Please complete the form on the right to view
BT Diamond IP Videos
View recent webinar recordings to learn about core DHCP, DNS, and IPAM (DDI) technologies to deepen your understanding and to improve your network operations and security. Turn your knowledge into action with the help of BT Diamond IP solutions to help you better manage your IPv4-IPv6 address space, simplify your DDI processes, streamline DDI functions for your cloud deployments and secure your network with DNS security.
Do Not Skip (DNS) Security
This webinar discusses a wide range of DNS vulnerabilities and mitigation strategies with a particular emphasis on recent highly publicized malware attacks including Mirai and Wannacry. These are discussed along with specific DNS strategies that can be employed to mitigation and recover.
Why deploy IPv6?
IPv6 deployments continue at a steady pace around the world, as evidenced by several metrics available on the web.
Improving network security with DNS firewalls
Malware has menacingly emerged as a critical threat to enterprise networks, infecting user laptops, mobile phones and even Internet of Things (IoT) devices. Malware may be installed using a variety of methods and if successfully installed on a device that is trusted within the confines of an enterprise network, it may have access to sensitive information. The installed malware may likely use DNS to identify the current IP address of the attacker’s external destination for exfiltration of the information. A DNS firewall can protect your network and to help identify such infected devices. As malware attempts to locate its command and control center for instructions or software updates using DNS, a DNS firewall can identify such queries and apply corresponding query response policies. This webinar describes the “why” and “how” of DNS firewall deployment.
Secure your DNS, secure your network
DNS has proven extremely effective and scalable in practice and most people take DNS for granted given this and its proven reliability. However, its essential function and decentralized architecture serve to attract attackers seeking to exploit the architecture and its rich data store for sinister activities. For example, you’ve probably heard about the recent DDOS attack on Dyn thanks to the Mirai malware. This webinar discusses that attack and other DNS attack vulnerabilities and how you can protect yourself to improve your overall network security.
IPv6 Deployment Strategies
More and more organisations are deploying IPv6 given the growing scarcity of IPv4 address space. This webinar provides a brief update on the status of IPv4 address space availability and discusses key findings from our recent IPv6 survey. We then discussed IPv6 deployment strategies regarding assessing your current network infrastructure capabilities, applications, staff knowledge, security and network management, while focusing on aspects of IPv6 address management and its critical role within your overall IPv6 deployment plan.
Dual-Stack IP Address Management
IPv6 deployments continue to increase around the world; as one metric, over 12% of users hitting google’s websites utilise IPv6 as of mid-2016 with projections of doubling to 25% within two years. Deploying IPv6 may seem intimidating given the far-reaching impacts of network protocols on applications, devices, security and network management. This webinar provides information regarding how to justify IPv6 deployment, how to go about assessing IPv6 readiness and how to manage your IPv4-IPv6 address space. Managing address space requires allocation of IPv6 address blocks and subnets, assigning individual host IPv6 addresses directly or via DHCPv6 and the configuration of DNS for device name to IPv4 and IPv6 address lookups.
The Easy Way to Deploy DNSSEC
The domain name system (DNS) provides the lookup and translation services from name to IP addresses that are used by computers to communicate. DNSSEC provides a means for you to improve the reliability of your resolved DNS data. Those users trying to reach your website by querying your DNS data can validate your signatures and confidently cache your resolution data for your DNS namespace. These benefits do come with an administrative cost in terms of managing zone keys and signatures. Fortunately several automation techniques are available to streamline administrative requirements.
Improve cloud operations though core network services automation
The cloud is transforming the way organisations offer and support computing and communications services to their users and constituents. Core network services are so named given they service network and computing elements in initialising their respective IP configurations to enable communications on the IP network and core in the sense that without which, such IP communications would be impossible. Learn how automating IP subnet and address assignment and DNS updates can streamline the process to facilitate agile deployments whilst assuring accuracy and IP inventory integrity.
Secure your DNS Infrastructure
DNS has proven extremely effective and scalable in practice and most people take DNS for granted given this and its proven reliability. However, its essential function and decentralised architecture serve to attract attackers seeking to exploit the architecture and its rich data store for sinister activities. Learn about potential vulnerabilities and associated security strategies you can employ to improve your overall network security.
Streamline cloud agility by automating core network services
Manual management processes can vastly hinder agility benefits of private or hybrid cloud deployments. Automating IP subnet and address assignment and DNS updates can streamline the process to facilitate agile deployments whilst assuring accuracy and IP inventory integrity. These core network services are foundational to cloud operations and prudent tracking of IP space and DNS assignments, movements, suspensions, and de-assignments due to day-to-day operations is imperative.
Introduction to the Internet of Things
The Internet of Things (IoT) refers to the extension of today’s Internet beyond connectivity and interaction among traditional user-operated devices like PCs, tablets, phones and like types of devices into the realm of connectivity and interaction with non-user operated devices such as sensors, monitors and remotely controllable devices. Internet-enabling such “unmanned” devices allows these devices to autonomously report updates, status changes, events, or to perform actions commanded by users or other devices via the Internet. This webinar provides an overview of the Internet of Things, sample applications, architecture, network impacts and management impacts. The webinar also covers Internet Protocol support for things deployed in remote areas or harsh environments where communications services are minimal, for which a set of protocols have been specified to support such “constrained” environments, enabling full Internet protocol stack connectivity to such devices.
IP address management for IoT
The Internet of Things (IoT) refers to the extension of today’s Internet beyond connectivity and interaction among traditional user-operated devices like PCs, tablets, phones and like types of devices into the realm of connectivity and interaction with non-user operated devices such as sensors, monitors and remotely controllable devices. Internet-enabling such “unmanned” devices necessitates IP addressing of such devices, which, for deployments of hundreds or thousands, creates potential IP address management challenges. This webinar discussed IP address planning, IPv4 vs. IPv6, thing addressing using SLAAC and/or DHCPv6 and DNS considerations
IPv6 state of the industry
With Internet Registries serving 90-plus percent of the world’s population having now depleted available IPv4 address space, new address space requests will all but require IPv6 allocation. Even if you have sufficient IPv4 address space, other Internet users are using IPv6 and you will need to support both protocols to connect with them and the whole Internet. BT recently conducted an industry survey regarding attitudes and plans around IPv6 deployment and we share in this webinar some of those results today so you may gain a sense of where industry peers stand on IPv6 deployment.
IPv6 and IoT: Perfect Together
IPv6 of course is the latest version of the Internet Protocol and is being actively deployed around the world in the face of IPv4 address space exhaustion. The Internet of Things or IoT refers to the extension of today’s Internet beyond connectivity and interaction among traditional user-operated devices like PCs, tablets, phones and like types of devices into the realm of connectivity and interaction with non-user operated devices such as sensors, monitors and remotely controllable devices. This webinar focuses on networking technologies developed for IPv6 to support IoT particularly in constrained networking environments.
We get a fantastic, expert response from the BT Diamond IP service desk and competence centre.”
- Ruben Cervantes, Core Network Engineer and Hostmaster, Telefónica Germany GmbH.
Learn from of our broad DDI expertise
- Free educational webinars
- Learn how DDI technologies are instrumental in IP network evolution from VoIP, cloud, IPv6, security, IoT and more
- Leverage our two decades’ DHCP, DNS and IP address management experience
- We’ve contributed our knowledge to DDI technology evolution
- Co-authored IETF RFCs
- Three authored DDI books
- DDI industry innovation
- Dozens of published white papers and webinars
Our free educational materials are available globally.