Skip to content

NIS

Top 5 Network and Security Predictions for 2023

Welcome to 2023, a year that promises to be another one full of turbulence, coming back from the pandemic, and facing the current hectic economic climate and downturn which in effect brings new challenges to enterprises. They have to develop (new) resilient strategies, resist threats, improve operational efficiency and reduce costs. This is where network automation comes into play and shines. And as if this is not enough already, further continuation of adopting hybrid working, network modeling, risk mitigation, and...

2022 Top 5 Highlights for Network Automation and Security

2022 has been challenging for IT and network teams. While the pandemic brought a shift to cloud and work-from-anywhere, market factors this year such as supply chain issues, the war in Ukraine, and inflation have brought โ€œoptimizationโ€ to the forefront. That includes optimizing operational efficiency (time savings) as well as costs (TCO & Opex), to ensure business continuity, risk management, and compliance. To meet requirements, enhanced security postures, improved multi-cloud management, and above all network automation projects have been mainly...

DNS Security for Retail: Protecting Revenue & Brand

The work-from-anywhere environment has accelerated the transition to the cloud, e-commerce and in-store retailers are experiencing heightened security risks. Risks that lead to more network downtime and data theft potential. Cybersecurity incidents can hit a retailer’s reputation hard, causing customers to switch allegiance to a competitor. Smart DNS security offers the network visibility and analytics that retailers require for having the confidence to withstand potential cyber-attacks. Confidence in their capability to recover quickly and safeguard consumer data. While maintaining a...

How Telcos Overcome Rising DNS Attacks

Telecommunication operators control and run the critical infrastructure vital for communicating and storing large amounts of sensitive data. This makes them an obvious major target for cyber attacks, frequently using DNS as an attack vector to cause devastating impacts on internet connectivity and data confidentiality. According to a recent IDC security report, Telcos are the 2nd most targeted vertical, with 94 percent of them suffering DNS attacks. Other reports estimate each DDoS attack carried out through DNS costs over $220,000...

Enhancing Visibility & Control Over Google Cloud Platform with IPAM Sync

Today, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You canโ€™t control what you canโ€™t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation) and their related destinations. From there, security wise, one can decide what has to be done, allowing or denying source-destination combinations. Regarding granular visibility, DNS by nature sees all traffic intents at the earliest possible point in the IP traffic...

Top 5 IT Network and Security Predictions for 2022

Welcome to 2022, a year which promises to be full of turbulence with the pandemic still ongoing and organizations forced to adopt hybrid working models. Network security and privacy will no doubt be top of mind across all verticals, especially with users needing to access critical apps, services and data when working either on-premise or remotely. Risk limitation of IoT will also be essential as the number of devices grows exponentially driven by 5G, and smart cost-effective solutions for managing...

Signs Itโ€™s Time To Upgrade Your IPAM

As the technology that drives business forward evolves, so does the need for a more complex network that keeps everyone securely connected. An improved IP address management (IPAM) solution upgrade can help make it easier to build and maintain an inventory of your networks, subnets and IP addresses, and preserve the health of your network overall. A timely upgrade can help you efficiently manage this vital area of your organization. Learn more about modernizing your IPAM solution and how a...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface