New on the Blog

Improving E-Mail Security with DomainKeys Identified Mail (DKIM)

Today, enterprises have a heightened awareness of their network security measures and are concerned about the cyber threats to their organization.  With the emphasis on Internet security due to recent highly publicized corporate security breaches, enterprises are re-evaluating their security measures and increasing their funding of IT security initiatives.  Security practitioners applaud organizations that are striving for a higher level of protection and not just trying to achieve the minimum level of protection based on compliance-driven, check-box security.  Reactive spend

DHCPv6 and the Trouble with MAC Addresses (Part 1 of 2)

DHCP in IPv4 has a taken-for-granted characteristic that provides it with powerful management flexibility: If you pull apart a DHCP header you find the MAC address of the host that originated the packet.  

This provides unambiguous identification of a host machine (or, more accurately, a particular interface on a host machine) and has been used for years in network operations to help facilitate everything from configuring fixed addresses in DHCP to provisioning processes, asset tracking, security policy enforcement. 

It may be April 1, but this is no joke! Big Changes Coming to the Community

Today is notable for many reasons.  In prior years, like many, I reserve April 1st as a day where anything can and will happen.... and most of it is a practical joke.  This April first, we've decided to announce significant changes to the community site that are not a 'practical joke.'

Recent blog activity

Momentum Is A key Ingredient

Posted by eric stieg

Posted: April 13, 2015 - 09:58:20 AM

Last week, we announced that your community will be receiving a major update in the coming weeks and months.  We have received a terrific response  from fellow community members about "keys to success" and what you would like.  Please keep the suggestions rolling in!

Improving E-Mail Security with DomainKeys Identified Mail (DKIM)

Posted by Scott Hogg

Posted: April 09, 2015 - 08:38:14 AM

Today, enterprises have a heightened awareness of their network security measures and are concerned about the cyber threats to their organization.  With the emphasis on Internet security due to recent highly publicized corporate security breaches, enterprises are re-evaluating their security

Integrating Infoblox IPAM with vRealize Automation - Part 1

Posted by eric stieg

Posted: April 07, 2015 - 10:44:29 AM

...

DHCPv6 and the Trouble with MAC Addresses (Part 1 of 2)

Posted by Tom Coffeen

Posted: April 02, 2015 - 02:16:36 PM

DHCP in IPv4 has a taken-for-granted characteristic that provides it with powerful management flexibility: If you pull apart a DHCP header you find the MAC address of the host that originated the packet.  

Today is notable for many reasons.  In prior years, like many, I reserve April 1st as a day where anything can and will happen.... and most of it is a practical joke.