{"id":2871,"date":"2016-02-18T18:26:41","date_gmt":"2016-02-18T18:26:41","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2871"},"modified":"2020-05-06T10:30:04","modified_gmt":"2020-05-06T17:30:04","slug":"how-infoblox-shares-security-and-network-context-for-visibility","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/","title":{"rendered":"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response"},"content":{"rendered":"<p>In the\u00a0<a href=\"\/community\/bridge-the-gap-between-security-solutions-with-infoblox\/\" target=\"_blank\" rel=\"noopener noreferrer\">second<\/a>\u00a0of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using; such as\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/partners\/technology-partners\/bit9-carbon-black?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">next-gen endpoint security<\/a>, enterprise threat intelligence platforms and NAC solutions, and thereby playing a critical role in enhancing the cybersecurity ecosystem.<\/p>\n<p>In order to exchange network and security context data with others, Infoblox supports a couple of methods:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2869\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-methods.jpg\" alt=\"Infoblox Methods\" width=\"468\" height=\"259\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-methods.jpg 468w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-methods-300x166.jpg 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<p><strong>1st Method &#8211; REST API<\/strong><\/p>\n<p>Infoblox offers a\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/API-Integration\/bd-p\/API_Integration\" target=\"_blank\" rel=\"noopener noreferrer\">REST API<\/a>\u00a0to provide a simple way for customers and partners to easily integrate our DDI and DNS security solutions with third-party security technologies they are already using.<\/p>\n<p><strong>2nd Method \u2013 Custom\/Third Party<\/strong><\/p>\n<p>Various network and security vendors are developing their own sharing standards. One example is Cisco Platform Exchange Grid (pxGrid), which enables multivendor, cross-platform network system collaboration among parts of the IT infrastructure such as security monitoring and detection systems, network policy platforms, asset and configuration management, identity and access management platforms, and virtually any other IT operations platform.<\/p>\n<p>Infoblox DNS Firewall and Infoblox IP address management (IPAM) with Network Insight solutions use pxGrid to exchange data with other pxGrid members like\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/partners\/technology-partners\/cisco-ise?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco Identity Services Engine (ISE)<\/a>, a network access control solution. I am delighted to share that the Infoblox DDI solution has officially received Cisco Compatibility for the Cisco ISE integration. Learn more about the value this integration brings to both Cisco and Infoblox here:\u00a0<a href=\"https:\/\/marketplace.cisco.com\/catalog\/companies\/infoblox\/products\/infoblox-ddi\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/marketplace.cisco.com\/catalog\/companies\/infoblox\/products\/infoblox-ddi<\/a><\/p>\n<p><strong>3rd Method \u2013 Industry Standards: STIX and TAXII<\/strong><\/p>\n<p>Based on customer demand and a growing recognition of the benefits of adopting a standard method of sharing data by the US Federal Government and certain verticals like Financial Services, Infoblox is the first DDI vendor to\u00a0<a href=\"\/community\/stix-and-taxii-enabler-for-successful-cyber-security-ecosystem\/\" target=\"_blank\" rel=\"noopener noreferrer\">support STIX and TAXII<\/a>\u00a0protocols. As a result, we can enhance security visibility and automate response in two ways:<\/p>\n<ol>\n<li>Infoblox can receive indicators of compromise from threat intelligence platforms to enhance our visibility into malicious domains and IP addresses and automatically take action using our DNS Firewall Response Policy Zone (RPZ) policy-based solution.<\/li>\n<li>Infoblox can share threat context on malicious communications detected by DNS Firewall with third-party security solutions so that they can then further use that information to enrich their own database and can inform other security solutions in the network infrastructure.<\/li>\n<\/ol>\n<p><strong>Learn More<\/strong><\/p>\n<p>To learn more about how Infoblox has partnered with multiple leading security technologies such as Carbon Black, Cisco, LogRhythm and others, and how you can use Infoblox DDI to improve visibility into and improve control over network security threats and devices, visit us at the forthcoming\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/news-events\/event\/2015\/1456722000-1456981200\/rsa-conference?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RSA<\/a>\u00a0Conference and Exposition in San Francisco in the South Hall Booth #526.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the\u00a0second\u00a0of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using; such as\u00a0next-gen endpoint security, enterprise threat intelligence platforms and NAC solutions, and thereby playing a critical role in enhancing the cybersecurity [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":2574,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[28,16,15],"class_list":{"0":"post-2871","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-ddi","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response<\/title>\n<meta name=\"description\" content=\"In the second of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response\" \/>\n<meta property=\"og:description\" content=\"In the second of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-18T18:26:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Seema Kathuria\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Seema Kathuria\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/\"},\"author\":{\"name\":\"Seema Kathuria\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\"},\"headline\":\"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response\",\"datePublished\":\"2016-02-18T18:26:41+00:00\",\"dateModified\":\"2020-05-06T17:30:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/\"},\"wordCount\":461,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2-1.jpg\",\"keywords\":[\"DDI\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/\",\"name\":\"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2-1.jpg\",\"datePublished\":\"2016-02-18T18:26:41+00:00\",\"dateModified\":\"2020-05-06T17:30:04+00:00\",\"description\":\"In the second of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Help Us to Help You Get to the Next Big Thing in DNS Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-infoblox-shares-security-and-network-context-for-visibility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\",\"name\":\"Seema Kathuria\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"caption\":\"Seema Kathuria\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/seema-kathuria\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response","description":"In the second of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/","og_locale":"en_US","og_type":"article","og_title":"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response","og_description":"In the second of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using","og_url":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/","og_site_name":"Infoblox Blog","article_published_time":"2016-02-18T18:26:41+00:00","article_modified_time":"2020-05-06T17:30:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2-1.jpg","type":"image\/jpeg"}],"author":"Seema Kathuria","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Seema Kathuria","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/"},"author":{"name":"Seema Kathuria","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a"},"headline":"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response","datePublished":"2016-02-18T18:26:41+00:00","dateModified":"2020-05-06T17:30:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/"},"wordCount":461,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2-1.jpg","keywords":["DDI","Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/","url":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/","name":"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2-1.jpg","datePublished":"2016-02-18T18:26:41+00:00","dateModified":"2020-05-06T17:30:04+00:00","description":"In the second of this 3-part blog series, I shared that Infoblox, market leader in DNS, DHCP and IP address management (DDI) services, is bridging the gap between various security products you may already be using","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2-1.jpg","width":660,"height":454,"caption":"Help Us to Help You Get to the Next Big Thing in DNS Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-infoblox-shares-security-and-network-context-for-visibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"How Infoblox Shares Security and Network Context for Visibility and Automated Threat Response"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a","name":"Seema Kathuria","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","caption":"Seema Kathuria"},"url":"https:\/\/www.infoblox.com\/blog\/author\/seema-kathuria\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"predecessor-version":[{"id":2872,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2871\/revisions\/2872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2574"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}