{"id":2861,"date":"2016-02-16T18:08:13","date_gmt":"2016-02-16T18:08:13","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2861"},"modified":"2020-05-06T10:30:04","modified_gmt":"2020-05-06T17:30:04","slug":"when-it-comes-to-threats-context-is-everything","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/","title":{"rendered":"When It Comes To Threats, Context Is Everything"},"content":{"rendered":"<p>One of the biggest challenges in security is knowing which threats are real and can cause immediate damage. High volumes of information can mask and muddle real security issues. That\u2019s why it\u2019s so important to be able to apply context awareness to security: it helps prioritize, protect and predict security threats.<\/p>\n<p>Savvy companies are already focusing on this capability: Gartner estimates that by 2018, 60% of enterprises will utilize commercial threat-intelligence services. However, many organizations are still struggling to absorb, contextualize, and respond to threat information effectively.<\/p>\n<p>With the recent acquisition of IID (<a href=\"http:\/\/www.infoblox.com\/iid?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/iid<\/a>), Infoblox is bringing together threat intelligence and enterprise context to take action at the control point of the network \u2013 allowing customers to prioritize, protect and predict the security threats facing their networks.<\/p>\n<p>To learn more about these new capabilities, join us at 10 am PST on Tuesday, February 23, for a 30-minute webinar titled\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1131547\/D1036EB43716E3CE48655948BEC54544\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Get Context-Aware Security Insights<\/a>. You\u2019ll learn how to:<\/p>\n<ul>\n<li>Benefit from the synergy of combining\u00a0threat intelligence with on-premises context-driven response<\/li>\n<li>Protect company devices both on and off your premises<\/li>\n<li>Share highly prioritized and actionable threat intelligence to improve the efficacy of your security ecosystem<\/li>\n<li>Lower obstacles to achieving effective threat protection and prioritize your actions based on context<\/li>\n<\/ul>\n<p>Register\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1131547\/D1036EB43716E3CE48655948BEC54544\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the biggest challenges in security is knowing which threats are real and can cause immediate damage. High volumes of information can mask and muddle real security issues. That\u2019s why it\u2019s so important to be able to apply context awareness to security: it helps prioritize, protect and predict security threats. Savvy companies are already [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15],"class_list":{"0":"post-2861","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When It Comes To Threats, Context Is Everything<\/title>\n<meta name=\"description\" content=\"One of the biggest challenges in security is knowing which threats are real and can cause immediate damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When It Comes To Threats, Context Is Everything\" \/>\n<meta property=\"og:description\" content=\"One of the biggest challenges in security is knowing which threats are real and can cause immediate damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-16T18:08:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"When It Comes To Threats, Context Is Everything\",\"datePublished\":\"2016-02-16T18:08:13+00:00\",\"dateModified\":\"2020-05-06T17:30:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/\"},\"wordCount\":218,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/\",\"name\":\"When It Comes To Threats, Context Is Everything\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"datePublished\":\"2016-02-16T18:08:13+00:00\",\"dateModified\":\"2020-05-06T17:30:04+00:00\",\"description\":\"One of the biggest challenges in security is knowing which threats are real and can cause immediate damage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"width\":660,\"height\":454,\"caption\":\"Internet of Things Attacks are More than a Nuisance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/when-it-comes-to-threats-context-is-everything\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When It Comes To Threats, Context Is Everything\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"When It Comes To Threats, Context Is Everything","description":"One of the biggest challenges in security is knowing which threats are real and can cause immediate damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/","og_locale":"en_US","og_type":"article","og_title":"When It Comes To Threats, Context Is Everything","og_description":"One of the biggest challenges in security is knowing which threats are real and can cause immediate damage.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/","og_site_name":"Infoblox Blog","article_published_time":"2016-02-16T18:08:13+00:00","article_modified_time":"2020-05-06T17:30:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"When It Comes To Threats, Context Is Everything","datePublished":"2016-02-16T18:08:13+00:00","dateModified":"2020-05-06T17:30:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/"},"wordCount":218,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","keywords":["Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/","url":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/","name":"When It Comes To Threats, Context Is Everything","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","datePublished":"2016-02-16T18:08:13+00:00","dateModified":"2020-05-06T17:30:04+00:00","description":"One of the biggest challenges in security is knowing which threats are real and can cause immediate damage.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","width":660,"height":454,"caption":"Internet of Things Attacks are More than a Nuisance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/when-it-comes-to-threats-context-is-everything\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"When It Comes To Threats, Context Is Everything"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2861"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2861\/revisions"}],"predecessor-version":[{"id":2862,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2861\/revisions\/2862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2500"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}