01:36 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Secure64 Releases Enhanced Version Of DNS Management Software

New capabilities unify management of entire Secure64 DNS product suite from a single application

October 16, 2012 – Secure64 Software Corporation has released a new version of its Secure64 DNS Manager product, which helps communication service providers (CSPs) configure, manage and monitor all of their Secure64 DNS servers in a centralized manner. The enhancements to Secure64 DNS Manager make it a more powerful tool for rolling out new DNS software versions, controlling changes to configurations, monitoring DNS servers in real time, and managing remote servers anywhere in the world. The new capabilities unify the management of the entire Secure64 DNS product suite from a single application.

New features and functionality in Secure64 DNS Manager include:

---Ability to manage and monitor DNS Authority and DNS Signer servers

---Internet Explorer 9 browser support

---Extract, store and manage configuration files

---Enhanced version control and rollback of OS updates and configuration files

---Multiple user access controls

---Enhanced presentation of server information

---Capabilities for running DNS Manager in a VMware implementation

"By managing and monitoring an organization's entire DNS infrastructure, this release of DNS Manager continues to decrease the total cost of DNS ownership," said Mark Beckett, Vice President, Marketing and Product Management at Secure64. "DNS Manager significantly lowers DNS-related operating costs by reducing the amount of time required to keep server and configurations up-to-date. It decreases the kind of human errors that create chaotic situations that cost time and money, such as forgetting to update a server or uploading the wrong configuration. DNS management shouldn't be so costly and fraught with risk, and it isn't when organizations incorporate Secure64 DNS Manager into their network infrastructure and their DNSSEC implementations."

The enhanced version of Secure64 DNS Manager is available immediately from Secure64. For more information, visit

In addition to the new version of DNS Manager, Secure64 also released enhancements to Secure64 DNS Authority--its DNS name server software--and to Secure64 DNS Cache--its DNS caching name server software. For the latest information about DNS Authority and DNS Cache, visit

About Secure64 Software Corporation

Headquartered in Greenwood Village, Colorado, Secure64 is a software developer providing the most secure DNS products available to its customers in the government and communications industry. Secure64's patented technology provides mission-critical security and reliability with high throughput and low latency. It has been shown to be immune to compromise from rootkits and malware and resistant to denial of service and other network attacks. The company offers a suite of trusted and secure DNS software appliances for caching, signing and authoritative use. Secure64's products are sold and serviced worldwide through Hewlett-Packard and their reseller network and directly by Secure64. For more information, visit

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web