{"id":2099,"date":"2015-12-07T17:56:59","date_gmt":"2015-12-07T17:56:59","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2099"},"modified":"2020-05-06T10:30:06","modified_gmt":"2020-05-06T17:30:06","slug":"joining-hands-to-automatically-protect-endpoints-from-malware-everywhere","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/","title":{"rendered":"Joining Hands to Automatically Protect Endpoints from Malware Everywhere"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2100\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/puzzle.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network. That means protecting the endpoints along with other network devices.<\/p>\n<p>Bit9 and Carbon Black merged last year to improve the way enterprises do endpoint security, and Infoblox has collaborated with them to integrate their next-generation endpoint security with our DNS security.<\/p>\n<p>To learn what we\u2019re doing and how to stay ahead of advanced threats, join Chris Berninger of Bit9+Carbon Black and myself for this 30-minute live webinar,\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1095092\/56571B308CE784E9FD73E1D9380321D1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Nowhere to Hide: Protect Devices Both On and Off Your Network<\/a>, on Tuesday, December 15, at 10:30 a.m. Pacific\/1:30 p.m. Eastern.<\/p>\n<p>In addition to learning how to protect devices no matter where they are, you\u2019ll discover how to:<\/p>\n<ul>\n<li>Identify and prevent DNS-based endpoint communications to malicious domains<\/li>\n<li>Automatically respond to endpoint threats, reducing dwell time.<\/li>\n<\/ul>\n<p>If you want the more widespread protection of your network, register\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1095092\/56571B308CE784E9FD73E1D9380321D1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network. That means protecting the endpoints along with other network devices. Bit9 and Carbon Black merged last year to improve the way enterprises do endpoint security, and Infoblox has collaborated [&hellip;]<\/p>\n","protected":false},"author":282,"featured_media":2100,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,32,15],"class_list":{"0":"post-2099","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-malware","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Joining Hands to Automatically Protect Endpoints from Malware Everywhere<\/title>\n<meta name=\"description\" content=\"You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Joining Hands to Automatically Protect Endpoints from Malware Everywhere\" \/>\n<meta property=\"og:description\" content=\"You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-07T17:56:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Utpal Desai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Utpal Desai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/\"},\"author\":{\"name\":\"Utpal Desai\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/a0ee682a280ee7d7a1cd04f6e6f101d4\"},\"headline\":\"Joining Hands to Automatically Protect Endpoints from Malware Everywhere\",\"datePublished\":\"2015-12-07T17:56:59+00:00\",\"dateModified\":\"2020-05-06T17:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/\"},\"wordCount\":172,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/puzzle.jpg\",\"keywords\":[\"DNS\",\"Malware\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/\",\"name\":\"Joining Hands to Automatically Protect Endpoints from Malware Everywhere\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/puzzle.jpg\",\"datePublished\":\"2015-12-07T17:56:59+00:00\",\"dateModified\":\"2020-05-06T17:30:06+00:00\",\"description\":\"You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/puzzle.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/puzzle.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Joining Hands to Automatically Protect Endpoints from Malware Everywhere\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/a0ee682a280ee7d7a1cd04f6e6f101d4\",\"name\":\"Utpal Desai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0444afefe2ab2c9a7b3c7ce05b16986b748e2bcfbf73d65d01b1dbdedcdac9d3?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0444afefe2ab2c9a7b3c7ce05b16986b748e2bcfbf73d65d01b1dbdedcdac9d3?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0444afefe2ab2c9a7b3c7ce05b16986b748e2bcfbf73d65d01b1dbdedcdac9d3?s=96&d=blank&r=g\",\"caption\":\"Utpal Desai\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/utpal-desai\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Joining Hands to Automatically Protect Endpoints from Malware Everywhere","description":"You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/","og_locale":"en_US","og_type":"article","og_title":"Joining Hands to Automatically Protect Endpoints from Malware Everywhere","og_description":"You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/","og_site_name":"Infoblox Blog","article_published_time":"2015-12-07T17:56:59+00:00","article_modified_time":"2020-05-06T17:30:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg","type":"image\/jpeg"}],"author":"Utpal Desai","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Utpal Desai","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/"},"author":{"name":"Utpal Desai","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/a0ee682a280ee7d7a1cd04f6e6f101d4"},"headline":"Joining Hands to Automatically Protect Endpoints from Malware Everywhere","datePublished":"2015-12-07T17:56:59+00:00","dateModified":"2020-05-06T17:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/"},"wordCount":172,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg","keywords":["DNS","Malware","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/","url":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/","name":"Joining Hands to Automatically Protect Endpoints from Malware Everywhere","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg","datePublished":"2015-12-07T17:56:59+00:00","dateModified":"2020-05-06T17:30:06+00:00","description":"You never know where or when an attack is going to come, but you want to recognize a threat as soon as it touches your network.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/puzzle.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/joining-hands-to-automatically-protect-endpoints-from-malware-everywhere\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Joining Hands to Automatically Protect Endpoints from Malware Everywhere"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/a0ee682a280ee7d7a1cd04f6e6f101d4","name":"Utpal Desai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0444afefe2ab2c9a7b3c7ce05b16986b748e2bcfbf73d65d01b1dbdedcdac9d3?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0444afefe2ab2c9a7b3c7ce05b16986b748e2bcfbf73d65d01b1dbdedcdac9d3?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0444afefe2ab2c9a7b3c7ce05b16986b748e2bcfbf73d65d01b1dbdedcdac9d3?s=96&d=blank&r=g","caption":"Utpal Desai"},"url":"https:\/\/www.infoblox.com\/blog\/author\/utpal-desai\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/282"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2099"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2099\/revisions"}],"predecessor-version":[{"id":2101,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2099\/revisions\/2101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2100"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}