[go: up one dir, main page]

Blog

Check out the latest in network management, cybersecurity, and DDI.

 
 
    Article

    Top 5 Automation for FortiGate Firewalls

    Authors: Vasilis Bouloukos & Ulrica de Fort-Menares Keep your FortiGate firewalls running smoothly and free from zero day attacks, here’s our list of…

    Read more

    Security, IT tools, and right policies key for hybrid work

    Cisco Live 2022 emphasized the hybrid work future, but security, the right tools and skills for network teams, and policy alignment to technology are key.

    Read more
    Article

    Indeni’s multi-pronged approach to minimize alert noise

    Alert fatigue is real. Just because Indeni on average has 60% more alerts than SNMP tools, it does not translate to more noise. Indeni keeps noise levels…

    Read more
    Article

    How cloud platforms build the business of experience

    Accenture Managing Director Maya Agaskar discusses how a platform-based approach and the business of experience can aid digital transformation journeys.

    Read more
    Article

    Shift to cloud is shifting IT skill and training needs, too

    CompTIA Chief Technology Evangelist James Stanger discusses why IT professionals need automation skills and how to take control of your own learning.

    Read more
    Article

    Access to the Micetro API

    Use the same simple and secure access control with one DDI overlay solution to ensure proper access even while automating workflows through the API.

    Read more
    Article

    Ultimate Guide to the Micetro REST API

    Create consistent DDI (DNS, DHCP & IPAM) automation workflows using one REST API, no matter where your workloads currently reside or will reside in the…

    Read more
    Guide

    Building Powerful Grafana Dashboards

    By using Indeni, security infrastructure teams have access to many metrics. Between Check Point and Palo Alto Networks firewalls, Indeni collects over 500…

    Read more
    Article

    For network automation decisions, metrics are key

    Uber engineer Ryan Patterson shares how data drives network automation projects, which must also be scalable, save costs, and meet user needs.

    Read more
    Article

    Indeni’s response to Spring4Shell 

    On March 29th, 2022, a remote code execution vulnerability in Spring Cloud Foundation was published. The vulnerability is known as Spring4Shell, tracked as…

    Read more
    Article

    Multi-tenancy & IP Address Management

    Solving the IP range overlap management problem for Enterprises and MSPs

    Read more
    Article

    Key to DevOps success: avoid lift and shift to cloud

    GM Financial’s DevOps VP Matt McComas offers key lessons on taking a systemic approach, breaking process roadblocks, and measuring automation success.

    Read more
    Guide

    Fortinet FortiGate Automation

    FortiOS 6.0 introduces Automation Stitches as part of the Security Fabric. Automation Stitches can be used to automate certain actions in response to…

    Read more
    Article

    The war in Ukraine: A message from CEO Stephen Devito

    BlueCat has discontinued the export of our products and services, as well as support, for all customers owned and operated in Russia or Belarus.

    Read more
    Article

    Level up your DDI know-how with BlueCat training

    Whether you’re a newbie or an expert, BlueCat training offers self-paced online learning, instructor-led training, and expert certification badges.

    Read more
    Article

    Indeni’s response to Dirty Pipe Exploit

    Linux has yet another high-severity vulnerability known as Dirty Pipe that was disclosed on March 7, 2022. Dirty Pipe allows an attacker to overwrite…

    Read more
    Article

    How the cloud has complicated network observability

    Kentik co-founder and CEO Avi Freedman chats about the merits of network observability and how the cloud has changed the networking landscape.

    Read more
    Article

    8 Must-Have Capabilities For Firewall Monitoring Tools

    The best firewall monitoring tools can quickly detect problems, recommend actionable remediation steps, provide proactive alerts and validate best…

    Read more
    Article

    Indeni’s response to the PolKit  vulnerability

    Indeni became aware of the vulnerability in PolKit’s kexec component, tracked as CVE-2021-4034 on January 25, 2022. The PolKit vulnerability has come to…

    Read more
    Article

    When architecting cloud, geography still matters

    Former Manulife AVP of Global Network Services Sandi Jones reminds us of the importance of considering geography when architecting cloud environments.

    Read more
    Guide

    What AWS Outages Can Teach Us About Network Capacity Planning

    Network capacity planning is the ongoing process of determining that a network has the resources it needs to prevent an impact on business-critical…

    Read more
    Article

    Clarke: How to mitigate ransomware, protect the cloud

    Renowned cybersecurity expert Richard Clarke delves into protecting your network from ransomware and what cloud adoption means for your security strategy.

    Read more
    Article

    In their own words: Cats reflect on 20 years of BlueCat

    BlueCat turned 20, and to celebrate the milestone, we asked Cats to look back on where we’ve been and share what they love about working here.

    Read more
    Article

    Examining the Log4j2 vulnerability and our response

    Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.