Check out the latest in network management, cybersecurity, and DDI.
Top 5 Automation for FortiGate Firewalls
Authors: Vasilis Bouloukos & Ulrica de Fort-Menares Keep your FortiGate firewalls running smoothly and free from zero day attacks, here’s our list of…
Security, IT tools, and right policies key for hybrid work
Cisco Live 2022 emphasized the hybrid work future, but security, the right tools and skills for network teams, and policy alignment to technology are key.
Indeni’s multi-pronged approach to minimize alert noise
Alert fatigue is real. Just because Indeni on average has 60% more alerts than SNMP tools, it does not translate to more noise. Indeni keeps noise levels…
How cloud platforms build the business of experience
Accenture Managing Director Maya Agaskar discusses how a platform-based approach and the business of experience can aid digital transformation journeys.
Shift to cloud is shifting IT skill and training needs, too
CompTIA Chief Technology Evangelist James Stanger discusses why IT professionals need automation skills and how to take control of your own learning.
Access to the Micetro API
Use the same simple and secure access control with one DDI overlay solution to ensure proper access even while automating workflows through the API.
Ultimate Guide to the Micetro REST API
Create consistent DDI (DNS, DHCP & IPAM) automation workflows using one REST API, no matter where your workloads currently reside or will reside in the…
Building Powerful Grafana Dashboards
By using Indeni, security infrastructure teams have access to many metrics. Between Check Point and Palo Alto Networks firewalls, Indeni collects over 500…
For network automation decisions, metrics are key
Uber engineer Ryan Patterson shares how data drives network automation projects, which must also be scalable, save costs, and meet user needs.
Indeni’s response to Spring4Shell
On March 29th, 2022, a remote code execution vulnerability in Spring Cloud Foundation was published. The vulnerability is known as Spring4Shell, tracked as…
Multi-tenancy & IP Address Management
Solving the IP range overlap management problem for Enterprises and MSPs
Key to DevOps success: avoid lift and shift to cloud
GM Financial’s DevOps VP Matt McComas offers key lessons on taking a systemic approach, breaking process roadblocks, and measuring automation success.
Fortinet FortiGate Automation
FortiOS 6.0 introduces Automation Stitches as part of the Security Fabric. Automation Stitches can be used to automate certain actions in response to…
The war in Ukraine: A message from CEO Stephen Devito
BlueCat has discontinued the export of our products and services, as well as support, for all customers owned and operated in Russia or Belarus.
Level up your DDI know-how with BlueCat training
Whether you’re a newbie or an expert, BlueCat training offers self-paced online learning, instructor-led training, and expert certification badges.
Indeni’s response to Dirty Pipe Exploit
Linux has yet another high-severity vulnerability known as Dirty Pipe that was disclosed on March 7, 2022. Dirty Pipe allows an attacker to overwrite…
How the cloud has complicated network observability
Kentik co-founder and CEO Avi Freedman chats about the merits of network observability and how the cloud has changed the networking landscape.
8 Must-Have Capabilities For Firewall Monitoring Tools
The best firewall monitoring tools can quickly detect problems, recommend actionable remediation steps, provide proactive alerts and validate best…
Indeni’s response to the PolKit vulnerability
Indeni became aware of the vulnerability in PolKit’s kexec component, tracked as CVE-2021-4034 on January 25, 2022. The PolKit vulnerability has come to…
When architecting cloud, geography still matters
Former Manulife AVP of Global Network Services Sandi Jones reminds us of the importance of considering geography when architecting cloud environments.
What AWS Outages Can Teach Us About Network Capacity Planning
Network capacity planning is the ongoing process of determining that a network has the resources it needs to prevent an impact on business-critical…
Clarke: How to mitigate ransomware, protect the cloud
Renowned cybersecurity expert Richard Clarke delves into protecting your network from ransomware and what cloud adoption means for your security strategy.
In their own words: Cats reflect on 20 years of BlueCat
BlueCat turned 20, and to celebrate the milestone, we asked Cats to look back on where we’ve been and share what they love about working here.
Examining the Log4j2 vulnerability and our response
Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.