Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/26/2009
12:11 PM
50%
50%

Secure64's DNS, DNSSEC Products Receive IPv6 Gold Certification

Security solutions now compliant with IPv4-to-IPv6 transition already under way

Denver " May 19, 2009 " Secure64 Software Corporation today announced the company has received IPv6 Ready gold certification from the IPv6 Forum for its family of DNS and DNSSEC products. IPv6 is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. Many international markets have already adopted IPv6. Within the U.S., the Office of Management and Budget issued a mandate requiring federal agencies to be IPv6-enabled on their network backbones by June 2008, and further recommending that agencies only procure new IT products that are IPv6 compliant. However, the government has been challenged by the lack of IPv6-enabled security devices and software applications available in the commercial marketplace.

"Secure64 has strived from the beginning to be the 'gold standard' in DNS software," said Steve Goodbarn, CEO and Director of Secure64. "Achieving this latest certification provides our federal and international customers with even greater confidence that our DNS products are state of the art, while providing the highest level of security and performance available."

History of Internet Protocol version 6 (IPv6) IPv6 is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. Internet Engineering Task Force (IETF) designated IPv6 as the successor to version 4 by the publication of a Standards Track specification, RFC 2460, in December 1998.

The difference between IPv6 and IPv4 is the address space. IPv6 uses a 128-bit address, whereas IPv4 uses only 32 bits. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation. IPv6's 128-bit addresses can support a virtually unlimited number of devices and also can provide additional security and network management features to support mobile computing. IPv6 also implements new features that simplify aspects of address assignment (stateless address autoconfiguration) and network renumbering (prefix and router announcements) when changing Internet connectivity providers thus making Internet management and routing more efficient.

IPv6 was developed in order to address the shrinking number of remaining IPv4 addresses, which were predicted to run out in 2012. This would have prevented more devices from being IP-enabled and capable of connecting to the Internet. IPV6 offers an unlimited number of addresses and therefore supports continued growth of Web-based computing and mobile devices.

About the IPv6 Forum The IPv6 Forum is a worldwide consortium that provides technical guidance for the deployment of IPv6. One of its key functions is providing certification of IPv6-ready products that conform to IPv6 specifications, support the protocol, and ensure interoperability with other IPv6 products and technologies. The certification and IPv6 Ready Logo program is managed by a global team of technical members of the IPv6 Forum, including equipment vendors, service providers, academic institutions, IPv6 organizations, members from the TAHI Project (Japan), the University of New Hampshire InterOperability (UNH-IOL)(USA), IRISA/INRIA (France), European Telecommunications standardization Institute ETSI (Europe), Telecommunication Technology Association TTA (Korea), Beijing Internet Institute BII (China), ChungHwa Telecom Labs CHT-TL (Taiwan) and Japan Approvals Institute for Telecommunications Equipment JATE (Japan).

Secure64 DNS Products Secure64's suite of DNS products includes Secure64 DNS Signer, a software product that fully automates Domain Name System Security Extensions (DNSSEC) key generation, key rollover, zone signing and re-signing processes. It reduces deployment and administration costs while eliminating errors that can cause domains to become unavailable. The software also scales to extremely large, dynamic environments by safely keeping DNSSEC signing keys online while providing incremental zone signing and extremely high signing performance.

The company's other DNS product, Secure64 DNS Authority, is an authoritative name server software product that's available at all times " even during network attacks or restarts. It delivers the availability and security required in today's networks, without the cost and complexity of conventional solutions.

About Secure64 Software Corporation Headquartered in Greenwood Village, Colorado, Secure64' is a software company offering high-performance DNS server software that makes the DNS trustworthy and secure. Secure64 currently offers two DNS server applications based on SourceT' " the company's patented Genuinely Secure micro OS. Secure64 DNS Signer is the first DNSSEC signing software to make DNSSEC deployment simple and secure. Secure64 DNS Authority is secure DNS server software that is available at all times -" even during network attacks or restarts. By using Secure64 software, organizations can break the costly and reactive patch management and OS hardening cycle because only Secure64 software is immune to compromise from rootkits and malware and resistant to network attacks that are the source of today's most serious security threats. For more information, visit www.secure64.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12865
PUBLISHED: 2019-06-17
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
CVE-2017-10720
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi name. This application is installed o...
CVE-2017-10721
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has Telnet functionality enabled by default. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car ga...
CVE-2017-10722
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi password. This application is install...
CVE-2017-10723
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows it...