Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/26/2009
01:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Angie's List Taps NeuStar UltraDNS Managed DNS Service

Nationwide ratings service chooses NeuStar's DNS service to optimize performance of its online operations

STERLING, Va., March 25 /PRNewswire-FirstCall/ -- NeuStar, Inc. (NYSE: NSR) today announced that Angie's List (www.angieslist.com), the nationwide ratings service with real consumer reviews of local service providers, has chosen NeuStar's UltraDNS Managed DNS Service to optimize the performance of its online operations.

As with all web-enabled organizations, DNS is of critical importance to Angie's List's day-to-day operations. Prior to moving to the UltraDNS service, Angie's List relied on its Internet service provider (ISP) for its DNS infrastructure. Typical of such an arrangement, all requests for DNS changes had to be submitted manually to the ISP's ticketing system. Response times were variable, and Angie's List still had to verify that all changes were made correctly. Further, the ISP maintained all primary and secondary DNS servers in the same physical location, representing a "single point of failure" that could have brought down the entire Angie's List business operations in the event of an outage.

"Partnering with NeuStar has enabled us to take control of our own destiny," said Shane Wade, director of IT infrastructure and operations at Angie's List. "Through the UltraDNS management portal, we make all of our DNS changes and they are propagated globally in near-real time -- making it the fastest and most expansive that we have seen. In addition, with NeuStar's worldwide constellation of DNS servers, we have realized our disaster recovery goal of having no single point of failure."

NeuStar's UltraDNS Managed DNS Service provides enterprises with one of the world's most powerful DNS infrastructures, which is monitored around the clock and backed by a 99.999% uptime service level agreement. Enterprise customers retain administrative control of their DNS via a highly secure, web-based management portal.

"Angie's List has experienced dramatic growth over the past five years, and with that comes the need for increased operational control," said Alex Berry, senior vice president of NeuStar's Internet Infrastructure service group. "Many of our customers come to us because they need to take control of their DNS, but do not want to spend the capital, incur operational expenditures or shoulder the burden of supporting an in-house solution. The managed services approach gives customers the very best DNS infrastructure while at the same time providing them with complete control of their DNS activity."

More information about NeuStar's UltraDNS suite of services is available at www.ultradns.com.

About NeuStar

NeuStar (NYSE: NSR) provides market-leading and innovative services that enable trusted communication across networks, applications, and enterprises around the world. For more information, visitwww.neustar.biz.

About Angie's List

Angie's List is where thousands of consumers share their ratings and reviews on local contractors and companies in more than 425 different categories. Currently, more than 750,000 consumers across theU.S.rely on Angie's List to help them find the right contractor or company for the job they need done. Members have unlimited access to the list via Internet or phone; receive the award-winning Angie's List magazine, which includes articles on home improvement and maintenance, consumer trends and scam alerts; and they can utilize the Angie's List complaint resolution service. Get more information about Angie's List athttp://www.angieslist.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...