{"id":1325,"date":"2018-07-03T21:15:49","date_gmt":"2018-07-03T21:15:49","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1325"},"modified":"2020-05-06T10:27:05","modified_gmt":"2020-05-06T17:27:05","slug":"top-7-security-reports-that-help-you-win-against-bad-actors-part","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/","title":{"rendered":"Top 7 Security Reports that Help You Win against Bad Actors &#8211; Part 1"},"content":{"rendered":"<p>This\u00a0blog is the third in our series on Reporting and Analytics, following the\u00a0<a href=\"\/community\/top-5-reports-that-increase-network-visibility-make-you-a-better-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Top 5 Reports that Increase Network Visibility &amp; Make You a Better Manager<\/em><\/a>\u00a0and\u00a0<a href=\"\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Why You Need Reporting &amp; Analytics with Query Logging<\/em><\/a><em>.\u00a0\u00a0<\/em>In this installment, I\u2019m going to share the Top 7 Security Reports that Help You Level the Playing Field Against Bad Actors.<\/p>\n<h2 id=\"toc-hId--1333249454\">Why Network Security Reports are Essential to Your Enterprise<\/h2>\n<p>Quite simply, the sheer number of targeted and complex cyber-attacks is on the rise.\u00a0 In 2017, there were a total of 612 publicly disclosed data breaches, exposing over 1.9 billion records (Privacy Rights Clearinghouse).\u00a0 Ransomware damages were $7 billion in 2017, up 600% from approximately $1 billion in 2016 (Cybersecurity Ventures).\u00a0 During that time, researchers found that 80 to 90 percent of all new malware is unique, designed to attack just one individual system.\u00a0 Further research shows that 72% of organizations believe that cybersecurity operations have become more difficult over the past 2 years, yet 51% of organizations are plagued with a shortage of cybersecurity skills (ESG Research).<\/p>\n<h2 id=\"toc-hId--445745773\">Increasing Threat of DNS Exfiltration<\/h2>\n<p>If you operate Internet commerce or informational website, you depend on your underlying DNS services.\u00a0 In recent years, DNS services were\u00a0used in some well-publicized breaches (Dyn, 2016, UK National Lottery, 2017, Boston Globe, 2017 and many others), where vulnerabilities have enabled data exfiltration attacks to succeed.<\/p>\n<p>DNS protocol enables a client to submit queries to and receive replies from an external server, but there is no message-level security enforced in typical DNS services.\u00a0 It offers an easy way for attackers to disrupt services, infiltrate malware into the network or exfiltrate sensitive data from your company.\u00a0 DNS attacks are historically categorized as a distributed denial of service (DDoS), DNS high-jacking or man-in-the-middle attacks. (\u201c<a href=\"http:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/securing-dns-thwart-advanced-targeted-attacks-reduce-data-breaches-35597\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches<\/a>&#8220;). The diagram below outlines how a typical DNS exfiltration attack is conducted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1329\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/common-dns-exfiltration-attack.png\" alt=\"Common DNS Exfiltration Attack\" width=\"600\" height=\"302\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/common-dns-exfiltration-attack.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/common-dns-exfiltration-attack-300x151.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><em>Source: Adapted from SANS Institute, Securing DNS Against Emerging Threats: A Hybrid Approach, John Pescatore, March 2017<\/em><\/p>\n<p>While DNS attacks are on the rise, the good news is that enterprise-class secure DNS solutions can level the playing field and get network and cybersecurity teams back in the game.\u00a0 Comprehensive network visibility, access, and timing are critical.\u00a0 A critical part of these solutions includes Reporting and Analytics tools integrated with DNS, DHCP and IPAM (DDI) to deliver the visibility you need and the real-time knowledge and insight that can give you the advantage over bad actors attempting to infiltrate or exfiltrate your network.\u00a0 These are essential for keeping your network safe and brand and favorable reputation intact.<\/p>\n<h2 id=\"toc-hId-441757908\">The Top 7 Security Reports to Fight Against Cyberattacks<\/h2>\n<p>Infoblox DDI engineers have analyzed and pre-built a significant number of customizable, out-of-the-box reports over the years with feedback and analytics insights from customers, architects, administrators, SMEs, SEs, sales, and others.\u00a0 Built on the Splunk reporting and visualization engine, these reports can be accessed through security dashboards, customized as needed, exported as a .pdf, scheduled to run and be distributed in advance to give you the intel you need with minimal effort.\u00a0 They\u2019ve been gathered into a collection and made available to Infoblox customers through the\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-datasheet-infoblox-reporting-and-analytics-sample-report.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Sample Report Guide<\/a>.\u00a0 Let\u2019s look now at the top 7 Security reports and how they can help you detect network attacks as they happen, not at the end of the malware cycle when the damage is done.\u00a0 As an existing Infoblox customer, you can have access to these powerful, real-time network reports today through a Free Tier trial in as little as 20 minutes, to give you the intel you need, save time and money and improve the way you manage.<\/p>\n<p>Here are the seven (7) security reports that can give you an edge over the bad actors.<\/p>\n<ul>\n<li><a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #7: DNS Top NXDOMAIN \u2013 NOERROR<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #6: Threat Protection &#8211; Top Rules by Source<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #5: Top Malware &amp; DNS Tunneling by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #4: Tunneling Traffic by Category<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #3: DNS Top Tunneling Activity<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #2: Malicious Activity by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-1-dns-top-rpz-hits\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #1: DNS Top RPZ Hits<\/a><\/li>\n<\/ul>\n<h2 id=\"toc-hId-1329261589\">Learn more:<\/h2>\n<ul>\n<li>Join the Infoblox Reporting &amp; Analytics Technical Demo Series to continue the discussion in the free webinar on 7\/17, 2018, 9A PDT, 12P EDT, 5P BST.\u00a0<a href=\"https:\/\/infoblox.zoom.us\/meeting\/register\/a4f2cc50de136b83dc2040ba88984b7b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Register<\/a><\/li>\n<li>As an existing Infoblox DDI customer, you can deploy a virtual Infoblox Reporting &amp; Analytics appliance free of charge \u2014 no strings attached.\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__info.infoblox.com_WW-5FFY17-5FOS-5FFR-5FReportingAnalyticsFreeTierDownload-3Futm-5Fsource-3Dblox-2Dcommunity-26utm-5Fcampaign-3Dcommunity-2Dq2&amp;d=DwMGaQ&amp;c=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E&amp;r=GVp6jcnVnuL0Gt3sI2iNDqwbBy_ggT-pLWoFGKRoaBo&amp;m=xZuyCuq7F8uEaK9Dd665WpoPRXMvCdoYGfRiUJijM-c&amp;s=qDnqbSNVyVRYSOGBWT5PePzVe6QhRyEmiqm7M_ymXos&amp;e=&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download<\/a>\u00a0and try the\u00a0<a href=\"http:\/\/info.infoblox.com\/WW_FY17_OS_FR_ReportingAnalyticsFreeTierDownload?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Reporting &amp; Analytics Free Tier<\/a>\u00a0today.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This\u00a0blog is the third in our series on Reporting and Analytics, following the\u00a0Top 5 Reports that Increase Network Visibility &amp; Make You a Better Manager\u00a0and\u00a0Why You Need Reporting &amp; Analytics with Query Logging.\u00a0\u00a0In this installment, I\u2019m going to share the Top 7 Security Reports that Help You Level the Playing Field Against Bad Actors. Why [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":1149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[64,15],"class_list":{"0":"post-1325","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-reporting-and-analytics","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top 7 Security Reports that Help You Win against Bad Actors - Part 1<\/title>\n<meta name=\"description\" content=\"This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility &amp; Make You a Better Manager and Why You Need Reporting &amp; Analytics with Query Logging.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 7 Security Reports that Help You Win against Bad Actors - Part 1\" \/>\n<meta property=\"og:description\" content=\"This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility &amp; Make You a Better Manager and Why You Need Reporting &amp; Analytics with Query Logging.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-03T21:15:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Top 7 Security Reports that Help You Win against Bad Actors &#8211; Part 1\",\"datePublished\":\"2018-07-03T21:15:49+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"keywords\":[\"Reporting and Analytics\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/\",\"name\":\"Top 7 Security Reports that Help You Win against Bad Actors - Part 1\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"datePublished\":\"2018-07-03T21:15:49+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"description\":\"This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility & Make You a Better Manager and Why You Need Reporting & Analytics with Query Logging.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-7-security-reports-that-help-you-win-against-bad-actors-part\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top 7 Security Reports that Help You Win against Bad Actors &#8211; Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 7 Security Reports that Help You Win against Bad Actors - Part 1","description":"This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility & Make You a Better Manager and Why You Need Reporting & Analytics with Query Logging.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/","og_locale":"en_US","og_type":"article","og_title":"Top 7 Security Reports that Help You Win against Bad Actors - Part 1","og_description":"This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility & Make You a Better Manager and Why You Need Reporting & Analytics with Query Logging.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/","og_site_name":"Infoblox Blog","article_published_time":"2018-07-03T21:15:49+00:00","article_modified_time":"2020-05-06T17:27:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Top 7 Security Reports that Help You Win against Bad Actors &#8211; Part 1","datePublished":"2018-07-03T21:15:49+00:00","dateModified":"2020-05-06T17:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/"},"wordCount":725,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","keywords":["Reporting and Analytics","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/","url":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/","name":"Top 7 Security Reports that Help You Win against Bad Actors - Part 1","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","datePublished":"2018-07-03T21:15:49+00:00","dateModified":"2020-05-06T17:27:05+00:00","description":"This blog is the third in our series on Reporting and Analytics, following the Top 5 Reports that Increase Network Visibility & Make You a Better Manager and Why You Need Reporting & Analytics with Query Logging.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","width":660,"height":454,"caption":"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Top 7 Security Reports that Help You Win against Bad Actors &#8211; Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1325"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1325\/revisions"}],"predecessor-version":[{"id":3649,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1325\/revisions\/3649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1149"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}