{"id":2835,"date":"2016-04-11T08:00:00","date_gmt":"2016-04-11T08:00:00","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2835"},"modified":"2020-05-06T10:30:02","modified_gmt":"2020-05-06T17:30:02","slug":"protecting-those-who-protect-us","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/","title":{"rendered":"Protecting Those Who Protect Us"},"content":{"rendered":"<p>In the 21<sup>st<\/sup>\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0<a href=\"http:\/\/www.defense.gov\/News\/Special-Reports\/0415_Cyber-Strategy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.<\/p>\n<p>Within its Cyber Mission Force, DoD plans to have 133 teams in place by 2018: 68 for cyber protection, 27 for combat missions, 25 for analytic and planning support, and 13 for cyberattacks.<\/p>\n<p>Infoblox is proud to be part of the team that\u2019s helping a key agency within the U.S. Department of Defense protect the country\u2019s strategic digital interests. This agency has been an Infoblox customer for more than five years, and was an early adopter of Infoblox virtual appliances. It frequently adds new capabilities, including most recently virtualization, in a complex network architecture.<\/p>\n<p>\u201cWe\u2019re not unlike any other IT organization that\u2019s large, and has a large number of servers that are mission critical,\u201d says the agency\u2019s IT architect. \u201cWe run Windows and Linux, and in our heterogeneous environment, we needed a single centralized management resource.\u201d Previously, the agency used a number of disparate management tools for core network services, including Microsoft MMC as well as multiple text files across servers running BIND, ISC, and DHCP, but those tools didn\u2019t allow the agency to react fast enough to handle frequent global Domain Name System (DNS) name refreshes.<\/p>\n<p>\u201cOne huge factor for us is that Infoblox is a Microsoft Gold Partner and its DDI solution ties in with Active Directory. [Thanks to that capability], we\u2019ve seen significant savings in time\u2014it\u2019s night and day,\u201d the IT architect says. Prior to the Infoblox deployment, all IP management was done manually, which too often led to errors without giving the visibility the agency needed. Deploying Infoblox has been \u201ca life changer for our environment.\u201d<\/p>\n<p>The IT team is currently running six Infoblox 1410 physical appliances in a high-availability configuration and nine virtual ones for DNS, DHCP, and IP address management (DDI) in the production environment, and is also using Infoblox adapters for VMware vCloud Automation Center and vCenter Orchestrator in a development lab. This lets the agency\u2019s internal customers \u201cspin up and spin down resources in an elastic cloud utilizing vCloud Automation Center. We\u2019ve created workflows that are going to allow us to select an IP address, be given a host name from Infoblox by accessing the API, and when the machine is torn down, make another call to actually remove it from Infoblox, including the host name and IP.\u201d<\/p>\n<p>The goal: complete automation. \u201cInstead of humans being involved, we\u2019re going to dynamically build and destroy servers on the fly,\u201d says the IT architect.<\/p>\n<p>Security compliance, of course, is an important issue in any defense organization, and Infoblox helps with that, too. IT teams in the DoD agency can address BIND vulnerabilities quickly because the solution is baked into the Infoblox operating system. Its automated patching capability simplifies Microsoft Patch Tuesday, while at the same time, the attack surface of the Infoblox appliances is much smaller, and Infoblox provides reporting, so compliance audits are accomplished a lot more quickly.<\/p>\n<p>For the full case study, click\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/case-study\/us-department-defense?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations. Within its Cyber Mission Force, DoD plans [&hellip;]<\/p>\n","protected":false},"author":261,"featured_media":2836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[28,16,15],"class_list":{"0":"post-2835","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddi","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting Those Who Protect Us<\/title>\n<meta name=\"description\" content=\"In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Those Who Protect Us\" \/>\n<meta property=\"og:description\" content=\"In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-11T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Fulton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Fulton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/\"},\"author\":{\"name\":\"Scott Fulton\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/86690b5b70d4496200b9636a8d852a1b\"},\"headline\":\"Protecting Those Who Protect Us\",\"datePublished\":\"2016-04-11T08:00:00+00:00\",\"dateModified\":\"2020-05-06T17:30:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"keywords\":[\"DDI\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/\",\"name\":\"Protecting Those Who Protect Us\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"datePublished\":\"2016-04-11T08:00:00+00:00\",\"dateModified\":\"2020-05-06T17:30:02+00:00\",\"description\":\"In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"width\":660,\"height\":454,\"caption\":\"Protecting Those Who Protect Us\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/protecting-those-who-protect-us\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting Those Who Protect Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/86690b5b70d4496200b9636a8d852a1b\",\"name\":\"Scott Fulton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g\",\"caption\":\"Scott Fulton\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-fulton\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Those Who Protect Us","description":"In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Those Who Protect Us","og_description":"In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/","og_site_name":"Infoblox Blog","article_published_time":"2016-04-11T08:00:00+00:00","article_modified_time":"2020-05-06T17:30:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","type":"image\/jpeg"}],"author":"Scott Fulton","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Fulton","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/"},"author":{"name":"Scott Fulton","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/86690b5b70d4496200b9636a8d852a1b"},"headline":"Protecting Those Who Protect Us","datePublished":"2016-04-11T08:00:00+00:00","dateModified":"2020-05-06T17:30:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","keywords":["DDI","Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/","url":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/","name":"Protecting Those Who Protect Us","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","datePublished":"2016-04-11T08:00:00+00:00","dateModified":"2020-05-06T17:30:02+00:00","description":"In the 21st\u00a0Century, the U.S. federal government has had to expand how it defines \u201cdefense\u201d to include cyberthreats. That\u2019s why the Department of Defense has ramped up its cyberstrategy efforts (outlined\u00a0here) to encompass defending DoD networks, defending national interests against cyberattacks, and providing cyber support to military operations.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","width":660,"height":454,"caption":"Protecting Those Who Protect Us"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/protecting-those-who-protect-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Protecting Those Who Protect Us"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/86690b5b70d4496200b9636a8d852a1b","name":"Scott Fulton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g","caption":"Scott Fulton"},"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-fulton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/261"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2835"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2835\/revisions"}],"predecessor-version":[{"id":2837,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2835\/revisions\/2837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2836"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}