital for communicating and storing large amounts of sensitive data. This makes them an obvious major target for cyber attacks, frequently using DNS as an attack vector to cause devastating impacts on internet connectivity and data confidentiality. According to a recent IDC security report, Telcos are the 2nd most targeted vertical, with 94 percent of them suffering DNS attacks. Other reports estimate each DDoS attack carried out through DNS costs over $220,000...

DNS RFCs: The Elephant in the Room – Part 1

DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an “RFC” The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...

DNS Security for Healthcare: Controlling Connected Devices and Protecting Patient Data

Over the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...

Enhancing Visibility & Control Over Google Cloud Platform with IPAM Sync

Today, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...

Why IPAM Repository is the Key Enabler for Network Automation

Nowadays, things are moving quickly and nothing is set in stone. The same is true for IT and networking services. Today, deploying applications or websites must be done quickly for faster Time-to-Service but in addition, must be done as many times as required to account for the necessary functional upgrades or mandatory security patches. So, most of the mundane IT and networking tasks must now be thought of in terms of cycles with their seasonalities and not as a one-off...

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation) and their related destinations. From there, security wise, one can decide what has to be done, allowing or denying source-destination combinations. Regarding granular visibility, DNS by nature sees all traffic intents at the earliest possible point in the IP traffic...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface