{"id":2567,"date":"2016-09-12T08:00:33","date_gmt":"2016-09-12T08:00:33","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2567"},"modified":"2020-05-06T10:28:04","modified_gmt":"2020-05-06T17:28:04","slug":"better-protection-and-compliance-for-cloud-data","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/","title":{"rendered":"Better Protection and Compliance for Cloud Data"},"content":{"rendered":"<p>To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.<\/p>\n<p>That\u2019s kind of like the cloud today. You\u2019re putting your data there, but for the sake of convenience \u2013 indeed, in order to do business \u2013 you give lots of people access to it: your hosting provider, your employees, your partners, your customers.<\/p>\n<p>For enterprises that have turned to firewalls for perimeter security, the cloud is a whole new landscape. Instead of locking the doors and windows, as it were, enterprises have to think more about two things: first, protecting the most critical data (the kind of stuff you put in a safe in your house), and second, complying with regulations about protecting that data (especially customer and personally identifiable data).<\/p>\n<p>Here at Infoblox, we\u2019ve been thinking a lot about protecting data in the enterprise and in the cloud. We\u2019re especially focusing on analytics and machine learning to protect against DNS tunneling for data exfiltration (the process of surreptitiously stealing it) and proactively preventing inadvertent access to malicious sites. Instead of figuring out how to lock more doors, which only slows down data access, we\u2019re helping customers move toward protecting the applications and the data themselves. We\u2019re working on our DNS tunneling techniques and advanced DNS protection to be even better at detecting exfiltration.<\/p>\n<p>Simply put, we\u2019re improving machine-learning technologies, such as detection algorithms, to provide more visibility and actionable network intelligence. We want to help customers not only identify when unauthorized IP addresses are trying to access data, but to also see patterns of activity that point to such behavior. (We also want to make sure enterprises can see when data has been left unprotected unintentionally, as it sometimes is.)<\/p>\n<p>From a compliance standpoint, we\u2019re helping CIOs and CISOs develop consistent policies that ensure they can apply the same policies for internal firewalls as they do for firewalls that protect the cloud.<\/p>\n<p>To learn more about Infoblox\u2019s data exfiltration solutions, click\u00a0<a href=\"https:\/\/www.infoblox.com\/solutions\/data-exfiltration-prevention\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case. That\u2019s kind of like the cloud today. You\u2019re putting your data there, but for [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":2568,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,72,16,15,121],"class_list":{"0":"post-2567","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-exfiltration","10":"tag-infoblox","11":"tag-security","12":"tag-tunneling","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Better Protection and Compliance for Cloud Data<\/title>\n<meta name=\"description\" content=\"To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Better Protection and Compliance for Cloud Data\" \/>\n<meta property=\"og:description\" content=\"To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-12T08:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/126418927-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Atul Garg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Atul Garg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/\"},\"author\":{\"name\":\"Atul Garg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3efb25b4e831d309159eeeb037e7fc1\"},\"headline\":\"Better Protection and Compliance for Cloud Data\",\"datePublished\":\"2016-09-12T08:00:33+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/\"},\"wordCount\":365,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/126418927-660x454.jpg\",\"keywords\":[\"DNS\",\"Exfiltration\",\"Infoblox\",\"Security\",\"Tunneling\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/\",\"name\":\"Better Protection and Compliance for Cloud Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/126418927-660x454.jpg\",\"datePublished\":\"2016-09-12T08:00:33+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"description\":\"To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/126418927-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/126418927-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Better Protection and Compliance for Cloud Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/better-protection-and-compliance-for-cloud-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Better Protection and Compliance for Cloud Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3efb25b4e831d309159eeeb037e7fc1\",\"name\":\"Atul Garg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/642136493751840edcd96bb398fdee9774943d0ccc19b202380f41304bed496b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/642136493751840edcd96bb398fdee9774943d0ccc19b202380f41304bed496b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/642136493751840edcd96bb398fdee9774943d0ccc19b202380f41304bed496b?s=96&d=blank&r=g\",\"caption\":\"Atul Garg\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/atul-garg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Better Protection and Compliance for Cloud Data","description":"To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/","og_locale":"en_US","og_type":"article","og_title":"Better Protection and Compliance for Cloud Data","og_description":"To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/","og_site_name":"Infoblox Blog","article_published_time":"2016-09-12T08:00:33+00:00","article_modified_time":"2020-05-06T17:28:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/126418927-660x454.jpg","type":"image\/jpeg"}],"author":"Atul Garg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Atul Garg","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/"},"author":{"name":"Atul Garg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/f3efb25b4e831d309159eeeb037e7fc1"},"headline":"Better Protection and Compliance for Cloud Data","datePublished":"2016-09-12T08:00:33+00:00","dateModified":"2020-05-06T17:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/"},"wordCount":365,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/126418927-660x454.jpg","keywords":["DNS","Exfiltration","Infoblox","Security","Tunneling"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/","url":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/","name":"Better Protection and Compliance for Cloud Data","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/126418927-660x454.jpg","datePublished":"2016-09-12T08:00:33+00:00","dateModified":"2020-05-06T17:28:04+00:00","description":"To protect the possessions in your house, you lock the doors and windows. But everyone wants convenience and a contingency plan, so they give a key to the neighbors \u2026 and the cleaners \u2026 and your family \u2026 just in case.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/126418927-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/126418927-660x454.jpg","width":660,"height":454,"caption":"Better Protection and Compliance for Cloud Data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/better-protection-and-compliance-for-cloud-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Better Protection and Compliance for Cloud Data"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/f3efb25b4e831d309159eeeb037e7fc1","name":"Atul Garg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/642136493751840edcd96bb398fdee9774943d0ccc19b202380f41304bed496b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/642136493751840edcd96bb398fdee9774943d0ccc19b202380f41304bed496b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/642136493751840edcd96bb398fdee9774943d0ccc19b202380f41304bed496b?s=96&d=blank&r=g","caption":"Atul Garg"},"url":"https:\/\/www.infoblox.com\/blog\/author\/atul-garg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2567"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2567\/revisions"}],"predecessor-version":[{"id":2569,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2567\/revisions\/2569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2568"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}