Exclusive Content:

How an Asian mobile network operator gained full visibility into the security posture of its 4G and 5G networks

Cyber threats are increasingly persistent, complex, and sophisticated. At...

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to...

Why networking technologies remain at the heart of online security [Q&A]

spot_img
spot_img

Networks and the internet are reliant on domain name servers, dynamic host control protocol, and IP address management. These three technologies — grouped together as DDI (DNS, DHCP, IPAM) — are central to the way things work but that also makes them a tempting target.

We spoke to Ronan David, chief of strategy at EfficientIP to find out why DDI is so vital to online security and how automation can help with defense.

BN: Why is DDI so important and why particularly now?

RD: That’s a very good question, these services are very old technology which are still absolutely required for networks to operate. We are seeing in the last few years a dramatic increase in terms of network complexity, devices, applications, application networks are all more and more distributed. At the moment if you want to make a connection securely and dynamically between users and applications, you need to rely on on DDI services.

That’s why today, if you’re wanting to deliver end to end automation, or if you’re wanting to truly secure your network infrastructure, you have to take in to consideration DDI services. Because otherwise it’s just not possible to dynamically deploy your services. So, just an example with functions virtualization. If you want to take full advantage of virtualization and be able to deploy a new server in few minutes, you will have a lot of different technologies to reach that objective. The server is not connected to the network until the setup gets an IP address, and the application is not visible to all users until the minute the application gets the domain name. DDI really comes down to getting access to the network to any devices and then make all applications visible.

Read the rest article here

spot_img
spot_img
spot_img
spot_img

Newsletter

spot_img
spot_img
spot_img
spot_img
spot_img
spot_img

Don't miss

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to...

5 ways to win RFPs

Asset owners frequently depend on formal RFPs for manager...

Exploring the Relationship of Interest Rates to Value vs Growth Investment Strategies

After the economic turmoil caused by the COVID-19 pandemic,...

How an Asian mobile network operator gained full visibility into the security posture of its 4G and 5G networks

Cyber threats are increasingly persistent, complex, and sophisticated. At the same time, the security regulations that communications service providers (CSP) must comply with are...

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver for communications service providers (CSPs). Capacity planning, fulfillment, assurance, and maintenance activities have improved somewhat...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to know who your best buyers are and how to price your product. Ask yourself these...