{"id":2384,"date":"2015-10-07T21:44:45","date_gmt":"2015-10-07T21:44:45","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2384"},"modified":"2020-05-06T10:30:09","modified_gmt":"2020-05-06T17:30:09","slug":"extending-infoblox-dns-threat-intelligence-for-endpoint-remediation","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/","title":{"rendered":"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2182\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Exploit-Kits-Lock.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me&#8211; that\u2019s how Infoblox plays into a security ecosystem. Traditionally Infoblox is thought of as a DNS, DHCP and IP Address Management or DDI vendor or even for Network Automation, but increasingly DNS is the chosen attack vector or leading indicator of compromise.<\/p>\n<p>When we started the project to create an Ecosystem our goal was not to put logos on a page but to be able to tell some interesting stories that helped real people solve real world problems. Our integration with Carbon Black is an important cornerstone in this process. We have approached each partnership with the idea that everything we add to our Ecosystem should enhance the customers\u2019 ability to respond to threats, understand threats, or prevent them in some one-plus-one equals three sort of manner.<\/p>\n<p>One of our goals was to become to security, what we are to network; an automation company (security automation), to save humans time. Time is the most critical factor in incident response- \u00a0be that after or before compromise.<\/p>\n<p>To aid the goal, Infoblox, the industry leader in DDI services, teamed up with Carbon Black, which offers a leading next generation endpoint solution, to extend our network visibility and intelligence to the endpoint. The idea was to allow an incident response vision that connected rich data to the Incident Response (IR) operator.<\/p>\n<p>Ben Johnson, Bit9+Carbon Black Chief Security Strategist, said,<\/p>\n<p class=\"p1\">\u201cIntegration and Automation are must-haves in today\u2019s cyber defense. With security events and alerts exploding in volume and adversaries moving with greater speed and precision, integrations like Infoblox with Carbon Black can help security teams be more agile &#8212; to detect, respond, and recover faster from intrusions and compromise.\u201d<\/p>\n<p>Looking at the ecosystem from the perspective of security automation, gives us the challenge of giving humans more time. The idea is to help move away from a model that puts pressure on people to respond, to a model where systems work together intelligently to either automate processes completely or provide humans with rich data and rapid decision process.<\/p>\n<p>With that in mind let\u2019s take a look at how the integration works.<\/p>\n<p>Step 1: Infoblox identifies a DNS lookup to a malicious domain.<\/p>\n<p>This Reputational information can be populated by Infoblox\u2019s own threat intelligence feed, by a connector to another Ecosystem partner (like FireEye), or a user populated Response Policy Zone (RPZ).<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2391\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/carbonblack.jpg\" alt=\"\" width=\"468\" height=\"240\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/carbonblack.jpg 468w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/carbonblack-300x154.jpg 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<p>Step 2: Infoblox conveys that alert to the Carbon Black server.<\/p>\n<p>Step 3: Carbon Black correlates the network information sent from Infoblox with its own intelligence gathered from the endpoint and allows (via Live Response) action to be taken on the endpoint.<\/p>\n<p>This integration helps close the loop between network threat detection and endpoint enforcement.\u00a0To read more about this, check out this\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/sites\/infobloxcom\/files\/resources\/infoblox-partner-brief-extending-infoblox-intelligence-for-endpoint-remediation.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">solution brief.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me&#8211; that\u2019s how Infoblox plays into a security ecosystem. Traditionally Infoblox is thought of as a DNS, DHCP and IP Address Management or DDI vendor or even for Network Automation, but increasingly DNS is the chosen attack vector [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":2182,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[15],"class_list":{"0":"post-2384","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Extending Infoblox DNS Threat Intelligence for Endpoint Remediation<\/title>\n<meta name=\"description\" content=\"Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me-- that\u2019s how Infoblox plays into a security ecosystem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation\" \/>\n<meta property=\"og:description\" content=\"Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me-- that\u2019s how Infoblox plays into a security ecosystem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-07T21:44:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation\",\"datePublished\":\"2015-10-07T21:44:45+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/\"},\"wordCount\":482,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Exploit-Kits-Lock.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/\",\"name\":\"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Exploit-Kits-Lock.jpg\",\"datePublished\":\"2015-10-07T21:44:45+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"description\":\"Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me-- that\u2019s how Infoblox plays into a security ecosystem.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Exploit-Kits-Lock.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Exploit-Kits-Lock.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation","description":"Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me-- that\u2019s how Infoblox plays into a security ecosystem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/","og_locale":"en_US","og_type":"article","og_title":"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation","og_description":"Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me-- that\u2019s how Infoblox plays into a security ecosystem.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-07T21:44:45+00:00","article_modified_time":"2020-05-06T17:30:09+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg","type":"image\/jpeg"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation","datePublished":"2015-10-07T21:44:45+00:00","dateModified":"2020-05-06T17:30:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/"},"wordCount":482,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg","keywords":["Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/","url":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/","name":"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg","datePublished":"2015-10-07T21:44:45+00:00","dateModified":"2020-05-06T17:30:09+00:00","description":"Today I am delighted to have a chance to speak about a topic that\u2019s really interesting to me-- that\u2019s how Infoblox plays into a security ecosystem.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Exploit-Kits-Lock.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/extending-infoblox-dns-threat-intelligence-for-endpoint-remediation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Extending Infoblox DNS Threat Intelligence for Endpoint Remediation"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2384"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2384\/revisions"}],"predecessor-version":[{"id":2392,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2384\/revisions\/2392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2182"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}