Skip to content

DNS Solution

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

SD-WAN: Why DDI is Key for Efficient Management

As published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Let’s review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...

How to Secure Anywhere Networking with DNS: 2022 Threat Report Highlights

As organizations adopt a “work from anywhere” approach, IDC’s 2022 Global DNS Threat Report confirms that the frequency and damage cost of DNS attacks have remained as high as ever, causing severe impacts on service continuity and data confidentiality for on-premises, cloud, and remote workers. On the positive side, the importance of DNS for overall network security is being increasingly acknowledged, with organizations understanding its criticality for strengthening resilience, protecting data privacy, and for providing an early security barrier by...

Enhancing Visibility & Control Over Google Cloud Platform with IPAM Sync

Today, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...

Access Control via DNS Applied to Parental Control

More and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...

Hybrid Workforce: Who’s Managing DNS?

Post pandemic situation sees the confirmation of working from home but also working from anywhere. After COVID-19, 92% of eligible people expect to work from home at least 1 day per week, and 80% expected to work at least 3 days from home per week according to a survey by Owl labs. Most enterprises seem to accept this new paradigm as it improves the overall productivity of the workforce. Provided the logistics of working outside the Enterprise can be addressed,...

Why IPAM Repository is the Key Enabler for Network Automation

Nowadays, things are moving quickly and nothing is set in stone. The same is true for IT and networking services. Today, deploying applications or websites must be done quickly for faster Time-to-Service but in addition, must be done as many times as required to account for the necessary functional upgrades or mandatory security patches. So, most of the mundane IT and networking tasks must now be thought of in terms of cycles with their seasonalities and not as a one-off...

Cybersquatting: The Basics Part 2 – How to Protect Yourself

In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On a Kali distribution, one can find a number of ready-to-use tools for typosquatting.Among these tools, “urlcrazy” is probably the best known. It is a very powerful tool, which from a domain name is able to generate other domain names with strong similarities and test their...

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation) and their related destinations. From there, security wise, one can decide what has to be done, allowing or denying source-destination combinations. Regarding granular visibility, DNS by nature sees all traffic intents at the earliest possible point in the IP traffic...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface