{"id":1534,"date":"2019-01-25T17:36:08","date_gmt":"2019-01-25T17:36:08","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1534"},"modified":"2020-05-06T10:27:01","modified_gmt":"2020-05-06T17:27:01","slug":"modern-ip-address-management-as-a-security-asset-part-1","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/","title":{"rendered":"Modern IP Address Management as a Security Asset Part 1"},"content":{"rendered":"<p>By Chris Richardson with Bob Rose<\/p>\n<p><strong>IT&#8217;S TIME TO TRIANGULATE<\/strong><\/p>\n<p>Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to\u00a0<a href=\"\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices<\/a>. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.<\/p>\n<p>To further lay out the value of IPAM in security, consider the following. We commonly hear jargon around \u201ctime to detect\u201d and \u201ctime to remediate\u201d as tangible security measures. Such yardsticks also play well in presenting upstairs to the brass. We\u2019ve talked to many Security Leaders who get three slides in the master deck and 15 minutes per quarterly summit to make their case \u2013 whatever that may be. But how about another measure? \u2014 time to triangulate.<\/p>\n<p>Time to triangulate can be defined as the timespan between when you are made aware of a threat in your purview and when you understand details about where and when the threat potentially infiltrated your network. More specifically, this involves knowing what device may have accessed the network (beyond basic conventions), which port may have been used and the potential physical location of the apparent attack. You also naturally want the history and context around that user, device and threat situation. Getting to that state can be thought of as triangulation of the signal. In other words, it is when disparate sources of internal and external data are telling you something important or urgent, yet asynchronously.<\/p>\n<p>&nbsp;<\/p>\n<p>Of course, we want to minimize this time to triangulate while mitigating cost. The concept of digging through logs has largely been replaced by modern Security Information and Event Management (SIEM), which has subsequently led to other manifestations of \u201ca grand correlation funnel.\u201d But if that SIEM doesn\u2019t have the user\/device data you need, and you have no easy way to drill down within the archives, then you are left to open an IT ticket to determine \u201cwhere was Joe\u2019s laptop on the network 3 weeks ago?\u201d so you must move on to the next event, at the mercy of what your organization\u2019s rules and policies dictate. You wait for further data to triangulate, as opposed to knowing instantly the internet protocol (IP) assignments of everything in your business continuously and accurately \u2013 all the while knowing that such reliable data telemetry is the hallmark of a modern IPAM\u00a0solution.<\/p>\n<p><strong>START INCIDENT RESPONSE WITH THE DATA YOU NEED<\/strong><\/p>\n<p><strong>Waiting for additional data\u00a0<\/strong>in order to properly react to a latent threat represents real risk. You know that the threat is in the network somewhere. You may even know what the threat category is, but without pinpointing patient zero (<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.splunk.com_en-5Fus_solutions_solution-2Dareas_security-2Dand-2Dfraud_use-2Dcases_using-2Ddns-2Ddata-2Dto-2Didentify-2Dpatient-2Dzero-2Dmalware.html&amp;d=DwMGaQ&amp;c=CWsWqoUynJrLESJQduOsxQ&amp;r=ieEgcSXfS-MK47jjP8563kImCtZU3iX0FwP6Fc5QbAE&amp;m=3bayQgbgMPGH55SMqMli9piP4jiMITS9HXK3HhjMvZ8&amp;s=I90lEl_AaDQ2CEeTJ5-QAr5WPXm4dkWSpQybcpVM9do&amp;e=\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a great Splunk use case<\/a>), you aren\u2019t sure where you need to focus your resources. This is disconcerting both from a data retention policy standpoint but also because you know that days ago, a device in your purview reached-out to something that was only today tagged as a new threat. The real challenge becomes: Do you have an answer when C-Level executives ask, \u201cAre we in good shape? How do we avoid becoming like &lt;<em>Breached Company Name redacted to protect those who lacked visibility that day<\/em>&gt;? Are we \u201con top of it?<\/p>\n<p><strong>AIM FOR 100% VISIBILITY<\/strong><\/p>\n<p><strong>One strong answer\u00a0<\/strong>is to drive toward 100% visibility for the devices and databases that are or have been on your network as a bedrock operating principle and achievable milestone to reach by your next quarterly summit. Such a principle has the strength to \u201ctravel across your meetings\u201d on agenda topics you may be very familiar with, such as:<\/p>\n<ul>\n<li>Planning for Vulnerability Scanning \u2013 Next Steps<\/li>\n<li>DLP Update \u2013 Check-in with the Team<\/li>\n<li>Aligning Security for Merger with XYZ, Inc.<\/li>\n<li>IPv6 Status Check<\/li>\n<li>IR Workflow Review \u2013 All SOC Management\/All Hands SOC-West\/SOC NAM<\/li>\n<\/ul>\n<p>In short, how your organization does IPAM impacts an array of things in your daily security role. Without 100% visibility into what is connected, you risk deteriorating the value of every other security product, process, workaround, individual and decision made in your environment. As mentioned in the prior post, rather than \u00a0accidentally \u201cfinding out\u201d that there are more IP addresses on the network than originally thought, or alternatively, seeing vulnerability scanning implementations that completely miss one-third of the network map they are intended to cover, the solution is simple: The time to get out ahead of that situation is right now by thoughtfully approaching modern IP Address Management. So, what are the key takeaways?<\/p>\n<ul>\n<li>Triangulate data from internal and external sources for context and quick response.<\/li>\n<li>Start incident response with the reliable data you need.<\/li>\n<li>Drive toward 100% visibility for all network endpoints because you cannot secure what you cannot see.<\/li>\n<\/ul>\n<p>Watch next week for Part 2 of Modern IPAM as a Security Asset.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Chris Richardson with Bob Rose IT&#8217;S TIME TO TRIANGULATE Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to\u00a0Use Intelligent IPAM to Better [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":1377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[42,14,51,101,15,36],"class_list":{"0":"post-1534","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-cloud-automation","9":"tag-events","10":"tag-ipam","11":"tag-network-insight","12":"tag-security","13":"tag-threats","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Modern IP Address Management as a Security Asset Part 1<\/title>\n<meta name=\"description\" content=\"Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modern IP Address Management as a Security Asset Part 1\" \/>\n<meta property=\"og:description\" content=\"Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-25T17:36:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470779813-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Modern IP Address Management as a Security Asset Part 1\",\"datePublished\":\"2019-01-25T17:36:08+00:00\",\"dateModified\":\"2020-05-06T17:27:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/\"},\"wordCount\":842,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470779813-660x454.jpg\",\"keywords\":[\"Cloud Automation\",\"Events\",\"IPAM\",\"Network Insight\",\"Security\",\"Threats\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/\",\"name\":\"Modern IP Address Management as a Security Asset Part 1\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470779813-660x454.jpg\",\"datePublished\":\"2019-01-25T17:36:08+00:00\",\"dateModified\":\"2020-05-06T17:27:01+00:00\",\"description\":\"Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470779813-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470779813-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"5 Python Scripts to get you started in NetMRI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/modern-ip-address-management-as-a-security-asset-part-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Modern IP Address Management as a Security Asset Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Modern IP Address Management as a Security Asset Part 1","description":"Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Modern IP Address Management as a Security Asset Part 1","og_description":"Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/","og_site_name":"Infoblox Blog","article_published_time":"2019-01-25T17:36:08+00:00","article_modified_time":"2020-05-06T17:27:01+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470779813-660x454.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Modern IP Address Management as a Security Asset Part 1","datePublished":"2019-01-25T17:36:08+00:00","dateModified":"2020-05-06T17:27:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/"},"wordCount":842,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470779813-660x454.jpg","keywords":["Cloud Automation","Events","IPAM","Network Insight","Security","Threats"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/","url":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/","name":"Modern IP Address Management as a Security Asset Part 1","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470779813-660x454.jpg","datePublished":"2019-01-25T17:36:08+00:00","dateModified":"2020-05-06T17:27:01+00:00","description":"Recently, the following question came up: \u201cHow do IPAM and core network services relate to my functional role in security?\u201d To answer this question and tie these concepts together, a timeless \u201cback-pocket,\u201d easy-read security blog by Srinivas Hanabe discusses how to Use Intelligent IPAM to Better Secure Your Network from Rogue and Infected Devices. For every incident investigator and incident responder, this post is worth spending a few minutes reviewing from a strategic planning and tactical best practice perspective.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470779813-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470779813-660x454.jpg","width":660,"height":454,"caption":"5 Python Scripts to get you started in NetMRI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/modern-ip-address-management-as-a-security-asset-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Modern IP Address Management as a Security Asset Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1534"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1534\/revisions"}],"predecessor-version":[{"id":3805,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1534\/revisions\/3805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1377"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}