{"id":2583,"date":"2016-08-26T06:00:26","date_gmt":"2016-08-26T06:00:26","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2583"},"modified":"2020-05-06T10:28:05","modified_gmt":"2020-05-06T17:28:05","slug":"actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/","title":{"rendered":"Actionable Security Intelligence &#8211; Generating Context, Breaking down Silos and Automating Response"},"content":{"rendered":"<p>There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.<\/p>\n<p>Today\u2019s security teams are inundated with too many alerts from these various security tools and systems they manage. They lack context on threats and have no way of assessing actual risk. They try to assemble data from disparate sources to take effective action. This puts a heavy burden on the security operations teams and leads to poor incidence response.<\/p>\n<p>Thankfully, there is a better way to respond to threats using intelligence that the network can provide. DNS, DHCP and IPAM \u2013 ubiquitous in any network \u2013 is a data gold mine which sees east-west and north-south traffic, which means it sees which applications are being accessed by which users, which devices are joining the network, and which interactions may be malicious. Using this valuable network and security intelligence, security teams can actually prioritize threats and answer questions like where is the compromised device located in the network, how often it is communicating with malicious destinations, what internal resources has the device been accessing, which user owns the offending IP address\/device, etc. In addition to prioritization, automatically quarantining the infected device, troubleshooting and remediation becomes easy when network and security tools talk to each other.<\/p>\n<p>It is specifically for this reason that Infoblox has developed integrations and open APIs to share indicators of compromise and threat intelligence data with major security technologies including NAC, next-gen endpoint security, SIEM and vulnerability scanners. Such insights and intelligence derived from DDI data can be used to ease security operations and help security teams to prioritize response to threats based on actual enterprise context and risk. Organizations can bolster their security posture without the need for additional boxes and by using what they already have \u2013 their DNS infrastructure.<\/p>\n<p>Get a quick overview of how to counter cyber threats using Actionable Network and Security Intelligence in this\u00a0<a href=\"http:\/\/info.infoblox.com\/resources-ebooks-cyberattack-battlefield?cid=70113000002JwnH&amp;cn=WW_Q1FY17_SM_EB_CyberattackBattlefield&amp;ls=Social%252Media&amp;lss=Q1ANIPSecurity&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[58,16,15],"class_list":{"0":"post-2583","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-defense","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response<\/title>\n<meta name=\"description\" content=\"There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response\" \/>\n<meta property=\"og:description\" content=\"There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-26T06:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Actionable Security Intelligence &#8211; Generating Context, Breaking down Silos and Automating Response\",\"datePublished\":\"2016-08-26T06:00:26+00:00\",\"dateModified\":\"2020-05-06T17:28:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/\"},\"wordCount\":375,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Infoblox-Security.jpg\",\"keywords\":[\"Defense\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/\",\"name\":\"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Infoblox-Security.jpg\",\"datePublished\":\"2016-08-26T06:00:26+00:00\",\"dateModified\":\"2020-05-06T17:28:05+00:00\",\"description\":\"There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Infoblox-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Infoblox-Security.jpg\",\"width\":660,\"height\":454,\"caption\":\"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Actionable Security Intelligence &#8211; Generating Context, Breaking down Silos and Automating Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response","description":"There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/","og_locale":"en_US","og_type":"article","og_title":"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response","og_description":"There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/","og_site_name":"Infoblox Blog","article_published_time":"2016-08-26T06:00:26+00:00","article_modified_time":"2020-05-06T17:28:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Security.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Actionable Security Intelligence &#8211; Generating Context, Breaking down Silos and Automating Response","datePublished":"2016-08-26T06:00:26+00:00","dateModified":"2020-05-06T17:28:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/"},"wordCount":375,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Security.jpg","keywords":["Defense","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/","url":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/","name":"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Security.jpg","datePublished":"2016-08-26T06:00:26+00:00","dateModified":"2020-05-06T17:28:05+00:00","description":"There is a big disconnect today when it comes to security. While organizations are investing heavily in several next-generation security tools and systems with the hope that they can quickly find problems and resolve them, what they are actually faced with is a myriad of siloed technologies that don\u2019t talk to each other and have no integrated view of threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Security.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Security.jpg","width":660,"height":454,"caption":"Actionable Security Intelligence - Generating Context, Breaking down Silos and Automating Response"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/actionable-security-intelligence-generating-context-breaking-down-silos-and-automating-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Actionable Security Intelligence &#8211; Generating Context, Breaking down Silos and Automating Response"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2583"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2583\/revisions"}],"predecessor-version":[{"id":2585,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2583\/revisions\/2585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2584"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}