{"version":"1.0","provider_name":"Infoblox Blog","provider_url":"https:\/\/www.infoblox.com\/blog","author_name":"PG Menon","author_url":"https:\/\/www.infoblox.com\/blog\/author\/pg-menon\/","title":"Network Identity in a Cloud-native World","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"33nMRi5h3M\"><a href=\"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/\">Network Identity in a Cloud-native World<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/embed\/#?secret=33nMRi5h3M\" width=\"600\" height=\"338\" title=\"&#8220;Network Identity in a Cloud-native World&#8221; &#8212; Infoblox Blog\" data-secret=\"33nMRi5h3M\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.infoblox.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","thumbnail_width":660,"thumbnail_height":454,"description":"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method."}