Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Infrastructure Security //

DNS

4/10/2017
08:26 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Curt Franklin
50%
50%

Infoblox Serves SDN DNS to Carriers With Trinzic Flex

Infoblox's latest appliance, Trinzic Flex, brings its traditional DNS, DHCP and more to SDN and NFV at carrier scale.

As infrastructure-as-a-service (IaaS) has risen in popularity, so has infrastructure's desirability as a target for hackers. Infoblox Trinzic Flex, released on April 6, is a scalable, carrier-class appliance that brings NFV virtualized DDI (DNS, DHCP and IP Address Management) services to carrier and ISP networks.

Trinzic Flex is intended as a transition product for carriers as they navigate a path between traditional on-premises appliances and a full SDN future. As such, Trinzic Flex is an appliance that provides network control, security and automation functions around DDI services. Scalability is a key piece of the service package within Trinzic Flex but service providers and carriers can be only so interested if they can't economically bill for the services offered. Trinzic Flex offers financial flexibility on both ends of the feature chain, allowing service providers to automate provisioning and accounting for their customers, while providing a licensing model that grows the appliance's capacity and cost as the carrier's demand increases.

According to a written statement on the release, bringing all these services together at scale has implications for network security as well. "An often-overlooked security vulnerability revolves around DNS-based exploits that bypass traditional security approaches." Those DNS exploits include the well-documented metasploit vulnerability as well as other DNS poisoning, brute-forcing and DDoS attacks.

In a telephone interview with Infoblox Senior Product Marketing Manager Matt Gowarty, security was one of several topics up for discussion. "We're trying to make sure security becomes a key component from a DNS perspective -- not as an afterthought or a bolt-on," Gowarty said, explaining that most traditional security methods don't focus on DNS.

"By having Infoblox be the authoritative source of information, the single point of truth, we're serving up DNS and see everything from a DNS perspective," he said. By providing a focus on DNS with a heavy security emphasis, DNS becomes another layer in a complete, multi-step security infrastructure.

One of the threats service providers and carriers are most concerned about is DDoS, especially when fueled by millions upon millions of IoT devices. "If you want to take down a lot of people, a carrier's network becomes a big target for a DDoS attack," Gowarty said, explaining, "What we've done with security for the enterprise becomes even more critical for the carriers just because of the scale and size of their network, the breadth and scope."

Trinzic Flex is available now. According to Infoblox, there are currently more than 200 service provider customers for Infoblox DNS, DHCP and IP address appliances. Gowarty said that Trinzic Flex aims to, "...let them leverage the majority of the Infoblox DNS security components that we're known for on a very highly virtualized platform that allows carriers to scale and upgrade very easily to [SDN and NFV] deployments."

— Curtis Franklin, Security Editor, Light Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3830
PUBLISHED: 2021-09-26
btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-21742
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
CVE-2020-20508
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
CVE-2020-20514
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.
CVE-2016-6555
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in ver...