{"id":3505,"date":"2013-08-19T19:59:42","date_gmt":"2013-08-19T19:59:42","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3505"},"modified":"2020-05-06T10:31:38","modified_gmt":"2020-05-06T17:31:38","slug":"infoblox-byod-is-detect-enforce-protect-amp-report","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/","title":{"rendered":"Infoblox BYOD is Detect, Enforce, Protect, &#038; Report"},"content":{"rendered":"<p>Welcome back for SKO everyone! \u00a0It was an &#8220;interesting&#8221; event with a lot of folks who were eager to learn about the Infoblox BYOD strategy. The BYOD sessions were scheduled to start at 8:30 Thursday morning after a very late night on Wednesday. Infusing that room with energy was a challenge but I am certain the early group, just like the 10:30 group, came away knowing Infoblox has a great strategy \/ solution for BYOD. I believe everyone went home knowing that the Infoblox BYOD solution adds to ANY MDM solution providing 4 key elements &#8211; Detect, Enforce, Protect, and Report.<\/p>\n<p>The Blox BYOD solution detects ALL devices (wired or wireless) and enforces corporate device policy at the network edge. The DNS Firewall provides the necessary malware protection as approved devices are allowed on the network for either on-boarding with the MDM system or in a walled garden with Public Internet access only. The Reporting Appliance serves up all the information regarding ALL devices attempting to access the network.<\/p>\n<p>When you detect and enforce at the network edge you gain control over ALL devices making their way into the enterprise. The MDM system then adds additional device control features for those approved smartphones and tablets owned by authenticated users. MDM, together with Infoblox creates the TOTAL solution businesses need to securely embrace BYOD!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome back for SKO everyone! \u00a0It was an &#8220;interesting&#8221; event with a lot of folks who were eager to learn about the Infoblox BYOD strategy. The BYOD sessions were scheduled to start at 8:30 Thursday morning after a very late night on Wednesday. Infusing that room with energy was a challenge but I am certain [&hellip;]<\/p>\n","protected":false},"author":252,"featured_media":2577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-3505","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infoblox BYOD is Detect, Enforce, Protect, &amp; Report<\/title>\n<meta name=\"description\" content=\"Welcome back for SKO everyone! It was an &quot;interesting&quot; event with a lot of folks who were eager to learn about the Infoblox BYOD strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoblox BYOD is Detect, Enforce, Protect, &amp; Report\" \/>\n<meta property=\"og:description\" content=\"Welcome back for SKO everyone! It was an &quot;interesting&quot; event with a lot of folks who were eager to learn about the Infoblox BYOD strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-19T19:59:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rick Bylina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Bylina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/\"},\"author\":{\"name\":\"Rick Bylina\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/9d047363b144466524f7b7d4d8e99dd7\"},\"headline\":\"Infoblox BYOD is Detect, Enforce, Protect, &#038; Report\",\"datePublished\":\"2013-08-19T19:59:42+00:00\",\"dateModified\":\"2020-05-06T17:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/\"},\"wordCount\":226,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/\",\"name\":\"Infoblox BYOD is Detect, Enforce, Protect, & Report\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"datePublished\":\"2013-08-19T19:59:42+00:00\",\"dateModified\":\"2020-05-06T17:31:38+00:00\",\"description\":\"Welcome back for SKO everyone! It was an \\\"interesting\\\" event with a lot of folks who were eager to learn about the Infoblox BYOD strategy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"DNS is NOT a Transport Protocol!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-byod-is-detect-enforce-protect-amp-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infoblox BYOD is Detect, Enforce, Protect, &#038; Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/9d047363b144466524f7b7d4d8e99dd7\",\"name\":\"Rick Bylina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/158f416b0085355e1c2deb864b1ffd71fe750dd3bd4153103ac91124097600f3?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/158f416b0085355e1c2deb864b1ffd71fe750dd3bd4153103ac91124097600f3?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/158f416b0085355e1c2deb864b1ffd71fe750dd3bd4153103ac91124097600f3?s=96&d=blank&r=g\",\"caption\":\"Rick Bylina\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/rick-bylina\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infoblox BYOD is Detect, Enforce, Protect, & Report","description":"Welcome back for SKO everyone! It was an \"interesting\" event with a lot of folks who were eager to learn about the Infoblox BYOD strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/","og_locale":"en_US","og_type":"article","og_title":"Infoblox BYOD is Detect, Enforce, Protect, & Report","og_description":"Welcome back for SKO everyone! It was an \"interesting\" event with a lot of folks who were eager to learn about the Infoblox BYOD strategy.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/","og_site_name":"Infoblox Blog","article_published_time":"2013-08-19T19:59:42+00:00","article_modified_time":"2020-05-06T17:31:38+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","type":"image\/jpeg"}],"author":"Rick Bylina","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Bylina","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/"},"author":{"name":"Rick Bylina","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/9d047363b144466524f7b7d4d8e99dd7"},"headline":"Infoblox BYOD is Detect, Enforce, Protect, &#038; Report","datePublished":"2013-08-19T19:59:42+00:00","dateModified":"2020-05-06T17:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/"},"wordCount":226,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/","url":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/","name":"Infoblox BYOD is Detect, Enforce, Protect, & Report","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","datePublished":"2013-08-19T19:59:42+00:00","dateModified":"2020-05-06T17:31:38+00:00","description":"Welcome back for SKO everyone! It was an \"interesting\" event with a lot of folks who were eager to learn about the Infoblox BYOD strategy.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","width":660,"height":454,"caption":"DNS is NOT a Transport Protocol!"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-byod-is-detect-enforce-protect-amp-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Infoblox BYOD is Detect, Enforce, Protect, &#038; Report"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/9d047363b144466524f7b7d4d8e99dd7","name":"Rick Bylina","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/158f416b0085355e1c2deb864b1ffd71fe750dd3bd4153103ac91124097600f3?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/158f416b0085355e1c2deb864b1ffd71fe750dd3bd4153103ac91124097600f3?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/158f416b0085355e1c2deb864b1ffd71fe750dd3bd4153103ac91124097600f3?s=96&d=blank&r=g","caption":"Rick Bylina"},"url":"https:\/\/www.infoblox.com\/blog\/author\/rick-bylina\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/252"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3505"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3505\/revisions"}],"predecessor-version":[{"id":3506,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3505\/revisions\/3506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2577"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}