{"id":2001,"date":"2015-12-14T16:20:22","date_gmt":"2015-12-14T16:20:22","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2001"},"modified":"2020-05-06T10:30:06","modified_gmt":"2020-05-06T17:30:06","slug":"breaking-down-silos-in-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/","title":{"rendered":"Breaking Down Silos in Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2008\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/break-down-silos.png\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos-300x206.png 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p><strong>It&#8217;s all About Community <\/strong><\/p>\n<p>It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making. Mobile apps like Yelp, Waze and TrueCar enable the end user to leverage the experience of a community when deciding which restaurant to eat at, the most optimal route to a desired destination, and how much people recently paid for a car, respectively.<\/p>\n<p>Gone are the days when you would ask for an opinion of a friend, sibling or some acquaintance. While nothing is fundamentally wrong with that approach, it cannot compete with the scale of a \u201c3<sup>rd<\/sup>\u00a0party\u201d community (and hence, possibly less biased view) of users who share their experiences of a product or service. The benefit, of data-driven technology is that, as aptly stated by TrueCar, it \u201cputs power and knowledge in the hands of consumers.\u201d<\/p>\n<p><strong>Drowning in an Ocean of Data from Isolated Sources <\/strong><\/p>\n<p>Few, if any of us, would shun being given power and knowledge to make a more informed decision about things we consider purchasing (e.g. movie ticket or meal) or actions we are undertaking (e.g. driving somewhere). On a similar note, when\u00a0you consider the decisions various teams (IT security, Incident Response (IR) and Security Operations Center (SOC)) have to follow based on disparate\u00a0data, it is quite overwhelming.<\/p>\n<p>From monitoring network vulnerabilities using one or multiple systems, to cleaning up infected systems with a different set of tools, to sifting through seemingly endless logs of data from one or more sources, and eventually\u00a0trying to prioritize alerts and act on the most critical ones\u2014it seems like they could never possibly stay on top of their game. This is evidenced by the fact that even the most presumably \u201csecure\u201d organizations such as top financial and banks have been publicly shamed for having suffered a data breach at least once.<\/p>\n<p><strong>Getting back Control with Data that is Relevant and Timely <\/strong><\/p>\n<p>Part of the challenge faced by organizations is that they are constantly using and maintaining multiple security products simultaneously for defense-in-depth and security best practices. Wouldn\u2019t it be optimal if the security products they have on the network could seamlessly and automatically share data with each other and also glean contextual data\u00a0<em>from<\/em>\u00a0the network to be better informed and to take action more easily and quickly? In the absence of interoperability and real-time data sharing between security and network products, decisions are being based on isolated data points, and sometimes stale data, and too often, it is too late \u2013 sensitive data has already been exposed or stolen by the time an organization even discovers that. Unfortunately, an organization even with its best intentions has vulnerabilities that can ultimately get exposed by an attacker who is persistent.<\/p>\n<p>What can help is having the right data, complete with historical record of events, at the right time, from multiple sources (security and network) which when aggregated, can help aid with or possibly automate threat response. In fact, Cisco Systems has already put in place an infrastructure, which they call Cisco Platform Exchange Grid or pxGrid, an information grid that security and other IT platforms can integrate with to share relevant contextual information with any other platform connected to it. At the one year anniversary of pxGrid in late 2015, Cisco\u00a0<a href=\"http:\/\/blogs.cisco.com\/security\/cisco-pxgrid-new-ecosystem-partners\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">introduced<\/a>\u00a0nine new ecosystem partners, including\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/partners\/technology-partners\/cisco-ise?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox<\/a>.<\/p>\n<p><strong>Infoblox Helps Security and Network teams be more Efficient and Effective <\/strong><\/p>\n<p>As a\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/gartner-report-market-guide-dns-dhcp-and-ip-address-management-ddi?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">market leader<\/a>\u00a0in network control services, specifically DNS, DHCP and IP address management (DDI) solutions, Infoblox provides rich contextual data to\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/partners\/technology-partners?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">multiple<\/a>\u00a0security, incident response, and compliance solutions such as Cisco Identity Services Engine (ISE) Network Access Control (NAC), Bit9+Carbon Black endpoint security and Rapid7 Nexpose vulnerability scanner. Since Infoblox DDI is serving as a core component of the network infrastructure, it is immensely beneficial to be sharing the data gleaned from our unique vantage point in the network with IT security and network teams so they can be more informed and less dependent on each other&#8211; saving time and being more productive.<\/p>\n<p>By sharing information, in real-time, such as the discovery of new devices on the network, DHCP lease information and IP address changes, and compromised devices talking to malicious domain destinations, such as those associated with data exfiltration, Infoblox helps extend the intelligence of solutions you\u2019re already using. IT teams can be in better control of the network, devices and users. Also, Infoblox DNS security solutions offer policy enforcement using DNS. Our Internal DNS Security and DNS Firewall solutions automate threat response by integrating with threat intelligence solutions such as FireEye.<\/p>\n<p>For example, Infoblox obtains information from FireEye NX Series on malicious connections and executes an administrator defined action using DNS Response Policy Zones (RPZ) on the device making the malicious DNS query. Our solutions can redirect an infected device to a safe location (e.g. walled garden site) or even block the connection to a bad domain.<\/p>\n<p>In January 2016, check out Part 2 of this blog series to learn more about how Infoblox can help reduce siloes in your security ecosystem, closing the gap between and helping IT security and network teams be more efficient and effective in their day-to-day operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s all About Community It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making. Mobile apps like Yelp, Waze and TrueCar enable the end user to leverage the experience of a community when deciding which restaurant to eat [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":2008,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[28,30,15],"class_list":{"0":"post-2001","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-ddi","9":"tag-dns","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Breaking Down Silos in Security<\/title>\n<meta name=\"description\" content=\"It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breaking Down Silos in Security\" \/>\n<meta property=\"og:description\" content=\"It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-14T16:20:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Seema Kathuria\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Seema Kathuria\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/\"},\"author\":{\"name\":\"Seema Kathuria\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\"},\"headline\":\"Breaking Down Silos in Security\",\"datePublished\":\"2015-12-14T16:20:22+00:00\",\"dateModified\":\"2020-05-06T17:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/break-down-silos.png\",\"keywords\":[\"DDI\",\"DNS\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/\",\"name\":\"Breaking Down Silos in Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/break-down-silos.png\",\"datePublished\":\"2015-12-14T16:20:22+00:00\",\"dateModified\":\"2020-05-06T17:30:06+00:00\",\"description\":\"It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/break-down-silos.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/break-down-silos.png\",\"width\":660,\"height\":454,\"caption\":\"Back to Basics \u2013 The IPv6 Address Types \u2013 part 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/breaking-down-silos-in-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Breaking Down Silos in Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\",\"name\":\"Seema Kathuria\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"caption\":\"Seema Kathuria\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/seema-kathuria\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Breaking Down Silos in Security","description":"It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/","og_locale":"en_US","og_type":"article","og_title":"Breaking Down Silos in Security","og_description":"It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/","og_site_name":"Infoblox Blog","article_published_time":"2015-12-14T16:20:22+00:00","article_modified_time":"2020-05-06T17:30:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png","type":"image\/png"}],"author":"Seema Kathuria","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Seema Kathuria","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/"},"author":{"name":"Seema Kathuria","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a"},"headline":"Breaking Down Silos in Security","datePublished":"2015-12-14T16:20:22+00:00","dateModified":"2020-05-06T17:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/"},"wordCount":879,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png","keywords":["DDI","DNS","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/","url":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/","name":"Breaking Down Silos in Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png","datePublished":"2015-12-14T16:20:22+00:00","dateModified":"2020-05-06T17:30:06+00:00","description":"It is becoming nearly second nature for savvy mobile users to depend on applications (apps) that leverage data aggregated from multiple users to aid in decision making.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/break-down-silos.png","width":660,"height":454,"caption":"Back to Basics \u2013 The IPv6 Address Types \u2013 part 2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/breaking-down-silos-in-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Breaking Down Silos in Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a","name":"Seema Kathuria","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","caption":"Seema Kathuria"},"url":"https:\/\/www.infoblox.com\/blog\/author\/seema-kathuria\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2001"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2001\/revisions"}],"predecessor-version":[{"id":2009,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2001\/revisions\/2009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2008"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}