{"id":1501,"date":"2019-01-30T23:15:18","date_gmt":"2019-01-30T23:15:18","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1501"},"modified":"2020-05-06T10:27:01","modified_gmt":"2020-05-06T17:27:01","slug":"modern-ip-address-management-as-a-security-asset-part-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/","title":{"rendered":"Modern IP Address Management as a Security Asset Part 2"},"content":{"rendered":"<p>By Chris Richardson with Bob Rose<\/p>\n<p>In our blog,\u00a0<a title=\"Modern IPAM as a Security Asset Part 1\" href=\"\/community\/modern-ip-address-management-as-a-security-asset-part-1\/\" target=\"_self\" rel=\"noopener noreferrer\">Modern IPAM as a Security Asset Part 1<\/a>, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints.\u00a0\u00a0We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.<\/p>\n<p><strong>Sam Security and Nancy Network Revisited<\/strong><\/p>\n<p>A SecurityWeek\u00a0<a title=\"Security vs. Smooth Network Operations - You Don\u2019t Always Have to Sacrifice One for the Other\" href=\"https:\/\/www.securityweek.com\/security-vs-smooth-network-operations-you-don%E2%80%99t-always-have-sacrifice-one-other\" target=\"_self\" rel=\"nofollow noopener noreferrer\">article<\/a>\u00a0co-authored with Rod Rasmussen some years ago raises this point: \u201cWhy Sam Security needs a seat at Nancy Network\u2019s table.\u201d<\/p>\n<p>The main \u2013 and still very relevant \u2013 takeaway here is to use \u201clow-friction\u201d assets already available that can benefit (or at least not harm) network performance. The subtext you can read into this clever lexicon is that it is best to use existing budget line items to get done quickly what might otherwise take several months of negotiation for enhanced resources. Selling the benefits to peers as a win\/win can be an easier pathway to progress than buying something as a new or add-on solution. If you disagree with that statement, please connect with us and we can chat offline. This principle is still certainly true with modernizing DNS Resolvers and designing security into network administration \u2013 your DNS servers are either a security asset or a security liability today \u2013 whether it becomes an asset or liability is a\u00a0choice left up to you depending on how you allocate resources. However, an even simpler manifestation of this principle is to look at your IPAM. In the network operations world, few solutions have been as much of a boon to network administration as moving from shared spreadsheets (and Notepad in some cases) to efficient IP address management. A couple of questions to ask yourself about whether your organization is using resources efficiently are:<\/p>\n<p>1) Can you get the contextual data you need for today\u2019s event easily?<\/p>\n<p>2) Can you automatically get the data you need for yesterday\u2019s event easily?<\/p>\n<p>From our perspective, the answer to these questions both start with IPAM. Why? Let\u2019s look at what organizations nowadays are up against. Many employees have capability to stand up 500 connected virtual machines instantly. Containerization using IPv6 will only amplify that volatility. Do you know how many user-device combinations have privileges to administer, edit and configure your cloud data? AWS offers per-user administrative configuration for who can do what, but are they are configured with the principle of least privilege? How would you verify this? And let\u2019s look at \u201cold\u201d Internet of Things (IOT): multifunction printers have hard drives, are connected and store sensitive data by default. Your answer? Our internal DNS is fine. Who attacks a printer? Why do I need to inventory MF printers on our network? Or unpatched windows machines or Point-of-Sale systems? The list goes on. Why are we not using these innovations in network management to move toward individual risk scoring of assets? That is to say, link user and computer situations and then overlay a richer set of DHCP meta data like lease history? From there, assign DNS RPZ risk rule sets to those unique situations? A point to ponder.<\/p>\n<p>So many threat intelligence whitepapers, articles and conference panels include variations on this theme:\u00a0 <strong>\u201cWe\u00a0gotta\u00a0do basic hygiene. We gotta do the basics well.\u201d<\/strong>It turns out that boring hygiene can actually be a great source of data through modern IPAM.\u00a0As we approach another RSA extravaganza, keep in mind the basics. Boring as it may be, it just so happens that modern IP Address Management can be a rich and reliable source of applicable wisdom that enhances everything else you\u2019re doing \u2013 or trying to do \u2013 in security. Great data leads to great creativity \u2013 more use cases can be addressed and more solutions can be devised by the talented people you work with every day. What is the point here? When you do IPAM for free, you \u201cbuy cheap, but pay twice.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1503\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/IPAMQS_Roadmap.jpg\" alt=\"Authoritative IPAM: Where does it fit in the Plan?\" width=\"654\" height=\"312\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPAMQS_Roadmap.jpg 654w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPAMQS_Roadmap-300x143.jpg 300w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/p>\n<p>Enter authoritative IPAM. Authoritative IPAM accurately reflects the state of your network, provides contextual visibility (i.e., the who, what, why, when, how, where and which) of your network assets (e.g., IP addresses, subnets or VLANs) and enables you to replace manual, error-prone tools and processes with efficient, automated workflows. The following graphic provides a step-model for understanding where this fits in your plan.<\/p>\n<p>If we were to devise a \u201cpunch list\u201d for how to integrate authoritative IPAM data as a security asset, we\u2019d suggest 4 key components:<\/p>\n<ol>\n<li><strong>Single Source of Truth (Authoritative IPAM): <\/strong>Accuracy, visibility, reliability and IPAM automation is where to start. Management through distributed, high availability, security-hardened, easy-to-manage core network services with central platform visibility delivers your advantage. Providing an agentless DDI overlay that retains Microsoft DNS and DHCP protocols, enables visibility to AD Sites and Services, user\/IP mapping and IPAM sync makes your life better by eliminating IP conflicts, lease and network outages.<\/li>\n<li><strong>Continuous Asset Discovery (On-Premises and in the Hybrid Cloud): <\/strong>Automated on-premises and multi-cloud asset discovery, visibility, IPAM sync, switch port management, rogue and compromised asset detection, open RESTful and leading cloud interfaces (e.g., AWS, Azure, Google Cloud Platform, OpenStack), DNS\/IP provisioning, DDI policy-based automation, auditing and workflow automation deliver the efficiency and control you need.<\/li>\n<li><strong>Cross-System Interoperability (Security Ecosystem): <\/strong>Automated quarantine and scans of newly discovered assets, near-real-time remediation and TrustSec policy updates via security vendor integrations (e.g., McAfee, Cisco, Carbon Black, FireEye, etc.) and threat data sharing with NACs, SIEMs, TIP, ITSM and other security tools is also an essential component for modern threat defense.<\/li>\n<li><strong>Network Visibility and Intelligence (Integrated Reporting and Analytics): <\/strong>Best practices call for fast plug-and-play deployment and full visibility through pre-built, customizable dashboards and reports, search, predictive analytics and Splunk-powered visualizations to give you actionable control of endpoint, performance, security forensics, access logging, audit and network management.<\/li>\n<\/ol>\n<p>100% visibility should be the strategic imperative in everything you do at all times. If that sounds daunting, expensive and never-ending-\u201cpie-in-the-sky-ish,\u201d it just may be a lot more achievable than it seems.<\/p>\n<p>There are superior and affordable alternatives to IPAM-only solutions that lack full network discovery, extensive ecosystem integrations and basic reporting. We invite you look at our IPAM QuickStart and speak with one of our Network Architecture professionals. QuickStart enables you to affordably achieve authoritative IPAM control and automation based on your time, priorities and resources. QuickStart provides a \u201clight-lift, solid bang for your buck.\u201d Don\u2019t merely assume the Network Operations Department is moving in this direction. Sam, get a seat at Nancy\u2019s table and advocate for 100% visibility, always. That begins with how you manage your internal IP addresses. After all, you need full and reliable network data from all sources. Otherwise, you cannot secure what you cannot see.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Chris Richardson with Bob Rose In our blog,\u00a0Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints.\u00a0\u00a0We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network. Sam Security and Nancy [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":716,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[42,28,16,51,15,36],"class_list":{"0":"post-1501","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-cloud-automation","9":"tag-ddi","10":"tag-infoblox","11":"tag-ipam","12":"tag-security","13":"tag-threats","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Modern IP Address Management as a Security Asset Part 2<\/title>\n<meta name=\"description\" content=\"In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modern IP Address Management as a Security Asset Part 2\" \/>\n<meta property=\"og:description\" content=\"In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-30T23:15:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Modern IP Address Management as a Security Asset Part 2\",\"datePublished\":\"2019-01-30T23:15:18+00:00\",\"dateModified\":\"2020-05-06T17:27:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/\"},\"wordCount\":1125,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-banner-1.jpg\",\"keywords\":[\"Cloud Automation\",\"DDI\",\"Infoblox\",\"IPAM\",\"Security\",\"Threats\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/\",\"name\":\"Modern IP Address Management as a Security Asset Part 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-banner-1.jpg\",\"datePublished\":\"2019-01-30T23:15:18+00:00\",\"dateModified\":\"2020-05-06T17:27:01+00:00\",\"description\":\"In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-banner-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-banner-1.jpg\",\"width\":600,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Modern IP Address Management as a Security Asset Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Modern IP Address Management as a Security Asset Part 2","description":"In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Modern IP Address Management as a Security Asset Part 2","og_description":"In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/","og_site_name":"Infoblox Blog","article_published_time":"2019-01-30T23:15:18+00:00","article_modified_time":"2020-05-06T17:27:01+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-banner-1.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Modern IP Address Management as a Security Asset Part 2","datePublished":"2019-01-30T23:15:18+00:00","dateModified":"2020-05-06T17:27:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/"},"wordCount":1125,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-banner-1.jpg","keywords":["Cloud Automation","DDI","Infoblox","IPAM","Security","Threats"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/","url":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/","name":"Modern IP Address Management as a Security Asset Part 2","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-banner-1.jpg","datePublished":"2019-01-30T23:15:18+00:00","dateModified":"2020-05-06T17:27:01+00:00","description":"In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We\u2019d like to continue the thought by recalling the story of Sam Security and Nancy Network.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-banner-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-banner-1.jpg","width":600,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Modern IP Address Management as a Security Asset Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1501"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1501\/revisions"}],"predecessor-version":[{"id":3803,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1501\/revisions\/3803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/716"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}