{"id":2561,"date":"2016-09-15T08:00:29","date_gmt":"2016-09-15T08:00:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2561"},"modified":"2020-05-06T10:28:04","modified_gmt":"2020-05-06T17:28:04","slug":"use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/","title":{"rendered":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices"},"content":{"rendered":"<p>You cannot secure what you cannot see!<\/p>\n<p>If you think organizations automatically know when new devices join the network and if they are compliant, think again. Devices, data and people are seeing an explosive growth in organizations. To add to this, an organization\u2019s IT network is becoming heterogeneous; spreading to multiple remote locations, satellite offices and hybrid clouds all over the globe.\u00a0 This explosion in devices, data and people over multiple locations, some of which are not fully managed by IT, pose a tremendous challenge in maintaining visibility and security for the network. IT managers have to know what devices are connected on their network, detect devices that pose a security threat and are rogue or infected, spend hours on investigating the context behind these devices and finally determine how to block these devices.<\/p>\n<p>Let us go through these challenges in more detail.<\/p>\n<p>The first challenge is in gathering inventory of the devices connected to the network. There may be unauthorized\/rogue devices on the internal network with access to sensitive corporate data and resources. In the case of one particular retail company, there were 6000 IP addresses on the network when there should only have been 4000! If even a few of the remaining 2000 IP addresses belonged to malicious devices, the company pays a heavy price for not detecting their presence.<\/p>\n<p>The second challenge is in identifying devices that might be infected with malware or may be part of botnets and might be either consuming resources or worse ex-filtrating sensitive data. Detecting the presence of malicious activity can be a challenge and there are a number of agent-based and agentless solutions to tackle this problem.<\/p>\n<p>The third challenge is to understand how the rogue device or an infected device is connected to the wired or wireless network for remediation actions like severing its network connectivity.\u00a0 This involves locating the network, VLAN and eventually the specific switchport that the device is connected to. The security team typically initiates this process with trouble tickets or emails sent to the network infrastructure or security operations team. Typically, it takes several minutes to hours to go through spreadsheets to determine where a device is located and the network, VLAN, VRF or wireless access point it is connected to. If the device is a VM, it will be necessary to discover the server, virtual switch and cloud management platform that it is part of.<\/p>\n<p>Finally, security teams might want more network context to perform thorough security forensics, address vulnerabilities, understand compliance violations and improve security best practices. Information such as the device\u2019s MAC address, the time when it appeared on the network, its DHCP lease history, DNS hostname, different locations it has been at, its firmware and software versions etc. are critical for such investigations. It can be time\/resource intensive and sometimes even impossible to access all this information by scraping data from several sources.<\/p>\n<p><span class=\"lia-message-image-wrapper lia-message-image-actions-narrow lia-message-image-actions-below\"><img decoding=\"async\" class=\"lia-media-image\" tabindex=\"0\" title=\"security-blog1.png\" src=\"https:\/\/cixhp49439.i.lithium.com\/t5\/image\/serverpage\/image-id\/781iA56173710B6FDD71\/image-size\/original?v=v2&amp;px=-1\" alt=\"security-blog1.png\" border=\"0\" \/><i class=\"lia-fa lia-fa-search-plus lia-media-lightbox-trigger\" tabindex=\"0\" aria-label=\"Enlarge image\"><\/i><\/span><\/p>\n<p><a href=\"http:\/\/www.infoblox.com\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox<\/a>\u00a0solves this problem using actionable network intelligence and with a comprehensive network discovery solution. The discovery process finds all IP devices on the organization\u2019s wired and wireless network along with their associated context such as location, connected switchport or wireless access points. These devices can be printers, PCs, phones, video cameras etc., on the enterprise campus network or virtual machines, servers, switches and routers in the data centers or virtual instances on the public cloud like AWS.\u00a0 Detailed information about devices can be pulled in with DHCP fingerprinting. All this device data is visible on a single console. The devices can be tagged with extensible attributes or metadata to easily classify, sort and search these devices according to their attributes. For example, you can pull a report of all the iphones that are running version IOS version 8.0.<\/p>\n<p><span class=\"lia-message-image-wrapper lia-message-image-actions-narrow lia-message-image-actions-below\"><img decoding=\"async\" class=\"lia-media-image\" tabindex=\"0\" title=\"infoblox-security2.png\" src=\"https:\/\/cixhp49439.i.lithium.com\/t5\/image\/serverpage\/image-id\/782i9D24A1EC12B1CAD1\/image-size\/original?v=v2&amp;px=-1\" alt=\"infoblox-security2.png\" border=\"0\" \/><i class=\"lia-fa lia-fa-search-plus lia-media-lightbox-trigger\" tabindex=\"0\" aria-label=\"Enlarge image\"><\/i><\/span><\/p>\n<p>All the discovered devices\/IP addresses in the system are reconciled with the IP address database to flag unmanaged devices or rogue devices in the system. When malware or botnets are discovered by Infoblox security solutions such as DNS Firewall and Threat Insight, the sophisticated Infoblox IPAM can automatically zero in on the source\/location of the IP address and its device context for security forensics and share this contextual information with existing security systems for faster remediation. This saves precious downtime and greatly improves the efficiency of the remediation process.<\/p>\n<p>You cannot secure what you cannot see! When it comes to complex networks with large numbers of devices that is definitely true. Luckily, you can use intelligent IPAM to discover, analyze and secure your network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You cannot secure what you cannot see! If you think organizations automatically know when new devices join the network and if they are compliant, think again. Devices, data and people are seeing an explosive growth in organizations. To add to this, an organization\u2019s IT network is becoming heterogeneous; spreading to multiple remote locations, satellite offices [&hellip;]<\/p>\n","protected":false},"author":272,"featured_media":2562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,32,15,36],"class_list":{"0":"post-2561","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-malware","10":"tag-security","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices<\/title>\n<meta name=\"description\" content=\"You cannot secure what you cannot see!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\" \/>\n<meta property=\"og:description\" content=\"You cannot secure what you cannot see!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-15T08:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Srinivas Hanabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srinivas Hanabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/\"},\"author\":{\"name\":\"Srinivas Hanabe\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/504d9919812ec63b0ab0f1bdc4ed5afa\"},\"headline\":\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\",\"datePublished\":\"2016-09-15T08:00:29+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"keywords\":[\"Infoblox\",\"Malware\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/\",\"name\":\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"datePublished\":\"2016-09-15T08:00:29+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"description\":\"You cannot secure what you cannot see!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/504d9919812ec63b0ab0f1bdc4ed5afa\",\"name\":\"Srinivas Hanabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7b2bcbf550890f5e45f928f8e267c28ed36ed3cfd010a872d5fb56fd6155b117?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7b2bcbf550890f5e45f928f8e267c28ed36ed3cfd010a872d5fb56fd6155b117?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7b2bcbf550890f5e45f928f8e267c28ed36ed3cfd010a872d5fb56fd6155b117?s=96&d=blank&r=g\",\"caption\":\"Srinivas Hanabe\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/srinivas-hanabe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices","description":"You cannot secure what you cannot see!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/","og_locale":"en_US","og_type":"article","og_title":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices","og_description":"You cannot secure what you cannot see!","og_url":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/","og_site_name":"Infoblox Blog","article_published_time":"2016-09-15T08:00:29+00:00","article_modified_time":"2020-05-06T17:28:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","type":"image\/jpeg"}],"author":"Srinivas Hanabe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Srinivas Hanabe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/"},"author":{"name":"Srinivas Hanabe","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/504d9919812ec63b0ab0f1bdc4ed5afa"},"headline":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices","datePublished":"2016-09-15T08:00:29+00:00","dateModified":"2020-05-06T17:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/"},"wordCount":760,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","keywords":["Infoblox","Malware","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/","url":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/","name":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","datePublished":"2016-09-15T08:00:29+00:00","dateModified":"2020-05-06T17:28:04+00:00","description":"You cannot secure what you cannot see!","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","width":660,"height":454,"caption":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/use-intelligent-ipam-to-better-secure-your-network-from-rogue-and-infected-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/504d9919812ec63b0ab0f1bdc4ed5afa","name":"Srinivas Hanabe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7b2bcbf550890f5e45f928f8e267c28ed36ed3cfd010a872d5fb56fd6155b117?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7b2bcbf550890f5e45f928f8e267c28ed36ed3cfd010a872d5fb56fd6155b117?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7b2bcbf550890f5e45f928f8e267c28ed36ed3cfd010a872d5fb56fd6155b117?s=96&d=blank&r=g","caption":"Srinivas Hanabe"},"url":"https:\/\/www.infoblox.com\/blog\/author\/srinivas-hanabe\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2561"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2561\/revisions"}],"predecessor-version":[{"id":2563,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2561\/revisions\/2563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2562"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}