{"id":1607,"date":"2018-09-28T17:06:11","date_gmt":"2018-09-28T17:06:11","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1607"},"modified":"2020-12-05T17:33:28","modified_gmt":"2020-12-06T01:33:28","slug":"next-level-networking-is-an-effective-part-your-government","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/","title":{"rendered":"Next Level Networking is an Effective Part Your Government Security Program"},"content":{"rendered":"<h2 id=\"toc-hId--1333218985\">Making External Threat Data Actionable<\/h2>\n<p>By Chris Richardson,\u00a0<span class=\"s1\">Sr. Security Solutions Advisor<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Infoblox Federal &amp; CI Sectors<\/span><\/p>\n<p>Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems. Back then, I assumed this defined need would spark the growth of a boutique industry around technical data integration where trained specialists would come on site to map and tailor the various streams of data in various formats.\u00a0 They would then execute and fine-tune the use case to the security component, while vendors would work to make their offerings more malleable. Perhaps an academic field would spring up to create a large talent pool in response to this demand. To a certain extent this happened with Cybersecurity Engineering Ops curricula being developed at some universities and with the advent of the Threat Intelligence Platform business. More generally, the information security industry has responded by geometrically growing the venture capital investment in recent years\u2013 some 1,400 security vendors now all have \u201cthe answer\u201d you need to invest in, and there are more in development or being launched every month. Yet what do we see and hear out there today?<\/p>\n<ul>\n<li>My SIEM \u201cfunnel\u201d is too broad and my team is not getting to all the important alerts.<\/li>\n<li>My SIEM \u201cfunnel\u201d is too narrow and my team is missing some of the avenues being abused by threat actors.<\/li>\n<li>Even with highly trained analysts and incident response professionals, we lack visibility into what assets are populating our network of concern.<\/li>\n<li>Even with some integrations into the SIEM, we are still not responding to incidents quickly enough.<\/li>\n<li>Poor data quality and lack of interoperability requires us to clean things up and devote time to \u201cbabysitting\u201d process workarounds.<\/li>\n<li>I am at a point where I am ignoring potentially important meetings just to do my job.<\/li>\n<\/ul>\n<h2 id=\"toc-hId--445715304\">Next-Level DNS as a First Responder<\/h2>\n<p>All the above complaints (or variants thereof) focus on one thing:\u00a0<strong>You need more time in getting to the what, where, and how<\/strong>. You need to get greater returns out of what you currently have deployed. You need to break the logjam of \u201conly our data works only on our technologies.\u201d Even organizations that have hired dozens of analysts and incident responders encounter these issues and those that have deep benches also face the capacity, overhead management, and cost justification problems that come with teams that sprawl. In all cases, positioning a professional at a console as the very front line of defense leads to a hard ceiling on achieving the effectiveness you desire.<\/p>\n<p>What if we look at the network control plane itself and see what happens when there is a threat event? In most cases, a connected device first makes a communication attempt out to other devices and other networks. The protocol it uses for this is DNS. So, whether you utilize it as such, your DNS resolver is a first responder on malicious communication attempts. It sits on the frontline as a threat tries to reach across or out from a device that you are responsible for securing. Is it worthy of activating as a frontline defender? It would be need to perform on some key criteria:<\/p>\n<ul>\n<li>Performance Scale \u2013 Not only should it be on 24&#215;7, it should adjust to the changing scope and demands of your network.<\/li>\n<li>Data Scale \u2013 With threat data stores and newly observed hostname stores growing every month, such a solution should be able to \u201cread and react\u201d at the scale of tens of millions of records, continuously. And you need to be able to quickly and centrally augment this defensive component with additional data sets and apply them in a distributed fashion.<\/li>\n<li>Quality Scale \u2013 Amplifying junk only causes more headaches. You need a constant effort in place to ensure quality control and seek continuous improvement of the data itself. And even if you take the intelligent step of routing port 53 traffic to resolvers you authorize, can you trust the entity that is now providing directions \u201cout there\u201d for your sensitive systems? Ensuring that level of integrity is no longer optional.<\/li>\n<\/ul>\n<p>As a leader in providing core network services, Infoblox has innovated enterprise-grade DNS for almost 20 years, and Infoblox ActiveTrust provides a first line of defense on all of these fronts for over 1,000 customers every day. In addition, Infoblox continues to drive toward certification and compliance on a host of standards and regulatory requirements. This effort illustrates our long-term commitment to being there for our customers in the public sector. We are a DNS Security leader. By maximizing your DNS Resolver as a smart gatekeeper for port 53 traffic now and in the future, you not only address how threat actors use your infrastructure but also how they mutate it via tunneling and surreptitious communications that traditional defenses simply don\u2019t detect.<\/p>\n<h2 id=\"toc-hId-441788377\">Your Network Control Plane as a Data Service<\/h2>\n<p>Let\u2019s face it. DNS used to be a very dark art in the security world. It was something owned and operated in another building by another department. It can be a very arcane protocol with plenty of gotchas and idiosyncrasies. As long as DNS was up and answering queries, it was generally not something to be messed with due to concern over prolonged network disruptions. But what if it was easy? What if it was easy to engage, easy to collaborate with peers about, and easy to get valuable data out of? What if you could manage it the way you might manage the rules in your local email client, for an entire network? That\u2019s exactly what Paul Vixie envisioned when he created response policy zones several years ago. In the accompanying announcement, he envisioned a vibrant marketplace of RPZ data suppliers and consumers. As an industry we are on our way toward achieving that vision \u2013 this is all far less exotic than it used to be. However, we must think big in terms of what data we can get from the DNS Resolver beyond merely applying blacklists:<\/p>\n<ul>\n<li>Can we easily set custom RPZs for network segments and even individual high-risk users? Yes.<\/li>\n<li>Can we access large-set DNS query logs as simply another source of intelligence to Regex, keyword, and Rest API Integrations? Yes.<\/li>\n<li>Can we instantly see if a device if generating a large spike in NXDOMAIN responses, indicating highly suspect activity? Yes.<\/li>\n<li>Can it learn from large sets of traffic patterns and determine what is malicious on a behavioral level? Yes.<\/li>\n<li>Can I cross-check queries from the last hour against those from the last 30 days, to see what\u2019s new and potentially suspicious to me? Yes.<\/li>\n<li>Can I immediately see if a new device on a restricted network is trying very hard to reach the outside? Yes.<\/li>\n<li>Can I transmit the event data I specify from the network control plane out to my host of security solutions? Yes.<\/li>\n<li>Can I automatically have my ticket system handle the issue in the rare event that a user needs to get to a new hostname that I have deemed blockable? Yes.<\/li>\n<\/ul>\n<h2 id=\"toc-hId-1329292058\">Conclusion<\/h2>\n<p>Unleashing the creativity of your team to maximize DNS as a security asset is the power of next level networking. I have been involved in threat response for over 15 years and I have had the privilege of working alongside and learning from some of the masters in our field. I don\u2019t claim to be a DNS expert. And I would not call myself a Threat Intelligence expert (yet!). But I can see clearly the immense potential value that bringing DNS front and center has for both Incident Response and efficient discovery of trouble on any modern network. At the end of the day, you have a user on a device reaching out to a threat. DNS, DHCP, and IP address management are the authoritative cadre you already have deployed that can see all three, and mitigate with confidence and without disruption. As our whitepaper,\u00a0<a title=\"Why You Need Next Level Networking, Security and an Informed Ecosystem\" href=\"https:\/\/www.infoblox.com\/resources\/whitepapers\/next-level-networking-security-and-an-informed-ecosystem?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Why You Need Next Level Networking, Security and an Informed Ecosystem<\/a>, points out, the sooner you see it, the faster you can manage it. Tens of billions of dollars have been invested in next-generation security technologies at the edge and at the end point without proper attention to the core of the network. Isn\u2019t it time we focus on taking core network services to the next level?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Making External Threat Data Actionable By Chris Richardson,\u00a0Sr. Security Solutions Advisor Infoblox Federal &amp; CI Sectors Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems. Back then, I assumed this [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":1149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[76,15,89,40,367,368],"class_list":{"0":"post-1607","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-digital-transformation","9":"tag-security","10":"tag-threat-context","11":"tag-threat-intelligence","12":"tag-government","13":"tag-federal","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Next Level Networking is an Effective Part Your Government Security Program<\/title>\n<meta name=\"description\" content=\"Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Next Level Networking is an Effective Part Your Government Security Program\" \/>\n<meta property=\"og:description\" content=\"Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-28T17:06:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T01:33:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Next Level Networking is an Effective Part Your Government Security Program\",\"datePublished\":\"2018-09-28T17:06:11+00:00\",\"dateModified\":\"2020-12-06T01:33:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/\"},\"wordCount\":1408,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"keywords\":[\"Digital Transformation\",\"Security\",\"threat context\",\"Threat Intelligence\",\"Government\",\"Federal\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/\",\"name\":\"Next Level Networking is an Effective Part Your Government Security Program\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"datePublished\":\"2018-09-28T17:06:11+00:00\",\"dateModified\":\"2020-12-06T01:33:28+00:00\",\"description\":\"Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/next-level-networking-is-an-effective-part-your-government\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Next Level Networking is an Effective Part Your Government Security Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Next Level Networking is an Effective Part Your Government Security Program","description":"Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/","og_locale":"en_US","og_type":"article","og_title":"Next Level Networking is an Effective Part Your Government Security Program","og_description":"Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/","og_site_name":"Infoblox Blog","article_published_time":"2018-09-28T17:06:11+00:00","article_modified_time":"2020-12-06T01:33:28+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Next Level Networking is an Effective Part Your Government Security Program","datePublished":"2018-09-28T17:06:11+00:00","dateModified":"2020-12-06T01:33:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/"},"wordCount":1408,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","keywords":["Digital Transformation","Security","threat context","Threat Intelligence","Government","Federal"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/","url":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/","name":"Next Level Networking is an Effective Part Your Government Security Program","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","datePublished":"2018-09-28T17:06:11+00:00","dateModified":"2020-12-06T01:33:28+00:00","description":"Several years ago, people started complaining to me about how difficult it was to apply external threat data (later called threat intelligence) at the right place at the right time within their security systems.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","width":660,"height":454,"caption":"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/next-level-networking-is-an-effective-part-your-government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Next Level Networking is an Effective Part Your Government Security Program"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1607"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1607\/revisions"}],"predecessor-version":[{"id":1608,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1607\/revisions\/1608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1149"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}