Skip to content

Data Privacy

Why Using DoH is Questionable

DoH (DNS over HTTPS) is an interesting solution for securing the transport of DNS traffic up to the first resolver. But is it required? What are the drawbacks? Do we really need it? Can we trust its usage and the DoH providers currently available? After a few months of intensive usage, some are pushing the message that in the context of an organization DoH is an important subject for I&O teams and more generally for the CISO & CIO to...

SOLIDserver 7.3: Boosting Network Automation, Security and Control

Release 7.3 of SOLIDserver builds on the importance of the centralized IP Source of Truth data repository and open APIs to boost automation capabilities of DDI. With a focus on simplifying network management and easy ecosystem integration, the new functionalities introduced bring enhanced visibility over infrastructure resources and users, helping improve operational efficiency and control while strengthening security. The main features introduced with Release 7.3 include the following: 1) Network Identity Manager for Enriched IT Automation With Identity Manager, the...

DNS Security in Healthcare: Paving the Way Toward Secure Health Infrastructure

In recent years, the pace of digitization in the healthcare sector has accelerated rapidly. Devices and applications in hospitals are increasingly connected via IoT, while patient data in many countries is being recorded and shared in new and innovative ways—this is expanding the types of services patients can use, as well as make their care more efficient. In many ways COVID-19 has exacerbated these trends, as the demand for telemedicine applications and remote working solutions is at an all-time high....

DNS over TLS for Improved Privacy

For various reasons, DNS transport could be secured through encryption, with DNS over TLS (aka DoT) being one obvious solution to increase user security. User privacy reached the DNS area some while ago – we have seen a massive move from browser solutions to the adoption and more importantly the usage of secured DNS by applying, in some countries, an automatic switch to encrypted transport. DNS is business-critical so has to be secured Why is securing DNS so important? Mostly...

Data Regulations 2020: Time to Step up Your Data Theft Protection

Today’s data-driven economy is being led by personal data, so naturally focus is turning more strongly to privacy and protection. New regulations have appeared over the last few years, but 2020 will see a rapid acceleration, particularly in regions such as America and APAC. While it’s only fair that regulators introduce these new laws with their associated fines for data breaches, companies are still finding it extremely challenging to ensure confidentiality of their data. Cybercriminals are smart guys – data...

Cloud to the Edge Brings IP Space Complexity

The future of cloud computing is near the edge. Edge computing brings compute and storage at the network perimeter, closer to usages. According to the ECCE (Edge Computing Consortium Europe) “The Edge Computing paradigm describes an approach to execute certain services closer to devices and thereby supplements centralized Cloud Computing solutions”. However, this new architecture approach brings with it infrastructure and network challenges. Included in this context of increased complexity are the IPAM repository and network functions such as DNS...

Why You Shouldn’t Rush Into DoH

While being a core component of the Internet, DNS remains one of the least secure protocols in active use. DNS security is a long-standing debate, with DNS privacy a much more recent matter and a source of division among the security community. Indeed, privacy matters and must weigh in the balance when considering DNS security. However, security is not only about confidentiality. Protocols such as DNS over TLS or DND over HTTPS must be leveraged wisely to strengthen network security,...

Data Driven Network Security with Machine Learning

Today’s threats are sophisticated, malware deploys a long time prior to activation using complex command and control mechanisms, and theft of data and personal information is a strong motivation for hackers. In this context, DNS traffic plays a vital role in enterprise network security since it offers the possibility of seeing the intent of most traffic, whether it is legitimate or not. Countermeasures based on DNS provide an opportunity to filter a lot of malicious traffic, but DNS security requires...

Public Cloud Platforms Are Not Waterproof

Digital transformation is eased by cloud infrastructures Many organizations are starting their journey to the cloud by moving some workloads to public providers. Most of the time, the first ones are development and test environments as they are generally considered less critical. Moving to production is performed after this initiation on non-critical front applications, sometimes including storage as files and databases. Then come bigger deployments. Common strategy starts with “lift & shift” of existing eligible applications to public cloud compute...

Reap the Benefits of GDPR with DNS Protection

The deadline to comply with the General Data Protection Regulation (GDPR) is getting closer (25th May 2018). This new edict will offer great opportunities for companies to strengthen customer trust by bringing them more personalized solutions, resulting in greater satisfaction. Compliance can save companies from paying hefty fines, as well as bring long-term reputational gains and better understanding of their customers. Data confidentiality will become vital in a post-GDPR world. In order to ensure it, companies will have to pay...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface