Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/26/2009
12:11 PM
50%
50%

Secure64's DNS, DNSSEC Products Receive IPv6 Gold Certification

Security solutions now compliant with IPv4-to-IPv6 transition already under way

Denver " May 19, 2009 " Secure64 Software Corporation today announced the company has received IPv6 Ready gold certification from the IPv6 Forum for its family of DNS and DNSSEC products. IPv6 is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. Many international markets have already adopted IPv6. Within the U.S., the Office of Management and Budget issued a mandate requiring federal agencies to be IPv6-enabled on their network backbones by June 2008, and further recommending that agencies only procure new IT products that are IPv6 compliant. However, the government has been challenged by the lack of IPv6-enabled security devices and software applications available in the commercial marketplace.

"Secure64 has strived from the beginning to be the 'gold standard' in DNS software," said Steve Goodbarn, CEO and Director of Secure64. "Achieving this latest certification provides our federal and international customers with even greater confidence that our DNS products are state of the art, while providing the highest level of security and performance available."

History of Internet Protocol version 6 (IPv6) IPv6 is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. Internet Engineering Task Force (IETF) designated IPv6 as the successor to version 4 by the publication of a Standards Track specification, RFC 2460, in December 1998.

The difference between IPv6 and IPv4 is the address space. IPv6 uses a 128-bit address, whereas IPv4 uses only 32 bits. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation. IPv6's 128-bit addresses can support a virtually unlimited number of devices and also can provide additional security and network management features to support mobile computing. IPv6 also implements new features that simplify aspects of address assignment (stateless address autoconfiguration) and network renumbering (prefix and router announcements) when changing Internet connectivity providers thus making Internet management and routing more efficient.

IPv6 was developed in order to address the shrinking number of remaining IPv4 addresses, which were predicted to run out in 2012. This would have prevented more devices from being IP-enabled and capable of connecting to the Internet. IPV6 offers an unlimited number of addresses and therefore supports continued growth of Web-based computing and mobile devices.

About the IPv6 Forum The IPv6 Forum is a worldwide consortium that provides technical guidance for the deployment of IPv6. One of its key functions is providing certification of IPv6-ready products that conform to IPv6 specifications, support the protocol, and ensure interoperability with other IPv6 products and technologies. The certification and IPv6 Ready Logo program is managed by a global team of technical members of the IPv6 Forum, including equipment vendors, service providers, academic institutions, IPv6 organizations, members from the TAHI Project (Japan), the University of New Hampshire InterOperability (UNH-IOL)(USA), IRISA/INRIA (France), European Telecommunications standardization Institute ETSI (Europe), Telecommunication Technology Association TTA (Korea), Beijing Internet Institute BII (China), ChungHwa Telecom Labs CHT-TL (Taiwan) and Japan Approvals Institute for Telecommunications Equipment JATE (Japan).

Secure64 DNS Products Secure64's suite of DNS products includes Secure64 DNS Signer, a software product that fully automates Domain Name System Security Extensions (DNSSEC) key generation, key rollover, zone signing and re-signing processes. It reduces deployment and administration costs while eliminating errors that can cause domains to become unavailable. The software also scales to extremely large, dynamic environments by safely keeping DNSSEC signing keys online while providing incremental zone signing and extremely high signing performance.

The company's other DNS product, Secure64 DNS Authority, is an authoritative name server software product that's available at all times " even during network attacks or restarts. It delivers the availability and security required in today's networks, without the cost and complexity of conventional solutions.

About Secure64 Software Corporation Headquartered in Greenwood Village, Colorado, Secure64' is a software company offering high-performance DNS server software that makes the DNS trustworthy and secure. Secure64 currently offers two DNS server applications based on SourceT' " the company's patented Genuinely Secure micro OS. Secure64 DNS Signer is the first DNSSEC signing software to make DNSSEC deployment simple and secure. Secure64 DNS Authority is secure DNS server software that is available at all times -" even during network attacks or restarts. By using Secure64 software, organizations can break the costly and reactive patch management and OS hardening cycle because only Secure64 software is immune to compromise from rootkits and malware and resistant to network attacks that are the source of today's most serious security threats. For more information, visit www.secure64.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9493
PUBLISHED: 2021-06-16
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
CVE-2021-28815
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
CVE-2021-3535
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
CVE-2021-32685
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...
CVE-2021-32623
PUBLISHED: 2021-06-16
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using...