Application Traffic RoutingDDIDNS SecurityIPAMNetwork AutomationVirtualization & CloudPredictions 2020: Networks and IT Biggest ImpactsFrom 5G driving SDN and NFV, to exploding enterprise apps, edge computing, connected hybrid clouds and, of course, cybersecurity, the new decade in 2020 promises to be very eventful for network and security managers across the globe. Here are our predictions for the top five trends that will shape technology and the networks industry in the coming year. 1. Infrastructure will move closer to the edge Progressing towards multiple clouds is a really smart move. It helps ease digital transformation...
Application Traffic RoutingDDIHow Edge DNS GSLB Ensures App Availability During WAN FailureDetecting IP path failures on enterprise networks is becoming increasingly complex with SD-WAN and multi-cloud approaches. Regardless of the way networking and hosting is being performed by the IT guys, users need to always be able to use their applications, so it’s absolutely vital to circumvent WAN failure scenarios. Edge DNS GSLB (Global Server Load Balancing) is a great solution for this. DNS already plays a crucial part in the user to application binding process. Adding GSLB functionality to DNS...
Application Traffic RoutingDDIDNSIPAMGSLB & Automated Application DeploymentDeployment or migration of applications in multi-cloud infrastructures can be made simpler and faster by using GSLB configuration to connect users to the newly-released app. When automation is used in the context of application continuous deployment, making use of an automated DDI (DNS-DHCP-IPAM) solution which is capable of also handling applications is really valuable. This is what EfficientIP brings to automation teams with its application repository and its edge DNS GSLB solution. The multi-cloud mix of internal and external infrastructure...
DDIInternet of ThingsIPAMVirtualization & CloudCloud to the Edge Brings IP Space ComplexityThe future of cloud computing is near the edge. Edge computing brings compute and storage at the network perimeter, closer to usages. According to the ECCE (Edge Computing Consortium Europe) “The Edge Computing paradigm describes an approach to execute certain services closer to devices and thereby supplements centralized Cloud Computing solutions”. However, this new architecture approach brings with it infrastructure and network challenges. Included in this context of increased complexity are the IPAM repository and network functions such as DNS...
Application Traffic RoutingDDIDNSApplication Traffic Routing with DNS GSLBApplication delivery to users is key in the digital transformation of enterprise processes. With the growing complexity of networks, hosting and application architecture, users still need to be directed to the best available component of the application. This is a challenge EfficientIP has accepted, and our DNS GSLB solution provides the answer with intelligent application traffic routing feature. IT systems have been shaken by multiple new approaches. Hybrid multi-cloud tends to distribute the workload on the most convenient and efficient...
DDIDHCPDNSIPAMNetwork AutomationSOLIDserver 7.1: Optimizing Application Traffic Routing & DNS Security Policy ManagementThe new release of SOLIDserver 7.1 confirms EfficientIP’s innovation and growth in key digital transformation areas concerning enterprise network security, IP resource management and application traffic routing, for both on-premise and multi-cloud environments. The release brings exciting new and updated functionality in three main sectors: 1) Application Traffic Management Maintaining accurate real-time visibility over deployed applications on a complex, multi-cloud, infrastructure and related IP resources is difficult. Ensuring the availability of these applications is an even greater challenge. The most...
DDIIPAMNetwork AutomationPython Library for SOLIDserverIn the infrastructure as code and orchestration spaces, engineers frequently use programmatic languages such as Python. When using higher level automation tools like Ansible or Puppet the underlying language used is mostly one which is well known Python, Ruby or Golang. Communication with the network and system components needs to be performed with simple methods, REST APIs are very well designed for this purpose, they are easy to manipulate, actions are atomic, require no complex session to set up and...
DNSDNS SecurityFive Predictions for Asia Pacific DNS Security in 2019This week’s blog comes to us from our very own Nick Itta, VP Sales APAC.With 2018 coming to a close, I’ve engaged with companies and organizations across Asia Pacific, discussing their plans of attack for strengthening cyber security. During these conversations, several recurring themes have emerged, providing some insight into what we can expect in the year ahead. Here are my five predictions for the state of Asia Pacific’s DNS security in 2019: 1. Learning from 2018’s Lessons on Personal...
DDIIPAMDigital Transformation: Accelerate Application Delivery with IPAMDigital transformation is a matter of people and processes Digital transformation is about creating value on bringing together people, processes and data. It impacts every organization in the way they operate their processes, requiring more efficiency, and a more customer-centric approach. In some cases, it transforms deeply the way organizations are run, requiring new management and individual behavior – the right to fail, autonomy, self-organization, initiative, principle of subsidiarity, delegation – what sometimes is called “agility”. Digital transformation impacts the...
DNSDNS SecuritySecure Your Network with DNS: Episode 4 – How DNS Contributes to Global Network SecurityThis blog is the final of four episodes which help describe best practices for utilizing DNS to protect your overall network. The DNS is the very core of the Internet, it has been routing traffic from client devices to applicative endpoints over the IP network for decades. Yet, it’s only recently that security people seriously started looking at this component of the network as a legitimate part of the security ecosystem. For what could have been obvious, the fact is...