{"id":2736,"date":"2016-01-08T15:15:49","date_gmt":"2016-01-08T15:15:49","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2736"},"modified":"2020-05-06T10:30:06","modified_gmt":"2020-05-06T17:30:06","slug":"bridge-the-gap-between-security-solutions-with-infoblox","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/","title":{"rendered":"Bridge the Gap between Security Solutions with Infoblox"},"content":{"rendered":"<p>In the\u00a0<a href=\"\/company\/breaking-down-silos-in-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>first<\/u><\/a>\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world. It is no longer satisfying nor desirable to base one\u2019s decision on isolated experiences and data points. Hence, similarly, it is not scalable not practical to solely depend on and focus on security and network context data from disparate and non-interoperable products and technologies.<\/p>\n<p>Infoblox helps become the \u201chub\u201d for information sharing between essential network control service based solutions, namely DNS, DHCP and IP address management (DDI), and various types of security products you may already be using. It uses a two-fold approach to effectively tackle threats.<\/p>\n<p><strong>Using Threat Intelligence to Take Action<\/strong><\/p>\n<p>The\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/secure-dns\/dns-firewall?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Infoblox DNS Firewall<\/u><\/a>\u00a0effectively disrupts advanced persistent threats (APTs) and malware at the DNS layer using threat intelligence from a variety of sources.<\/p>\n<ul>\n<li>Cloud-based reputational threat intelligence feed &#8211; a \u201cblack list\u201d of domains and IP addresses known to be associated with suspicious or malicious servers (e.g. ransomware, financial\/banking malware, Trojans) or botnets.<\/li>\n<li><a href=\"\/community\/introducing-dns-threat-analytics-for-data-exfiltration-prevention\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>Infoblox DNS Threat Analytics<\/u><\/a>\u00a0&#8211; unique software technology that does streaming analytics on DNS queries\/requests to detect data exfiltration; uses behavior modeling and machine learning to detect more sophisticated methods, which don\u2019t have well known signatures (zero-day); after classifying a DNS request as data exfiltration, the destination associated with the data exfiltration is added to a special response policy zone (RPZ) \u201cblack list\u201d that is used by DNS Firewall for taking action.<\/li>\n<li>Local or Enterprise intelligence: You may have identified adversaries, either through your existing advanced security tools like FireEye or through your own malware research team. Infoblox\u2019s flexible and easy to use third-party system interfaces can take this information and create security policies automatically.<\/li>\n<\/ul>\n<p>Using any one or multiple of these sources of information as part of its built-in DNS response policy zone (RPZ), the Infoblox DNS Firewall automatically takes an action on any DNS request made by an infected endpoint. It may block or redirect it to a walled garden site to prevent the spread of malware and data exfiltration.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2737\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-eco-system.jpeg\" alt=\"Infoblox Eco-system\" width=\"938\" height=\"405\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-eco-system.jpeg 938w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-eco-system-300x130.jpeg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-eco-system-768x332.jpeg 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/p>\n<p><strong>Sharing Threat Intelligence to enhance security, simplify incident response, and reduce operational overhead<\/strong><\/p>\n<p>Infoblox helps shorten the kill chain by both reporting on and automatically sharing valuable network and security threat intelligence with leading security solutions that subsequently take action.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.infoblox.com\/products\/network-services-dns-dhcp-ipam\/ddi?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Infoblox DDI<\/u><\/a>, including our\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/secure-dns?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Secure DNS<\/u><\/a>\u00a0portfolio, products share data with\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/network-services-dns-dhcp-ipam\/reporting?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Infoblox Reporting<\/u><\/a>, a dedicated platform which offers at-a-glance dashboard views of top attacks, malicious connections, infected endpoints, and a host of additional data, plus highly customizable reports that can help ease security policy and network management efforts.<\/li>\n<li>Once an advanced endpoint security solution such as\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/sites\/infobloxcom\/files\/resources\/infoblox-partner-brief-extending-infoblox-intelligence-for-endpoint-remediation.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Carbon Black<\/u><\/a>\u00a0learns from Infoblox DNS Firewall about an endpoint making a malicious DNS request, Carbon Black automatically bans the malicious processes from future execution and connection, thereby effectively quarantining the infected endpoint and preventing data from being exfiltrated, even if a device is outside the enterprise.<\/li>\n<li>A network access control solution such as\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/partners\/technology-partners\/cisco-ise?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Cisco Identity Services Engine (ISE)<\/u><\/a>\u00a0can update policy for any endpoints it discovers making DNS request to bad domain(s) previously identified by Infoblox. Infoblox also provides contextual data such as endpoint DHCP lease history, MAC address, IP address, operating system, user and device type. This data can be very valuable for security managers to use for detecting trends such as devices with similar attributes or policy having been impacted by the same attack\/indicator of compromise, and for evaluating and adjusting security policies across systems network-wide.<\/li>\n<\/ul>\n<p>In the third of this 3-part blog series,\u00a0I will share the ways that our DDI solutions seamlessly exchange data with various security technologies and products to make it easy for customers to get more value from their investments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world. It is no longer satisfying nor desirable to base one\u2019s decision on isolated experiences and data points. Hence, [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":2614,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-2736","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Bridge the Gap between Security Solutions with Infoblox<\/title>\n<meta name=\"description\" content=\"In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bridge the Gap between Security Solutions with Infoblox\" \/>\n<meta property=\"og:description\" content=\"In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-08T15:15:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"446\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Seema Kathuria\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Seema Kathuria\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/\"},\"author\":{\"name\":\"Seema Kathuria\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\"},\"headline\":\"Bridge the Gap between Security Solutions with Infoblox\",\"datePublished\":\"2016-01-08T15:15:49+00:00\",\"dateModified\":\"2020-05-06T17:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/\"},\"wordCount\":648,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/\",\"name\":\"Bridge the Gap between Security Solutions with Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg\",\"datePublished\":\"2016-01-08T15:15:49+00:00\",\"dateModified\":\"2020-05-06T17:30:06+00:00\",\"description\":\"In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg\",\"width\":600,\"height\":446,\"caption\":\"From IPv4-Only to Dual-stack to IPv6-Only: What Tech Will You Need?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/bridge-the-gap-between-security-solutions-with-infoblox\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bridge the Gap between Security Solutions with Infoblox\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\",\"name\":\"Seema Kathuria\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"caption\":\"Seema Kathuria\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/seema-kathuria\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bridge the Gap between Security Solutions with Infoblox","description":"In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/","og_locale":"en_US","og_type":"article","og_title":"Bridge the Gap between Security Solutions with Infoblox","og_description":"In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/","og_site_name":"Infoblox Blog","article_published_time":"2016-01-08T15:15:49+00:00","article_modified_time":"2020-05-06T17:30:06+00:00","og_image":[{"width":600,"height":446,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg","type":"image\/jpeg"}],"author":"Seema Kathuria","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Seema Kathuria","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/"},"author":{"name":"Seema Kathuria","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a"},"headline":"Bridge the Gap between Security Solutions with Infoblox","datePublished":"2016-01-08T15:15:49+00:00","dateModified":"2020-05-06T17:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/"},"wordCount":648,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/","url":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/","name":"Bridge the Gap between Security Solutions with Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg","datePublished":"2016-01-08T15:15:49+00:00","dateModified":"2020-05-06T17:30:06+00:00","description":"In the\u00a0first\u00a0of this 3-part blog series, I proclaimed that it has become increasingly popular to depend on shared intelligence when making decisions about what to spend money and time on, both in the consumer and business world.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2-1-1.jpg","width":600,"height":446,"caption":"From IPv4-Only to Dual-stack to IPv6-Only: What Tech Will You Need?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Bridge the Gap between Security Solutions with Infoblox"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a","name":"Seema Kathuria","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","caption":"Seema Kathuria"},"url":"https:\/\/www.infoblox.com\/blog\/author\/seema-kathuria\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2736"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2736\/revisions"}],"predecessor-version":[{"id":3710,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2736\/revisions\/3710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2614"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}