Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.42 MB, 40 trang )
A Focus on Security
Providers should employ a variety of security measures to establish
trust, defend against threats and malicious attacks, and mitigate risk.
Moreover, they should have dedicated security personnel who
closely monitor industry trends and can easily explain the nature of
threats and solutions. A plan should also be in place to regularly
update their data center systems.
No matter how good the automated services of a provider, they
mean little when something isn’t working. Having 24/7/365 techni‐
cal support from a team operating in your geography’s office hours
and trained DNS experts on-call can be crucial to preventing down‐
time for your customers. If the provider has different tiers of sup‐
port, you’ll want to pay careful attention to the SLA offered by the
services utilized by each of the tiers and not just the cost.
There should be clear, easy-to-access online documentation that is
frequently reviewed and updated. A bonus is standard datagathering tools to harvest log and system information for easy inter‐
action with technical support during problem resolution.
Most providers will have basic tools available to customers. An
example would be a GUI to create policies for executing failover if
resources become unavailable or unreachable in a key market.
Based on how your IT staff operates, there are multiple things to
consider around the provider’s tools:
• Are they online or do you need to install them?
• Do they run on the favored operating systems and/or browsers
that your teams rely on?
• Are there mobile apps to interface with the system?
• What security protocols do you need to access them? 2FA? Bio‐
metric? Single sign-on?
• How often are they updated and can you choose when to take
Chapter 5: Choosing a Managed DNS Provider
• How well documented are they?
And, if you plan to build custom solutions on top of their platform,
you need to understand the frameworks they provide. Most com‐
monly and ideally, this will be a well-defined set of APIs for your
developers to interface with, along with clear examples to draw
A complete solution for resiliency at the edge involves an eyes-wideopen assessment of the vulnerabilities and needs of your particular
situation. After that is clear, you are in a position to consider which
strategies will best serve your needs and address your concerns. If
you are considering adding a managed DNS, it is important to think
about the criteria that are most important to you in a potential solu‐
tion and how well a provider might or might not meet those needs.
We hope this book has been useful to you and has provided insights
and ideas that you can incorporate in the short and long terms to
safeguard your network, your customer interactions, and ultimately
your success. To learn more about the growing need for distributing
IT resources and services to the edge of a company’s network, closer
to user populations, we recommend reading Gartner’s report “The
Edge Manifesto” by analyst Bob Gill.
In closing, we leave you with one key thought that applies when
dealing with edge resiliency just as it does for all other challenges.
Intent is not enough to solve your business problem. Learning and
taking action are the dual strategies that will get you where you want
to go. We wish you continued success.
About the Authors
Gary Sloper is a vice president at Oracle Dyn. Gary brings over 20
years of experience to his leadership of the global solutions engi‐
neering and customer success teams. His organization architects
and implements cloud-based edge services, including providing
deliverability and security services to help customers monitor, con‐
trol, and optimize their CDN and hybrid cloud workloads.
As course director for Global Knowledge (GK), Mark Wilkins
developed and taught many technical seminars including Configur‐
ing Active Directory Services, Configuring Group Policy, and Cloud
and Virtualization Essentials. Mark also developed courseware for
the Microsoft Official Curriculum 2008 stream: Managing and
Maintaining Windows Server 2008 Network Services, and Active
Directory Services. Mark’s published books include Windows 2003
Registry for Dummies (IDG), Windows System Policies, Administering
SMS 3.0, and Administering Active Directory (McGraw-Hill). Mark’s
latest book is Learning AWS, due to be published by Pearson Educa‐
tion in 2019.