{"id":12249,"date":"2025-09-02T07:55:31","date_gmt":"2025-09-02T14:55:31","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12249"},"modified":"2025-09-02T08:02:36","modified_gmt":"2025-09-02T15:02:36","slug":"introducing-infoblox-tokens-preemptive-security-on-your-terms","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/","title":{"rendered":"Introducing Infoblox Tokens: Preemptive Security on Your Terms"},"content":{"rendered":"<p>Have you ever wished your security licensing could keep up with the ever-changing threat landscape and your evolving needs? Then listen up.<\/p>\n<p>On September 1, 2025, Infoblox introduced <strong>token-based licensing<\/strong> for our security portfolio. That includes Infoblox Threat Defense\u2122, Dossier, Lookalike Domain Monitoring, SOC Insights and more. Instead of rigid SKUs and fixed entitlements, tokens give you <strong>flexible, modular access<\/strong> to the protection your environment needs, when and where you need it.<\/p>\n<p>Because security demands <strong>options that move at the speed that risks change<\/strong>, your security licensing should be able to keep up.<\/p>\n<h3>So, What Is a Token?<\/h3>\n<p>Think of Infoblox Security Tokens as a universal key that unlocks capabilities across the Infoblox security suite. You buy the tokens you need and apply them where they are needed:<\/p>\n<ul class=\"list-spacing\">\n<li>Want to secure your hybrid cloud with Threat Defense? Apply tokens there.<\/li>\n<li>Need to monitor for impersonation campaigns with Lookalike Monitoring? Allocate tokens.<\/li>\n<li>Want to investigate faster with Dossier or visualize coverage with SOC Insights? Tokens power those too.<\/li>\n<li>Need to export logs to your SIEM or SOAR? Use <strong>Reporting Tokens<\/strong>.<\/li>\n<\/ul>\n<p>It\u2019s a modern model for how organizations operate today: dynamic, incremental and focused on preemptive coverage across users, workloads and infrastructure.<\/p>\n<h3>Why This Matters Now<\/h3>\n<p>The threat landscape isn\u2019t just evolving\u2014it\u2019s accelerating. Adversaries now use AI to craft attacks that mutate in real time, slipping past static defenses. Meanwhile, traditional license models tied to seats or tiers can\u2019t keep up with how security is deployed across hybrid, cloud-first environments.<\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/products\/threat-defense\/\" target=\"_blank\"><strong>Infoblox Threat Defense<\/strong><\/a> is designed for preemptive protection<sup>1<\/sup>: blocking threats before execution by identifying attacker infrastructure early in the kill chain. Now, tokens bring that same preemptive mindset to how you license it.<\/p>\n<table class=\"calloutbox\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><strong>You don\u2019t have to max out your deployment, wait for renewal cycles or guess where your next investment should go. You simply adjust the allocation of tokens to where your risk or need is at that moment.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Built for Adaptability<\/h3>\n<p>What makes tokens powerful isn\u2019t just where you can use them, it\u2019s how easily you can reallocate them whenever and where.<\/p>\n<ul class=\"list-spacing\">\n<li>Want to start in the cloud, then expand to on-prem? You can. Or vice versa.<\/li>\n<li>Temporarily increasing log exports for an audit or investigation? Easy.<\/li>\n<li>Growing your protected asset footprint? Tokens scale with you.<\/li>\n<\/ul>\n<p>Tokens are automatically tracked and allocated based on usage. And with the <strong>Infoblox Licensing Portal<\/strong>, you have full visibility into how they\u2019re being used\u2014no spreadsheets, no surprises. <\/p>\n<h3>Designed for Your Ecosystem<\/h3>\n<p>Infoblox Tokens don\u2019t just support a flexible product strategy, they power integrations across your entire security stack. Threat intelligence from Infoblox feeds into next-generation firewalls (NGFWs), SIEMs and extended detection and response (XDR) platforms, and more. With <strong>Security Workspace<\/strong>, SOC teams can monitor DNS-layer threats in real time. And with <strong>Dossier<\/strong>, they can research threats quickly and efficiently without switching tools.<\/p>\n<p>Explore these capabilities by checking out our recent posts on:<\/p>\n<ul class=\"list-spacing\">\n<li><a href=\"https:\/\/blogs.infoblox.com\/security\/operationalizing-preemptive-security-easily-understand-your-environment-and-fine-tune-policies-with-security-workspace\/\"><strong>Security Workspaces<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/security\/unlocking-instant-visibility-on-impacted-assets-with-asset-workspaces-soc-transformation-starts-here\/\"><strong>Asset Integrations<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/security\/operationalize-protective-dns-step-by-step\/\"><strong>Detection Mode<\/strong><\/a><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-image.jpg\" alt=\"\" width=\"895\" height=\"498\" class=\"alignnone size-full wp-image-12211\" \/><\/p>\n<p class=\"image-caption\">Figure 1. Offer structure: Security and reporting<\/p>\n<p>Figure 1 illustrates how Security Tokens and Reporting Tokens map across the Infoblox security portfolio, including the following uses: Threat Defense for cloud and on-premises appliances, SOC Insights, Log Export, Dossier and Lookalike Domain Monitoring.<\/p>\n<h3>See What DNS-First Security Looks Like<\/h3>\n<p>Infoblox Tokens give you more than a flexible way to license security\u2014they give you a way to <strong>take control<\/strong> of how, where and when you protect your environment. Whether you\u2019re a current customer looking to simplify entitlements, or new to Infoblox and exploring preemptive DNS security, tokens let you move fast without being boxed in. <\/p>\n<h3>Want to See What Threats We Detect That Others Miss?<\/h3>\n<p>Reach out to your <a href=\"https:\/\/www.infoblox.com\/products\/threat-defense\/#talk-to-an-expert\" target=\"_blank\"><strong>Infoblox representative<\/strong><\/a> to request a no-risk trial of Detection Mode in your environment.<\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.gartner.com\/en\/documents\/5818147\" target=\"_blank\"><strong>Emerging Tech: Build Preemptive Security Solutions to Improve Threat Detection (Part 1)<\/strong><\/a>, Gartner, October 7, 2024.<\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n.list-spacing li {\n    margin-bottom: 20px;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Introducing Infoblox Tokens<\/span>: Preemptive Security on Your Terms ');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever wished your security licensing could keep up with the ever-changing threat landscape and your evolving needs? Then listen up. On September 1, 2025, Infoblox introduced token-based licensing for our security portfolio. That includes Infoblox Threat Defense\u2122, Dossier, Lookalike Domain Monitoring, SOC Insights and more. Instead of rigid SKUs and fixed entitlements, tokens [&hellip;]<\/p>\n","protected":false},"author":423,"featured_media":12252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1306,1307],"class_list":{"0":"post-12249","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-threat-defense-tokens","9":"tag-threat-defense-security-tokens","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments<\/title>\n<meta name=\"description\" content=\"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments\" \/>\n<meta property=\"og:description\" content=\"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-02T14:55:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-02T15:02:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Fischer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments\" \/>\n<meta name=\"twitter:description\" content=\"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Fischer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/\"},\"author\":{\"name\":\"Ben Fischer\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/84a5220f6a1f32c4ee16707c661f889c\"},\"headline\":\"Introducing Infoblox Tokens: Preemptive Security on Your Terms\",\"datePublished\":\"2025-09-02T14:55:31+00:00\",\"dateModified\":\"2025-09-02T15:02:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/\"},\"wordCount\":645,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg\",\"keywords\":[\"Threat Defense Tokens\",\"Threat Defense Security Tokens\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/\",\"name\":\"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg\",\"datePublished\":\"2025-09-02T14:55:31+00:00\",\"dateModified\":\"2025-09-02T15:02:36+00:00\",\"description\":\"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/introducing-infoblox-tokens-preemptive-security-on-your-terms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing Infoblox Tokens: Preemptive Security on Your Terms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/84a5220f6a1f32c4ee16707c661f889c\",\"name\":\"Ben Fischer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/ben-fischer-photo-96x96.jpeg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/ben-fischer-photo-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/ben-fischer-photo-96x96.jpeg\",\"caption\":\"Ben Fischer\"},\"description\":\"Ben Fischer is a Senior Product Marketing Manager with over 20 years of experience in cybersecurity, spanning network engineering, product management, and product marketing. He has held impactful roles at industry-leading companies including Cisco, RSA, Arbor Networks, Pulse Secure, and Red Hat, where he helped bring to market innovative solutions in network security, threat detection, and cloud-delivered security services. At Infoblox, Ben leads product marketing for the Threat Defense product, shaping strategic positioning and messaging, and driving go-to-market initiatives that connect security innovation to customer value. A founding member of the Confidential Computing Consortium, Ben has a track record of advancing emerging security technologies and fostering industry collaboration. He is currently part of Infoblox\u2019s product and solutions marketing team. Ben holds an MBA from Rice University and a bachelor\u2019s degree from Worcester Polytechnic Institute.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ben-fischer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments","description":"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/","og_locale":"en_US","og_type":"article","og_title":"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments","og_description":"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/","og_site_name":"Infoblox Blog","article_published_time":"2025-09-02T14:55:31+00:00","article_modified_time":"2025-09-02T15:02:36+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg","type":"image\/jpeg"}],"author":"Ben Fischer","twitter_card":"summary_large_image","twitter_title":"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments","twitter_description":"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg","twitter_misc":{"Written by":"Ben Fischer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/"},"author":{"name":"Ben Fischer","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/84a5220f6a1f32c4ee16707c661f889c"},"headline":"Introducing Infoblox Tokens: Preemptive Security on Your Terms","datePublished":"2025-09-02T14:55:31+00:00","dateModified":"2025-09-02T15:02:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/"},"wordCount":645,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg","keywords":["Threat Defense Tokens","Threat Defense Security Tokens"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/","url":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/","name":"Introducing Infoblox Tokens: Flexible, Preemptive Security Licensing for Hybrid and Cloud Environments","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg","datePublished":"2025-09-02T14:55:31+00:00","dateModified":"2025-09-02T15:02:36+00:00","description":"Discover Infoblox Tokens\u2014flexible, preemptive security licensing for Threat Defense, SOC Insights, Dossier, and hybrid cloud environments.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-infoblox-tokens-preemptive-security-on-your-terms-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/introducing-infoblox-tokens-preemptive-security-on-your-terms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Introducing Infoblox Tokens: Preemptive Security on Your Terms"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/84a5220f6a1f32c4ee16707c661f889c","name":"Ben Fischer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ben-fischer-photo-96x96.jpeg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ben-fischer-photo-96x96.jpeg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ben-fischer-photo-96x96.jpeg","caption":"Ben Fischer"},"description":"Ben Fischer is a Senior Product Marketing Manager with over 20 years of experience in cybersecurity, spanning network engineering, product management, and product marketing. He has held impactful roles at industry-leading companies including Cisco, RSA, Arbor Networks, Pulse Secure, and Red Hat, where he helped bring to market innovative solutions in network security, threat detection, and cloud-delivered security services. At Infoblox, Ben leads product marketing for the Threat Defense product, shaping strategic positioning and messaging, and driving go-to-market initiatives that connect security innovation to customer value. A founding member of the Confidential Computing Consortium, Ben has a track record of advancing emerging security technologies and fostering industry collaboration. He is currently part of Infoblox\u2019s product and solutions marketing team. Ben holds an MBA from Rice University and a bachelor\u2019s degree from Worcester Polytechnic Institute.","url":"https:\/\/www.infoblox.com\/blog\/author\/ben-fischer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/423"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12249"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12249\/revisions"}],"predecessor-version":[{"id":12259,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12249\/revisions\/12259"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12252"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}