{"id":13459,"date":"2026-05-05T07:59:35","date_gmt":"2026-05-05T14:59:35","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=13459"},"modified":"2026-05-05T08:02:36","modified_gmt":"2026-05-05T15:02:36","slug":"preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/","title":{"rendered":"Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection"},"content":{"rendered":"<p>Security teams today don\u2019t suffer from a lack of alerts. They suffer from a lack of effective intervention.<\/p>\n<p>Phishing, exec impersonation, fraud and credential abuse increasingly originate outside the enterprise, across domains, websites, social platforms, ads, mobile apps and underground forums. These environments sit beyond the reach of traditional security controls, and attackers can stand up, test and scale infrastructure long before defenders can intervene.<\/p>\n<p>That gap between where attacks originate and where controls operate is exactly what Infoblox set out to close by acquiring Axur.<\/p>\n<p>Together, Infoblox and Axur deliver\u202f<a href=\"https:\/\/www.infoblox.com\/products\/exposure-management\/\" target=\"_blank\"><strong>Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management<\/strong><\/a>, a unified approach to discovering, validating, disrupting and preventing external threats before they impact users, brands or the business.<\/p>\n<h3>From Detection to Disruption<\/h3>\n<p>Many brand protection and external threat tools struggle with both detection and disruption. Traditional monitoring often relies on domain lookalikes or keyword matching, missing sophisticated campaigns that use generic domains and traffic distribution systems (TDSs) to cloak malicious content from scanners. Even when findings are surfaced, analysts must manually validate abuse, assemble evidence, coordinate takedowns and track outcomes across fragmented systems.<\/p>\n<p>Axur was designed to eliminate that friction.<\/p>\n<p>Its platform continuously discovers external threats using AI-driven content and visual analysis to identify abuse based on behavior and intent, not domain resemblance. This is critical, as attackers increasingly host phishing pages on random infrastructure and use cloaking to evade automated detection. Axur detects impersonation even when logos, layouts or language are subtly altered, while agentic workflows trigger enforcement without waiting for manual review.<\/p>\n<p>Once validated, Axur automates the takedown process end to end, handling evidence submission, provider workflows and follow-up across thousands of external platforms.<\/p>\n<p>The objective is not to respond faster just for the sake of faster response. It is to intervene before attacker infrastructure can be operationalized and scaled.<\/p>\n<h3>Preemptive Protection While Takedowns Are Underway<\/h3>\n<p>Even with automation, external takedowns are not instantaneous. Platforms have their own processes, and attackers exploit that window.<\/p>\n<p>This is where Infoblox adds a critical layer of infrastructure-level protection.<\/p>\n<p>By combining Axur\u2019s Web Safe Reporting capabilities with Infoblox Threat Defense\u2122, our Protective DNS solution, organizations can protect users while disruption is underway:<\/p>\n<ul class=\"list-spacing\">\n<li><strong>Protective DNS<\/strong> blocks managed users, devices and workloads from resolving to confirmed high-risk\/malicious destinations, including those flagged by Axur for takedowns.<\/li>\n<li>Axur\u2019s <strong>Web Safe Reporting<\/strong> provides browser-level warnings and user-facing protection for public users, reducing engagement and credential loss while takedowns are in progress.<\/li>\n<\/ul>\n<p>Protection does not wait for removal to complete. Enforcement begins as soon as threats are validated.<\/p>\n<h3>Sustained Removal, Not Whack-a-Mole<\/h3>\n<p>Attackers rarely stop after a single takedown. They re-register domains, relaunch ads and clone assets across new platforms.<\/p>\n<p>Axur\u2019s stay-down monitoring continuously detects recurrence and variation, helping ensure that removed infrastructure does not quietly reappear. Each action is tracked with defensible evidence, clear status and full audit history.<\/p>\n<p>This persistence matters. It turns one-time takedowns into durable disruption and allows teams to demonstrate that abuse was not only removed but kept down.<\/p>\n<p>Beyond persistence, each takedown generates intelligence. Evidence collected during enforcement, such as hosting data, registration artifacts, infrastructure reuse patterns, ad accounts and credential harvesting endpoints, often reveals additional domains and assets tied to the same campaign. What begins as a single phishing page frequently expands into a broader attacker infrastructure map.<\/p>\n<p>When confirmed malicious domains and infrastructure context flow into Infoblox Threat Intel, passive DNS analysis can uncover related assets and expand visibility across attacker infrastructure by correlating external abuse signals with DNS telemetry. One validated takedown accelerates the next detection. This is not whack-a-mole; it is a compounding intelligence cycle.<\/p>\n<h3>Attribution as a Force Multiplier<\/h3>\n<p>Disruption alone is not enough. Security teams need to understand who and what was at risk.<\/p>\n<p>Infoblox\u2019s asset attribution links external abuse to the users, devices, workloads and business units actually at risk. This context allows teams to:<\/p>\n<ul class=\"list-spacing\">\n<li>Prioritize response based on business impact<\/li>\n<li>Route incidents into existing security and IT workflows<\/li>\n<li>Prove exposure reduction to leadership and auditors<\/li>\n<\/ul>\n<p>Attribution is what connects external disruption to internal accountability.<\/p>\n<h3>What This Means for Security Teams<\/h3>\n<p>With Axur-powered DRPS, teams can:<\/p>\n<ul class=\"list-spacing\">\n<li>Detect sophisticated external threats that evade traditional domain and keyword monitoring using AI-based content, visual and contextual analysis<\/li>\n<li>Validate real abuse with defensible evidence, reducing false positives and analyst overhead<\/li>\n<li>Automate takedowns at scale without expanding security teams<\/li>\n<li>Enforce protection immediately through DNS controls and browser-level warnings<\/li>\n<li>Ensure that threats are removed and remain down through continuous monitoring<\/li>\n<li>Link external abuse to impacted users, devices and business environments<\/li>\n<\/ul>\n<p>Operationally, this shifts teams from chasing incidents to systematically reducing external attack surface and impact.<\/p>\n<h3>Operationalizing Preemptive Threat Protection at Scale<\/h3>\n<p>Infoblox and Axur operationalize external threat protection at scale, combining AI-powered discovery and automated disruption with infrastructure-level prevention and attribution. At scale, speed, automation and sustained enforcement matter. The operational results reflect that:<\/p>\n<ul class=\"list-spacing\">\n<li>&lt;4 minutes\u202fmedian time to first notification after malicious activity is identified<\/li>\n<li>~9 hours\u202fmedian time to takedown after confirmation<\/li>\n<li>A 98.9%\u202ftakedown success rate<\/li>\n<li>86%\u202fof takedowns fully automated end to end<\/li>\n<li>40+ million URLs analyzed daily, with\u202f1,000+ malicious assets removed every day<\/li>\n<li>15-day stay-down monitoring\u202fto prevent recurrence<\/li>\n<\/ul>\n<p>Infoblox extends that advantage with infrastructure-level enforcement and attribution at global scale:<\/p>\n<ul class=\"list-spacing\">\n<li>Threats are blocked an average of\u202f68.4 days earlier\u202fthan with traditional security tools<\/li>\n<li>90% of threats are stopped before the first DNS query is ever made<\/li>\n<li>A\u202f0.0002% false positive rate, enabling enforcement without operational friction<\/li>\n<\/ul>\n<p>Together, this creates a continuous workflow from external discovery and disruption to internal enforcement and attribution, allowing security teams to act preemptively, protect users immediately and prove real exposure reduction across the organization.<\/p>\n<h3>Delivering Measurable Risk Reduction Outcomes<\/h3>\n<p>Ultimately, customers don\u2019t measure success by how many alerts they receive. They measure it by fewer incidents, less fraud and reduced operational burden. <\/p>\n<p>By combining Axur\u2019s AI-driven external disruption with Infoblox\u2019s DNS-based prevention and attribution, organizations can move from reactive response to measurable, sustained risk reduction.  <\/p>\n<p>External risk will continue to originate beyond traditional security boundaries. The organizations that succeed will be those that continuously discover, disrupt and enforce protection as part of a unified cycle. That\u2019s the standard we\u2019re building toward, and the reasons that Axur is such a strong <a href=\"https:\/\/www.infoblox.com\/blog\/company\/why-the-axur-acquisition-marks-a-turning-point-for-preemptive-security\/\"><strong>addition to Infoblox<\/strong><\/a>.<\/p>\n<style>\n.code-format {\nfont-family: 'Courier New';}.image-caption {    font-size: 12px;}.list-spacing li{margin-bottom:20px}ol.list-spacing > li::marker {    font-weight: 700;}.entry-content ul.list-spacing ul > li {    list-style-type: square;}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Preemptive Threat Disruption at Scale<\/span>: How Infoblox and Axur Turn External Risk into Protection ');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security teams today don\u2019t suffer from a lack of alerts. They suffer from a lack of effective intervention. Phishing, exec impersonation, fraud and credential abuse increasingly originate outside the enterprise, across domains, websites, social platforms, ads, mobile apps and underground forums. These environments sit beyond the reach of traditional security controls, and attackers can stand [&hellip;]<\/p>\n","protected":false},"author":387,"featured_media":13461,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1678,1679,1680,1556],"class_list":{"0":"post-13459","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-external-threats","9":"tag-digital-risk-protection-services","10":"tag-exposure-management","11":"tag-phishing-prevention","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Preemptive Threat Disruption at Scale | Infoblox &amp; Axur<\/title>\n<meta name=\"description\" content=\"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preemptive Threat Disruption at Scale | Infoblox &amp; Axur\" \/>\n<meta property=\"og:description\" content=\"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-05T14:59:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T15:02:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mukesh Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Preemptive Threat Disruption at Scale | Infoblox &amp; Axur\" \/>\n<meta name=\"twitter:description\" content=\"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mukesh Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/\"},\"author\":{\"name\":\"Mukesh Gupta\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d03950678d14c5ebbcfcee1093127893\"},\"headline\":\"Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection\",\"datePublished\":\"2026-05-05T14:59:35+00:00\",\"dateModified\":\"2026-05-05T15:02:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/\"},\"wordCount\":1054,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg\",\"keywords\":[\"External threats\",\"digital risk protection services\",\"exposure management\",\"phishing prevention\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/\",\"name\":\"Preemptive Threat Disruption at Scale | Infoblox & Axur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg\",\"datePublished\":\"2026-05-05T14:59:35+00:00\",\"dateModified\":\"2026-05-05T15:02:36+00:00\",\"description\":\"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg\",\"width\":612,\"height\":409},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d03950678d14c5ebbcfcee1093127893\",\"name\":\"Mukesh Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-mukesh-gupta-1-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-mukesh-gupta-1-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-mukesh-gupta-1-96x96.jpg\",\"caption\":\"Mukesh Gupta\"},\"description\":\"As senior vice president and chief product officer, Mukesh is responsible for developing and driving Infoblox\u2019s product vision and strategy to new heights. With his strong mix of networking and security backgrounds, entrepreneurial vision and go-to-market expertise he drives Infoblox\u2019s long-range vision of uniting networking and security to best serve the company\u2019s growing customer base. Mukesh joined Infoblox from Palo Alto Networks where he helped grow the company into a multi-billion-dollar leader in network security. Prior to Palo Alto Networks, Mukesh held senior product leadership roles at Illumio and Juniper Networks. He also co-founded LocalCircles, India\u2019s leading community and public pulse aggregation platform. A prolific inventor, Mukesh holds more than two dozen patents and patent applications advancing networking and security across hybrid cloud applications. Mukesh has an MBA from the Walter A. Haas School of Business, University of California Berkeley, a Master of Science in computer networking from the University of Toledo and a Bachelor of Engineering in electronics and telecommunications from Maulana Azad National Institute of Technology.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/mukesh-gupta\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Preemptive Threat Disruption at Scale | Infoblox & Axur","description":"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/","og_locale":"en_US","og_type":"article","og_title":"Preemptive Threat Disruption at Scale | Infoblox & Axur","og_description":"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/","og_site_name":"Infoblox Blog","article_published_time":"2026-05-05T14:59:35+00:00","article_modified_time":"2026-05-05T15:02:36+00:00","og_image":[{"width":612,"height":409,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg","type":"image\/jpeg"}],"author":"Mukesh Gupta","twitter_card":"summary_large_image","twitter_title":"Preemptive Threat Disruption at Scale | Infoblox & Axur","twitter_description":"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg","twitter_misc":{"Written by":"Mukesh Gupta","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/"},"author":{"name":"Mukesh Gupta","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d03950678d14c5ebbcfcee1093127893"},"headline":"Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection","datePublished":"2026-05-05T14:59:35+00:00","dateModified":"2026-05-05T15:02:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/"},"wordCount":1054,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg","keywords":["External threats","digital risk protection services","exposure management","phishing prevention"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/","url":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/","name":"Preemptive Threat Disruption at Scale | Infoblox & Axur","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg","datePublished":"2026-05-05T14:59:35+00:00","dateModified":"2026-05-05T15:02:36+00:00","description":"Infoblox and Axur deliver Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management, to disrupt and prevent threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection-thumbnail.jpg","width":612,"height":409},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d03950678d14c5ebbcfcee1093127893","name":"Mukesh Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-mukesh-gupta-1-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-mukesh-gupta-1-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-mukesh-gupta-1-96x96.jpg","caption":"Mukesh Gupta"},"description":"As senior vice president and chief product officer, Mukesh is responsible for developing and driving Infoblox\u2019s product vision and strategy to new heights. With his strong mix of networking and security backgrounds, entrepreneurial vision and go-to-market expertise he drives Infoblox\u2019s long-range vision of uniting networking and security to best serve the company\u2019s growing customer base. Mukesh joined Infoblox from Palo Alto Networks where he helped grow the company into a multi-billion-dollar leader in network security. Prior to Palo Alto Networks, Mukesh held senior product leadership roles at Illumio and Juniper Networks. He also co-founded LocalCircles, India\u2019s leading community and public pulse aggregation platform. A prolific inventor, Mukesh holds more than two dozen patents and patent applications advancing networking and security across hybrid cloud applications. Mukesh has an MBA from the Walter A. Haas School of Business, University of California Berkeley, a Master of Science in computer networking from the University of Toledo and a Bachelor of Engineering in electronics and telecommunications from Maulana Azad National Institute of Technology.","url":"https:\/\/www.infoblox.com\/blog\/author\/mukesh-gupta\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/387"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=13459"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13459\/revisions"}],"predecessor-version":[{"id":13584,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13459\/revisions\/13584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/13461"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=13459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=13459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=13459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}