{"id":2647,"date":"2016-06-27T08:00:58","date_gmt":"2016-06-27T08:00:58","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2647"},"modified":"2020-05-06T10:28:06","modified_gmt":"2020-05-06T17:28:06","slug":"five-recommendations-for-improving-network-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/","title":{"rendered":"Five Recommendations for Improving Network Security"},"content":{"rendered":"<div class=\"lia-message-body lia-component-body\">\n<div class=\"lia-message-body-content\">\n<p>In May, we posted\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Company-Blog\/Infoblox-Survey-Shows-Networking-Best-Practices-Result-in\/ba-p\/6454\" target=\"_blank\" rel=\"noopener noreferrer\">the results<\/a>\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.<\/p>\n<p><strong>Recommendation #1: Get rid of departmental silos.<\/strong>\u00a0Among survey respondents, there was a high correlation between those who reported best results with those who enjoyed a high level of cooperation between network, security, and application teams. You may need to retain data silos to ensure privacy and security, but colleagues should be made aware of those limitations. Technology can be a great facilitator to enforce essential policy and remove artificial boundaries or silos that limit data sharing across groups.<\/p>\n<p><strong>Recommendation #2: Pay attention to operational realities.<\/strong>\u00a0In network security and network operations (and probably most areas of the enterprise), technology alone will not alleviate certain realities about doing business. Technology must be part of a strategy to optimize processes and help people make intelligent, intuitive decisions based on information (not data) and enriched with the right context.<\/p>\n<p><strong>Recommendation #3: Prioritize based on risk analysis.<\/strong>\u00a0Actions should balance risk and reward. That requires laying the foundation for intuitive decisions with information and context derived not from all data, but from data required to provide a perspective on risk and impact on the business. Human beings should not have to correlate data themselves or use guess work to determine impact. To prioritize properly, they must have as much aggregated context as possible (that\u2019s why getting rid of silos is so important).<\/p>\n<p><strong>Recommendation #4: Be realistic about security staffing.<\/strong>\u00a0Finding staffers who are experienced in three key areas \u2013 networks, security, and applications \u2013 is no picnic. Sometimes finding an expert in just one area is difficult. If you do find them, they\u2019re likely to be expensive and in demand. That\u2019s why it\u2019s important to look for technology that reduces the need for adding staff with cross-departmental expertise and can augment existing staff with insight that would have required additional manual work or resources.<\/p>\n<p><strong>Recommendation #5: Automate routine tasks.<\/strong>\u00a0Automation has value beyond avoiding mundane tasks and freeing people to make better decisions. It helps reduce delays and errors, as well as identifying incorrect or inefficient processes, while avoiding ad hoc workarounds. As survey respondents reported, automation institutionalizes tribal knowledge and allows staff to react more consistently when faced with certain situations.<\/p>\n<p>Perhaps our key recommendation from the network survey is to remember that every solution encompasses people, process, and technology. Overreliance on any one is hardly ever the right answer or approach.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":2648,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[69,16,31,15,67],"class_list":{"0":"post-2647","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-best-practices","9":"tag-infoblox","10":"tag-networking","11":"tag-security","12":"tag-tips-tricks","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Five Recommendations for Improving Network Security<\/title>\n<meta name=\"description\" content=\"In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Recommendations for Improving Network Security\" \/>\n<meta property=\"og:description\" content=\"In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-27T08:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prakash Nagpal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prakash Nagpal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/\"},\"author\":{\"name\":\"Prakash Nagpal\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\"},\"headline\":\"Five Recommendations for Improving Network Security\",\"datePublished\":\"2016-06-27T08:00:58+00:00\",\"dateModified\":\"2020-05-06T17:28:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/\"},\"wordCount\":461,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"keywords\":[\"Best practices\",\"Infoblox\",\"Networking\",\"Security\",\"Tips &amp; Tricks\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/\",\"name\":\"Five Recommendations for Improving Network Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"datePublished\":\"2016-06-27T08:00:58+00:00\",\"dateModified\":\"2020-05-06T17:28:06+00:00\",\"description\":\"In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"Five Recommendations for Improving Network Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/five-recommendations-for-improving-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Five Recommendations for Improving Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\",\"name\":\"Prakash Nagpal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"caption\":\"Prakash Nagpal\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/prakash-nagpal\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Five Recommendations for Improving Network Security","description":"In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Five Recommendations for Improving Network Security","og_description":"In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/","og_site_name":"Infoblox Blog","article_published_time":"2016-06-27T08:00:58+00:00","article_modified_time":"2020-05-06T17:28:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","type":"image\/jpeg"}],"author":"Prakash Nagpal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prakash Nagpal","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/"},"author":{"name":"Prakash Nagpal","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804"},"headline":"Five Recommendations for Improving Network Security","datePublished":"2016-06-27T08:00:58+00:00","dateModified":"2020-05-06T17:28:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/"},"wordCount":461,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","keywords":["Best practices","Infoblox","Networking","Security","Tips &amp; Tricks"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/","url":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/","name":"Five Recommendations for Improving Network Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","datePublished":"2016-06-27T08:00:58+00:00","dateModified":"2020-05-06T17:28:06+00:00","description":"In May, we posted\u00a0the results\u00a0of our network protection survey, which looked \u2013 among other things \u2013 at best practices in companies that were highly successful at network security. In this post, I wanted to drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organization can benefit by prioritizing these actions first.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","width":660,"height":454,"caption":"Five Recommendations for Improving Network Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/five-recommendations-for-improving-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Five Recommendations for Improving Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804","name":"Prakash Nagpal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","caption":"Prakash Nagpal"},"url":"https:\/\/www.infoblox.com\/blog\/author\/prakash-nagpal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2647"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2647\/revisions"}],"predecessor-version":[{"id":2649,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2647\/revisions\/2649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2648"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}