{"id":4830,"date":"2020-02-25T09:31:13","date_gmt":"2020-02-25T17:31:13","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4830"},"modified":"2020-05-06T10:26:51","modified_gmt":"2020-05-06T17:26:51","slug":"bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/","title":{"rendered":"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends"},"content":{"rendered":"<p>Infoblox released version 4.4 of <a href=\"https:\/\/www.infoblox.com\/resources\/datasheets\/bloxone-threat-defense-advanced\" target=\"_blank\" rel=\"noopener noreferrer\">BloxOne\u2122 Threat Defense<\/a> on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0 While highlights have been <a href=\"https:\/\/www.infoblox.com\/company\/news-events\/press-releases\/infoblox-announces-dot-doh-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>announced through the press<\/u><\/a>, here is a summary of some key features introduced in this release:<\/p>\n<ul>\n<li><strong>DNS over HTTPS<\/strong> (<strong>DoH) Solution<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.\u00a0 Organizations wishing to utilize internal DNS infrastructure, including the ability to provide security policy enforcement through DNS need to implement controls to block the use of these 3<sup>rd<\/sup> party DoH resolvers. The Infoblox Threat Intelligence service includes a feed called \u201cPublic-DoH\u201d (public-doh.infoblox.local), which provides a negative response to \u201cDoH Canary\u201d domains (such as use-application-dns.net) and signals compliant browsers that DoH should not be used within the existing environment.\u00a0 Browsers will gracefully fall back to the organization\u2019s managed DNS without interrupting user activity.<\/p>\n<ul>\n<li><strong>Custom Lookalike Domain Monitoring<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">Existing lookalike domain defenses, designed to address threats abusing popularly targeted brands, such as \u201cPayPal\u201d, have been extended to allow users to submit their own specific critical domains for lookalike monitoring.\u00a0 You can now submit the company\u2019s own domain, or domains frequently visited by or controlled by the organization, to the Infoblox Cyber Intelligence Unit (CIU) who will determine high-risk lookalike domains for initial assessment and monitoring.\u00a0 Customers are notified of suspicious activity related to these lookalike domains for visibility and as an advanced warning to help the organization potentially avert targeted employee attacks to compromise the network, or threats targeting customers that can damage the organizations\u2019 brand reputation.<strong>\u00a0<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Custom Lookalike Domain Monitoring is initially only available for subscribers of BloxOne Threat Defense Advanced.<\/p>\n<ul>\n<li><strong>Data Connector Enhancements\u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">Data Connector is now enabled to forward DNS Firewall logs (RPZ logs) to Splunk and Infoblox Reporting for easier access to important details that can further accelerate incident investigations and support more rapid and effective threat response planning.<\/p>\n<p style=\"padding-left: 40px;\">Data Connector is available for subscribers of BloxOne Threat Defense Business Cloud, Advanced and Security Ecosystem Business.<\/p>\n<ul>\n<li><strong>Comprehensive Security Report<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">This release introduces the Comprehensive Security Report. This report helps users determine what information to display in the Cloud Services Portal by familiarizing them with the breadth of statistics and other data available. Additionally, information from this report can be exported to SIEM or integrated into other security tools for further correlation, assessment, or sharing.<\/p>\n<ul>\n<li><strong>Executive Summary Report: Additional Data Reporting<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">This feature enhancement adds two additional graphical report types to the already available report; <em>Data Exfiltration Activity<\/em> and <em>Access to Unauthorized Web Categories<\/em>. The <em>Data Exfiltration Activity <\/em>report documents the unauthorized transfer of data from a computer. DNS threat analytics can detect and automatically block data exfiltration attempts via DNS, without the need for endpoint agents or additional network infrastructure. The target domains can originate from any geographic location. The <em>Access to Unauthorized Web Categories<\/em> report displays a breakdown of web activity to sites classified by the user as unauthorized by means of a content category.<\/p>\n<p>Driven by user feedback and changes in the threat landscape, Infoblox continues to address some of the unmet challenges in the security industry with this release.\u00a0 BloxOne\u2122\u00a0Threat Defense provides immediate value as it secures often underdefended attack vectors, but also through foundational security services to improve the effectiveness of other solutions throughout the security stack.\u00a0 If you are not already a customer, let us show you how we can take your security posture to the next level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0 While highlights have been announced through the press, here is a summary of some key features introduced in this release: DNS over HTTPS [&hellip;]<\/p>\n","protected":false},"author":334,"featured_media":2836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,16,15],"class_list":{"0":"post-4830","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends<\/title>\n<meta name=\"description\" content=\"Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends\" \/>\n<meta property=\"og:description\" content=\"Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-25T17:31:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Hansmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hansmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/\"},\"author\":{\"name\":\"Bob Hansmann\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\"},\"headline\":\"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends\",\"datePublished\":\"2020-02-25T17:31:13+00:00\",\"dateModified\":\"2020-05-06T17:26:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/\",\"name\":\"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"datePublished\":\"2020-02-25T17:31:13+00:00\",\"dateModified\":\"2020-05-06T17:26:51+00:00\",\"description\":\"Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Protecting-Those-Who-Protect-Us.jpg\",\"width\":660,\"height\":454,\"caption\":\"Protecting Those Who Protect Us\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\",\"name\":\"Bob Hansmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"caption\":\"Bob Hansmann\"},\"description\":\"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-hansmann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends","description":"Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/","og_locale":"en_US","og_type":"article","og_title":"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends","og_description":"Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/","og_site_name":"Infoblox Blog","article_published_time":"2020-02-25T17:31:13+00:00","article_modified_time":"2020-05-06T17:26:51+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","type":"image\/jpeg"}],"author":"Bob Hansmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Hansmann","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/"},"author":{"name":"Bob Hansmann","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8"},"headline":"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends","datePublished":"2020-02-25T17:31:13+00:00","dateModified":"2020-05-06T17:26:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","keywords":["DNS","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/","url":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/","name":"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","datePublished":"2020-02-25T17:31:13+00:00","dateModified":"2020-05-06T17:26:51+00:00","description":"Infoblox released version 4.4 of BloxOne\u2122 Threat Defense on February 25, introducing new capabilities to defend against several high-risk trends as well as enhancements to ecosystem integration and several new reporting features.\u00a0DNS over HTTPS (DoH) is beginning to be supported by all major browsers, designed to offer increased privacy for some users, at the expense of enterprise security best practices. By enabling DoH, devices will be sending all DNS traffic to an external third-party DNS resolver, bypassing internal enterprise DNS infrastructure.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Protecting-Those-Who-Protect-Us.jpg","width":660,"height":454,"caption":"Protecting Those Who Protect Us"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-4-4-maintaining-security-in-the-face-of-risk-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"BloxOne\u2122 Threat Defense 4.4 \u2013 Maintaining Security in the Face of Risk Trends"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8","name":"Bob Hansmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","caption":"Bob Hansmann"},"description":"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-hansmann\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/334"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4830"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4830\/revisions"}],"predecessor-version":[{"id":4843,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4830\/revisions\/4843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2836"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}