Skip to content

DDI Solutions

IPAM: The Foundation of the Modern ISP

To deliver IT services successfully you need a system of record- one place that holds the details of all the devices running on your network, where they are and what they are doing. In most modern service management methodologies, that one place is a configuration management database, where service managers monitor and control changes. But in the cloud and at scale that, model breaks down. That’s why ISPs and telcos are starting to take a different approach to finding the...

Fighting DDoS Attacks with Hybrid DNS

DNS security has been in the news again, with one of the largest DDoS attacks ever disrupting the Dyn cloud DNS service. At least 150,000 compromised devices (including IoT hardware) were used by the Mirai botnet to bombard cloud-hosted DNS servers with DNS requests, taking down access to many of the Internet’s most popular services. It’s not the only major service provider that’s had a DNS-based attack in the last few weeks, with Singapore’s StarHub reporting a similar incident. What...

Get Ready For the Future of Retail with DNS

Walk into a modern shop and you’ll see this new interface to the world of retail. It’s chip credit card readers, barcode scanners, smart e-paper price labels, intelligent posters, and Bluetooth beacons- a list that goes on and on and into the cloud. They’re tools that are bringing about new ways of selling, and are changing the face of retail in ways you wouldn’t expect. For instance, at its recent Dreamforce event, Salesforce notably demonstrated a tool that used Bluetooth...

Anyone For Tennis? Serving Up Secure DNS

If you think about the ideal scenario for a hacker to gain access to systems, you would come up with a large attack surface and lots of opportunity to disguise attacks as genuine network access. Imagine a network with thousands of potentially unauthenticated devices converging in a short period of time, producing extreme spikes in traffic. Sound like the crowd at a sporting event? Going for gold – the motivation of elite hackers In many ways, the attacks facing the...

All or Nothing: Why Partial Automation Does Not Work

As we build out cloud applications and networks, we need to change the way we deliver and manage IP addresses. Many of the tools we currently use were designed for the good old days, when we had one or two, or maybe tens of servers to support a single application- a server was deployed once and it sat in the datacenter for years. That’s all changed. We’re now deploying hundreds, even thousands, of virtual servers; taking advantage of the speed...

DDI In Cloud Services

The promise of the cloud is one of scalability- of applications and services that can scale on demand according to the need, booking only appropriate compute and storage capacity. That means designing resource provisioning processes capable of handling both public and private cloud technologies, while building appropriate orchestration tools to automate them. In the cloud, you’re not working with one or two servers deployed for years. Instead it’s hundreds and thousands of dynamic instances, providing just the compute you need,...

3 Ways To Rethink and Simplify Telecom DNS

Cyber-attacks and data leaks among telecommunication providers are a hot topic, especially after the DNS DDoS attack on UK’s ISP TalkTalk in October 2015. Four million customers were informed their sensitive personal information, including bank details, may have been stolen by hackers. Cyber attacks are now clearly strategic threats for telcos, many of whom have fundamental issues related to the modernization of their core systems which have often evolved as the result of several merges and often not robust enough...

Security Protection Through Hybrid DNS

The more we use the internet, the more important DNS becomes. For such an important service it’s odd that DNS is virtually invisible. We rely on it for everything, but we don’t treat it like an essential service; instead we set it up and ignore it. DNS is far too important to be left alone. You need to manage it carefully, building a DNS architecture that scales and is secure. That last part is the hardest, and the most important....

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface