{"id":1787,"date":"2017-01-05T20:58:38","date_gmt":"2017-01-05T20:58:38","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1787"},"modified":"2020-05-06T10:28:01","modified_gmt":"2020-05-06T17:28:01","slug":"introducing-the-infoblox-threat-intelligence-to-enhance-your","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/","title":{"rendered":"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure"},"content":{"rendered":"<p>You probably already protect your network at the DNS level. But it can be time and resource intensive because as your network has grown, you\u2019ve inherited a patchwork of siloed security solutions. Many times, the threat intelligence data you\u2019ve purchased with a security system can\u2019t be used elsewhere or you can\u2019t customize how you want to deploy threat intel across your infrastructure.<\/p>\n<p>Even more frustrating are the multiple views of intelligence data from your multiple systems. Instead of being able to use more data to provide context and a clearer insight into potential threats, you have to spend time going between security solutions to manually interpret what\u2019s going on. This can result in slow response times and gaps in your threat coverage.<\/p>\n<p>Obviously this is not an efficient or confidence-inspiring way to protect against cyberthreats. There is a need for a cost-effective solution to simplify and consolidate management of threat intel data, which is why we\u2019re launching the Infoblox Threat Intelligence Data Exchange (TIDE) which integrates into the DDI environment (DNS, DHCP and IP address management). This is critical as we\u2019re all seeing an increase in malicious activity at the DNS level \u2013 in fact, our\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-white-paper-dns-threat-index-q1-2016-report.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Threat Index<\/a>\u00a0hit an all-time high in the first quarter of 2016.<\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0provides three levels of service that focus on solving key pain points to make your job easier and your security more effective. With\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>, you can:<\/p>\n<ol>\n<li><strong>Get the data you need:<\/strong>\u00a0Easily create threat intelligence data feeds to combine Infoblox\u2019s high-quality data with data in which you\u2019ve already invested.<\/li>\n<li><strong>Easily deploy data:<\/strong>\u00a0Obtain, manage and distribute threat data to a broad range of infrastructure from a centralized point.<\/li>\n<li><strong>Prevent malicious activity:\u00a0<\/strong>Deploy threat intelligence directly within Infoblox DNS Firewall and other security technologies.<\/li>\n<\/ol>\n<h2 id=\"toc-hId-649939997\">1. Get the data you need<\/h2>\n<p><a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0is a one-stop-shop when it comes to threat intel data. We distill data from many sources, processes and services. Also, our 24\/7 Threat Operations team works to verify threat indicators and curate machine-readable threat intelligence (MRTI) to output an enhanced, accurate, up-to-date intelligence data feed (based on Infoblox\u2019s own data and also vetting of third-party\/market feed data, including hostnames, URLs, IP addresses).<\/p>\n<p>We also work with several premium data providers, including SURBL, CrowdStrike, Cyren, Emerging Threats, iSight Partners, OpenPhish,ThreatTrack Security and ThreatWave to create an in-solution third-party threat indicator feed data marketplace. SURBL is a top provider of high-quality, actionable intelligence specifically designed and used for variety of blocking solutions like Infoblox DNS Firewall. In addition to data from these providers,\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0enables you to easily integrate with almost any vendor\u2019s data for use.<\/p>\n<h2 id=\"toc-hId-678569148\">2. Easily deploy threat intelligence data<\/h2>\n<p><a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0is system-agnostic and designed to simplify threat intel deployment, distributing data across a diverse range of security platforms (e.g., DNS Firewall, perimeter firewall, Web proxy, IPS, SIEM).\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0makes creating custom API feeds built for specific attacks quick and easy, regardless of how many feeds you need to blend (e.g., hostnames, IPs, URLs) or the types of data you need to adjust for (e.g., JSON, STIX, CSV, TSV, CEF).<\/p>\n<p>In addition,\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0allows you to manage and share internally sourced threat intelligence, upload and manage internally discovered threat intelligence, and put data governance policies in place to easily control and distribute intelligence to other internal stakeholders, business partners and other external parties.<\/p>\n<h2 id=\"toc-hId-707198299\">3. Prevent malicious activity and data breaches<\/h2>\n<p>Because\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0enables you to deploy trusted threat intelligence directly within Infoblox DNS Firewall and other security technologies, you can detect security breaches before they occur and limit damage from infected devices. Also,\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0deployment of threat intel data across the infrastructure serves to help strengthen all of your systems\u2019 defenses.<\/p>\n<p>For more information about how\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox TIDE<\/a>\u00a0can streamline your threat intelligence and help you get more value from existing security infrastructure and threat intelligence data investments, read the\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-infoblox-threat-intelligence-data-exchange-for-activetrust-1.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Solution Note<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/contact?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact us<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You probably already protect your network at the DNS level. But it can be time and resource intensive because as your network has grown, you\u2019ve inherited a patchwork of siloed security solutions. Many times, the threat intelligence data you\u2019ve purchased with a security system can\u2019t be used elsewhere or you can\u2019t customize how you want [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":566,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[28,50,30,44,109,16,51,32,52,110,75,111,112],"class_list":{"0":"post-1787","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddi","9":"tag-dhcp","10":"tag-dns","11":"tag-dns-firewall","12":"tag-dnsfwaas","13":"tag-infoblox","14":"tag-ipam","15":"tag-malware","16":"tag-nios","17":"tag-reporting","18":"tag-security-infrastructure","19":"tag-threat-index","20":"tag-vnios","21":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure<\/title>\n<meta name=\"description\" content=\"You probably already protect your network at the DNS level.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure\" \/>\n<meta property=\"og:description\" content=\"You probably already protect your network at the DNS level.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-05T20:58:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prakash Nagpal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prakash Nagpal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/\"},\"author\":{\"name\":\"Prakash Nagpal\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\"},\"headline\":\"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure\",\"datePublished\":\"2017-01-05T20:58:38+00:00\",\"dateModified\":\"2020-05-06T17:28:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/\"},\"wordCount\":673,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"keywords\":[\"DDI\",\"DHCP\",\"DNS\",\"DNS Firewall\",\"DNSFWaaS\",\"Infoblox\",\"IPAM\",\"Malware\",\"NIOS\",\"Reporting\",\"Security Infrastructure\",\"Threat Index\",\"vNIOS\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/\",\"name\":\"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"datePublished\":\"2017-01-05T20:58:38+00:00\",\"dateModified\":\"2020-05-06T17:28:01+00:00\",\"description\":\"You probably already protect your network at the DNS level.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-threat-intelligence-to-enhance-your\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\",\"name\":\"Prakash Nagpal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"caption\":\"Prakash Nagpal\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/prakash-nagpal\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure","description":"You probably already protect your network at the DNS level.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/","og_locale":"en_US","og_type":"article","og_title":"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure","og_description":"You probably already protect your network at the DNS level.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/","og_site_name":"Infoblox Blog","article_published_time":"2017-01-05T20:58:38+00:00","article_modified_time":"2020-05-06T17:28:01+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","type":"image\/jpeg"}],"author":"Prakash Nagpal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prakash Nagpal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/"},"author":{"name":"Prakash Nagpal","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804"},"headline":"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure","datePublished":"2017-01-05T20:58:38+00:00","dateModified":"2020-05-06T17:28:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/"},"wordCount":673,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","keywords":["DDI","DHCP","DNS","DNS Firewall","DNSFWaaS","Infoblox","IPAM","Malware","NIOS","Reporting","Security Infrastructure","Threat Index","vNIOS"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/","url":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/","name":"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","datePublished":"2017-01-05T20:58:38+00:00","dateModified":"2020-05-06T17:28:01+00:00","description":"You probably already protect your network at the DNS level.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-threat-intelligence-to-enhance-your\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Introducing the Infoblox Threat Intelligence to Enhance your Security Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804","name":"Prakash Nagpal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","caption":"Prakash Nagpal"},"url":"https:\/\/www.infoblox.com\/blog\/author\/prakash-nagpal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1787"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1787\/revisions"}],"predecessor-version":[{"id":1788,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1787\/revisions\/1788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/566"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}