{"id":2812,"date":"2015-09-21T17:32:55","date_gmt":"2015-09-21T17:32:55","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2812"},"modified":"2020-05-06T10:30:10","modified_gmt":"2020-05-06T17:30:10","slug":"infoblox-identity-mapping-extending-end-user-visibility-and-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/","title":{"rendered":"Infoblox Identity Mapping: Extending End User Visibility and Security"},"content":{"rendered":"<div class=\"lia-message-body lia-component-body\">\n<div class=\"lia-message-body-content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2813\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Identity-mapping.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them. This correlation is a cumbersome task, leading to less than optimal operations. Infoblox has put on its thinking cap and devised a unique way to tackle this problem.<\/p>\n<p>Infoblox Identity Mapping, announced today, bridges this gap, making it easier for network administrators to locate the source of security events, track mobile devices, monitor network usage and more. In short, Infoblox Identity Mapping introduces user identity as a front and center piece of information throughout the Infoblox user interface.<\/p>\n<p>With\u00a0Infoblox Identity Mapping, it is possible to see associated users virtually anywhere an IP address is displayed. In the instance of a security breach, for example, it\u2019s easier to zero in on which devices are involved. And, of course, the faster IT teams can identify potential breach information, the faster it can be remediated. This is the first time an enterprise-grade DDI solution has offered this capability.<\/p>\n<p>We\u2019ve been able to make this connection by making the answer more obvious. The Infoblox Identity Mapping feature analyzes Microsoft event logs for records of user log in, log out and authentication, bringing the information into the Infoblox IP address management (IPAM) database, providing a truly authoritative data source.<\/p>\n<p>Here are a few deployment scenarios for Infoblox Identity Mapping:<\/p>\n<ul>\n<li><strong>Security event investigation.\u00a0<\/strong>Infoblox Identity Mapping determines which device had the IP address at the time of the event and reports on the user who was logged into the device at that time. This allows the team to quickly identify which user\u2019s account or device may have been compromised.<\/li>\n<li><strong>Tracking mobile devices.<\/strong>\u00a0Though mobile devices aren\u2019t part of the Windows domain and typically don\u2019t authenticate against the domain, it\u2019s likely that they connect to the corporate Microsoft Exchange server in order to access email. Infoblox Identity Mapping correlates Exchange authentication to the user\u2019s IP address, providing the necessary visibility, without having to install an agent on the mobile device.<\/li>\n<li><strong>Notify users of a network outage.<\/strong>\u00a0Infoblox Identity Mapping allows an IT team to see how many users are actively using a segment of the network, and who they are, so the team can determine the impact of the outage, as well as notify the impacted users prior to a scheduled shutdown.<\/li>\n<\/ul>\n<p>Best of all, Infoblox Identity Mapping is available now to all our customers who can upgrade to version 7.2 of the NIOS operating system. No additional software or agents are required to provide the connection between Active Directory and the Infoblox IP address management (IPAM) database.<\/p>\n<p>To learn more about Infoblox Identify Mapping, click\u00a0<a href=\"http:\/\/www.infoblox.com\/identity-mapping?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>. You can also watch a two-minute demo:<\/p>\n<div class=\"video-embed-center video-embed\"><iframe loading=\"lazy\" class=\"embedly-embed bf_frame_init\" title=\"Video\" src=\"https:\/\/cdn.embedly.com\/widgets\/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FE6z4iRpE2xk%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DE6z4iRpE2xk&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FE6z4iRpE2xk%2Fhqdefault.jpg&amp;key=fad07bfa4bd747d3bdea27e17b533c0e&amp;type=text%2Fhtml&amp;schema=youtube\" width=\"590\" height=\"332\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<\/div>\n<\/div>\n<div class=\"lia-message-footer lia-component-message-footer\">\n<div class=\"lia-message-tags\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them. This correlation is a cumbersome task, leading to less than optimal operations. Infoblox has put on its thinking cap and devised a unique way [&hellip;]<\/p>\n","protected":false},"author":251,"featured_media":2813,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[28,122],"class_list":{"0":"post-2812","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddi","9":"tag-id-mapping","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infoblox Identity Mapping: Extending End User Visibility and Security<\/title>\n<meta name=\"description\" content=\"Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoblox Identity Mapping: Extending End User Visibility and Security\" \/>\n<meta property=\"og:description\" content=\"Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-21T17:32:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Raushni Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raushni Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/\"},\"author\":{\"name\":\"Raushni Gupta\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/92f6e5330fe0522cf5afb32b6623b5bb\"},\"headline\":\"Infoblox Identity Mapping: Extending End User Visibility and Security\",\"datePublished\":\"2015-09-21T17:32:55+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/\"},\"wordCount\":474,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Identity-mapping.jpg\",\"keywords\":[\"DDI\",\"ID Mapping\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/\",\"name\":\"Infoblox Identity Mapping: Extending End User Visibility and Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Identity-mapping.jpg\",\"datePublished\":\"2015-09-21T17:32:55+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"description\":\"Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Identity-mapping.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Identity-mapping.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/infoblox-identity-mapping-extending-end-user-visibility-and-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infoblox Identity Mapping: Extending End User Visibility and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/92f6e5330fe0522cf5afb32b6623b5bb\",\"name\":\"Raushni Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/009a7a34cf4e96c944fd97c628a67c1d42f84330acccafb133c03ce1f2159a3c?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/009a7a34cf4e96c944fd97c628a67c1d42f84330acccafb133c03ce1f2159a3c?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/009a7a34cf4e96c944fd97c628a67c1d42f84330acccafb133c03ce1f2159a3c?s=96&d=blank&r=g\",\"caption\":\"Raushni Gupta\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/raushni-gupta\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infoblox Identity Mapping: Extending End User Visibility and Security","description":"Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/","og_locale":"en_US","og_type":"article","og_title":"Infoblox Identity Mapping: Extending End User Visibility and Security","og_description":"Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/","og_site_name":"Infoblox Blog","article_published_time":"2015-09-21T17:32:55+00:00","article_modified_time":"2020-05-06T17:30:10+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg","type":"image\/jpeg"}],"author":"Raushni Gupta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Raushni Gupta","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/"},"author":{"name":"Raushni Gupta","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/92f6e5330fe0522cf5afb32b6623b5bb"},"headline":"Infoblox Identity Mapping: Extending End User Visibility and Security","datePublished":"2015-09-21T17:32:55+00:00","dateModified":"2020-05-06T17:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/"},"wordCount":474,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg","keywords":["DDI","ID Mapping"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/","url":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/","name":"Infoblox Identity Mapping: Extending End User Visibility and Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg","datePublished":"2015-09-21T17:32:55+00:00","dateModified":"2020-05-06T17:30:10+00:00","description":"Networks are about people, not just devices. To that end, network and security administrators are constantly challenged to optimize translation of network device information to the people who are using them.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Identity-mapping.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/infoblox-identity-mapping-extending-end-user-visibility-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Infoblox Identity Mapping: Extending End User Visibility and Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/92f6e5330fe0522cf5afb32b6623b5bb","name":"Raushni Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/009a7a34cf4e96c944fd97c628a67c1d42f84330acccafb133c03ce1f2159a3c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/009a7a34cf4e96c944fd97c628a67c1d42f84330acccafb133c03ce1f2159a3c?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/009a7a34cf4e96c944fd97c628a67c1d42f84330acccafb133c03ce1f2159a3c?s=96&d=blank&r=g","caption":"Raushni Gupta"},"url":"https:\/\/www.infoblox.com\/blog\/author\/raushni-gupta\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/251"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2812"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2812\/revisions"}],"predecessor-version":[{"id":2814,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2812\/revisions\/2814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2813"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}