Internet Address Management Tools Find New UK Home

Internet Address Management Tools Find New UK Home

By Doug Barney

BT Diamond IP has a portfolio of IPv4/IPv6 address management applications that are now making their way to the U.K. and beyond thanks to a new distribution deal with ASM Technologies that also includes access to EMEA markets.

Address management is of particular importance for IPv4, where the addresses aren’t infinite, and IPv6, which while not exactly new, is new in terms of its implementation.

And of course these tools can be especially effective in helping IT and service providers transition to the more robust IPv6.


Image via Shutterstock

This is of critical concern as IPv4 addresses begin to grow scarce and for the good of the Internet ISPs and enterprises embrace – albeit slowly – IPv6 which offers exponentially more addresses.

“For enterprises this means they must ensure their infrastructure, services and applications are IPv6 compatible to support deployment of IPv6 address space, while maintaining their existing IPv4 infrastructure investment. IP address management tools from BT Diamond IP help to manage this process,” the company said.

BT Diamond IP has a range of Internet and address management tools that include DNS, DHCP and IPAM (DDI) software. The technology can come in the form of managed services or appliances.

ASM, meanwhile, will be offering the tools mostly to VARs and systems integrators.

BT Diamond IP has been in the IP Address Management market for almost two decades, and “is part of the BT Connect portfolio of products and services which enable customers to intelligently manage their data networks,” the company said. “The partnership with ASM will allow BT to concentrate on their own core Global Services customers whilst ASM and their resellers address markets not yet approached by BT Diamond IP. This will increase the breadth of customers that BT Diamond IP can address,” the company added.

BT Diamond IP believes that partners such as ASM can help the needed adoption of IPv6.

“Deployment of IPv6 should be among the key target milestones for customers to keep pace with the continuous evolution of the internet,” said Michael Dooley at BT Diamond IP, author of the IPv6 Deployment and Management book. “Our most recent IPv6 industry survey suggests that over half of the world’s enterprises are already deploying or plan to deploy IPv6 across all or part of their networks by 2015. This is a significant market opportunity as enterprises may require assessment, planning and deployment assistance to deploy IPv6 as smoothly as possible without disrupting their critical network infrastructure.”




Edited by Alisen Downey
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

MSPToday Editor at Large

SHARE THIS ARTICLE
Related Articles

CyberSaint Raises $21M in Series A Funding to Continue Securing its CyberStrong Customers

By: Alex Passett    3/27/2024

CyberSaint announced that it succeeded in a huge $21 million Series A funding round. This was led by Riverside Acceleration Capital (RAC) with other i…

Read More

US Education Receives Security Upgrade with Free Browser Protection Offered by Conceal, Carahsoft

By: Greg Tavarez    3/27/2024

Conceal and Carahsoft recently unveiled an initiative to fortify the cybersecurity infrastructure of U.S. educational institutions.

Read More

Cato's AI Takes Control of Security and Incident Response

By: Greg Tavarez    3/27/2024

With Cato's recently announced Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and conduct root c…

Read More

A GenAI Cybersecurity Collab: CrowdStrike and NVIDIA, to the Rescue

By: Alex Passett    3/26/2024

CrowdStrike struck a critical deal to strategically collaborate with NVIDIA, a titan in the world of accelerated computing capabilities, high-performi…

Read More

Halo Security's Platform Now Offers Dark Web Monitoring for Comprehensive Security

By: Greg Tavarez    3/26/2024

With the new dark web monitoring feature, security teams streamline the identification of leaked credentials and potential data breaches.

Read More