{"id":2041,"date":"2017-06-08T16:49:07","date_gmt":"2017-06-08T16:49:07","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2041"},"modified":"2020-05-06T10:27:59","modified_gmt":"2020-05-06T17:27:59","slug":"how-to-contain-threats-faster-with-security-orchestration","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/","title":{"rendered":"How to Contain Threats Faster With Security Orchestration"},"content":{"rendered":"<p>Infoblox and Rapid 7\u00a0<span style=\"color: #ff6600;\"><u><a href=\"https:\/\/www.infoblox.com\/company\/news-events\/press-releases\/infoblox-rapid7-deliver-security-orchestration-bridge-silos\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">announced<\/a><\/u><\/span>\u00a0today new integrations that help alleviate operational hurdles when it comes to threat containment.<\/p>\n<p>SOC teams are faced with daily challenges when dealing with potential threats:<\/p>\n<p><strong>Silos between teams and tools<\/strong><\/p>\n<p>Network and security teams tend to be separate organizations, each with their own systems and priorities. The network team must ensure network availability whereas the security team is focused on risk mitigation. Both teams have independent logging systems that don\u2019t share information with one another. This makes security and incident response efforts unnecessarily burdensome, due to manual, inefficient, and untimely data sharing.<\/p>\n<p><strong>No knowledge of threat context<\/strong><\/p>\n<p>Context can be defined as the environmental information required to take the right action \u2013 the Who, What, Where, When. Today\u2019s security teams face a lack of context around incidents. If a malicious event is detected, just dumping that information into a SIEM without any context could make it hard to correlate events appropriately and take any timely action. SOC teams are faced with so may alerts and have no way to prioritize which ones to address first. They also lack visibility into network data.<\/p>\n<p><strong>Lack of automation<\/strong><\/p>\n<p>Security tools can\u2019t take action automatically based on network activities like when new hosts join the network or when DNS security tools detect malicious activities. It is a manual process to assemble data from multiple sources and take action.<\/p>\n<p>The Infoblox and Rapid 7 integration enables security operations teams to overcome these hurdles with better context, automation and consolidated threat intelligence. Infoblox technology together with Rapid 7\u2019s vulnerability management solution enables organizations to automate scanning when new devices\/hosts join the network or when malicious activity is detected, even if it is in-between scheduled scans. This reduces the chances of potential suspicious activity going undetected during scan gaps. The outbound notifications from Infoblox to Rapid 7 happen through RESTful APIs.<\/p>\n<p>Benefits include:<\/p>\n<ul>\n<li><strong>Context-Based Action:\u00a0<\/strong>Vulnerability scanners lack visibility into devices and end hosts including valuable business context like device type, device location in the network, associated user(s), and event timing. By sharing such actionable network intelligence, Infoblox provides Rapid 7 context around new and\/or infected network assets in near real time to help prioritize scanning and remediation. Infoblox provides visibility across a diverse infrastructure &#8211; on premise, private\/hybrid or public cloud environments, including visibility into virtual workloads.<\/li>\n<li><strong>Improved<\/strong>\u00a0<strong>efficacy of security investments already made:\u00a0<\/strong>Customers have already made big investments in security technologies like vulnerability management. Infoblox can optimize and improve the efficacy of solutions like Rapid 7.<\/li>\n<li><strong>Compliance Enforcement and Audit:\u00a0<\/strong>Infoblox provides up-to-date information about network devices, including non-compliant hosts for more efficient vulnerability management and compliance processes. It also provides valuable network information for audit reports.<\/li>\n<\/ul>\n<p>To learn more, read this\u00a0<span style=\"color: #ff6600;\"><u><a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-partner-solution-brief-enabling-security-orchestration-with-infoblox-and-rapid-7.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">solution note<\/a><\/u><\/span>.<\/p>\n<p>Find the full press release\u00a0<span style=\"color: #ff6600;\"><a href=\"https:\/\/www.infoblox.com\/company\/news-events\/press-releases\/infoblox-rapid7-deliver-security-orchestration-bridge-silos\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\"><u>here<\/u><\/a><\/span>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infoblox and Rapid 7\u00a0announced\u00a0today new integrations that help alleviate operational hurdles when it comes to threat containment. SOC teams are faced with daily challenges when dealing with potential threats: Silos between teams and tools Network and security teams tend to be separate organizations, each with their own systems and priorities. The network team must ensure [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15,75],"class_list":{"0":"post-2041","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"tag-security-infrastructure","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Contain Threats Faster With Security Orchestration<\/title>\n<meta name=\"description\" content=\"Infoblox and Rapid 7 announced today new integrations that help alleviate operational hurdles when it comes to threat containment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Contain Threats Faster With Security Orchestration\" \/>\n<meta property=\"og:description\" content=\"Infoblox and Rapid 7 announced today new integrations that help alleviate operational hurdles when it comes to threat containment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-08T16:49:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"How to Contain Threats Faster With Security Orchestration\",\"datePublished\":\"2017-06-08T16:49:07+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/\"},\"wordCount\":471,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Security Infrastructure\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/\",\"name\":\"How to Contain Threats Faster With Security Orchestration\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"datePublished\":\"2017-06-08T16:49:07+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"description\":\"Infoblox and Rapid 7 announced today new integrations that help alleviate operational hurdles when it comes to threat containment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/how-to-contain-threats-faster-with-security-orchestration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Contain Threats Faster With Security Orchestration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Contain Threats Faster With Security Orchestration","description":"Infoblox and Rapid 7 announced today new integrations that help alleviate operational hurdles when it comes to threat containment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/","og_locale":"en_US","og_type":"article","og_title":"How to Contain Threats Faster With Security Orchestration","og_description":"Infoblox and Rapid 7 announced today new integrations that help alleviate operational hurdles when it comes to threat containment.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/","og_site_name":"Infoblox Blog","article_published_time":"2017-06-08T16:49:07+00:00","article_modified_time":"2020-05-06T17:27:59+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"How to Contain Threats Faster With Security Orchestration","datePublished":"2017-06-08T16:49:07+00:00","dateModified":"2020-05-06T17:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/"},"wordCount":471,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","keywords":["Infoblox","Security","Security Infrastructure"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/","url":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/","name":"How to Contain Threats Faster With Security Orchestration","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","datePublished":"2017-06-08T16:49:07+00:00","dateModified":"2020-05-06T17:27:59+00:00","description":"Infoblox and Rapid 7 announced today new integrations that help alleviate operational hurdles when it comes to threat containment.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/how-to-contain-threats-faster-with-security-orchestration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"How to Contain Threats Faster With Security Orchestration"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2041"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2041\/revisions"}],"predecessor-version":[{"id":2042,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2041\/revisions\/2042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2037"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}