{"id":4875,"date":"2020-03-15T14:12:08","date_gmt":"2020-03-15T21:12:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4875"},"modified":"2024-04-30T06:38:39","modified_gmt":"2024-04-30T13:38:39","slug":"network-identity-in-a-cloud-native-world","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/","title":{"rendered":"Network Identity in a Cloud-native World"},"content":{"rendered":"<h4>Cloud-native technologies transform businesses at a global scale<\/h4>\n<p>Companies like Amazon and Netflix leveraged cloud technologies to go from being mail order companies to some of the world\u2019s largest consumer on-demand businesses. Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs.<\/p>\n<h4>In a borderless enterprise identity is the new perimeter<\/h4>\n<p>DNS, DHCP and IP address management collectively automates network connectivity and provides visibility into network connected devices. They enable a foundational layer of visibility and security for your network. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.<\/p>\n<h4>Identity now includes human users, devices and applications<\/h4>\n<p>In transitioning to cloud, the different types of cloud-native applications developed and deployed by organizations such as microservices, web applications or bots are inherently different than human identities and require additional oversight. For example, in operation, Kubernetes requires access to registries on the internet to download various containerized micro-services. There may be hundreds or even thousands of identities accessing resources across an enterprise network on a regular basis, each with its own unique set of circumstances.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4897 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/sase-blog-s1e2-v4-1024x410.png\" alt=\"\" width=\"1024\" height=\"410\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog-s1e2-v4-1024x410.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog-s1e2-v4-300x120.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog-s1e2-v4-768x307.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog-s1e2-v4-1536x614.png 1536w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog-s1e2-v4.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h4>Volume and variety of corporate identities are plaguing enterprise IT<\/h4>\n<p>Per IDC, it is not uncommon for applications to use their own LDAP directories. Managing those directories and controlling risk is a problem. Enterprise IT simply doesn\u2019t have the level of visibility required to truly understand which identities are performing what actions on their critical resources across multiple and vastly different cloud operating models. Moreover, the identity teams don\u2019t have the time or expertise to keep up with the proliferation of privileges, roles, resources and services across multiple cloud platforms.<\/p>\n<h4>ML and AI has transformed identity management<\/h4>\n<p>Identity lies in the core of security. Traditional identity mechanisms don\u2019t apply to modern and often hybrid workloads. Runtime authorization decisions are now made within, applications. One integrated platform instead of several discrete Identity and Access Management solutions consumed in a SaaS-delivered manner is the answer. In addition, an ML\/AI-driven approach that automates the identity management processes can improve operational efficiencies. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise.<\/p>\n<p>See Infoblox white paper on <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/an-introduction-to-zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust Networking<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud-native technologies transform businesses at a global scale Companies like Amazon and Netflix leveraged cloud technologies to go from being mail order companies to some of the world\u2019s largest consumer on-demand businesses. Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. In a [&hellip;]<\/p>\n","protected":false},"author":247,"featured_media":2806,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[41,86,246,15],"class_list":{"0":"post-4875","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-cloud","9":"tag-cloud-native","10":"tag-identity","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Network Identity in a Cloud-native World<\/title>\n<meta name=\"description\" content=\"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Identity in a Cloud-native World\" \/>\n<meta property=\"og:description\" content=\"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-15T21:12:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-30T13:38:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PG Menon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PG Menon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/\"},\"author\":{\"name\":\"PG Menon\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/c5a01da7db2d58edfbb231094dc37a3a\"},\"headline\":\"Network Identity in a Cloud-native World\",\"datePublished\":\"2020-03-15T21:12:08+00:00\",\"dateModified\":\"2024-04-30T13:38:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/\"},\"wordCount\":424,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"keywords\":[\"Cloud\",\"Cloud Native\",\"Identity\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/\",\"name\":\"Network Identity in a Cloud-native World\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"datePublished\":\"2020-03-15T21:12:08+00:00\",\"dateModified\":\"2024-04-30T13:38:39+00:00\",\"description\":\"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"width\":660,\"height\":454,\"caption\":\"Cloud Security Provider Turns to Infoblox For Network Availability and Agility\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/network-identity-in-a-cloud-native-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Identity in a Cloud-native World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/c5a01da7db2d58edfbb231094dc37a3a\",\"name\":\"PG Menon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_247_1608573000-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_247_1608573000-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_247_1608573000-96x96.png\",\"caption\":\"PG Menon\"},\"description\":\"PG Menon is Senior Director of Product Marketing at Infoblox. He was most recently Senior Director, at Aruba Networks, A Hewlett Packard Company where he was product marketing lead for its campus switching product line. Before Aruba, PG was senior director of technology strategy at Brocade Communications where he led several initiatives such as SDN and DevOps for cloud and datacenter markets. Prior to Brocade, PG was a founding executive in a number of startups. PG Menon has an MS EE from Rensselaer Polytechnic Institute and BS in EE from IIT, Varanasi, India.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/pg-menon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Network Identity in a Cloud-native World","description":"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/","og_locale":"en_US","og_type":"article","og_title":"Network Identity in a Cloud-native World","og_description":"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/","og_site_name":"Infoblox Blog","article_published_time":"2020-03-15T21:12:08+00:00","article_modified_time":"2024-04-30T13:38:39+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","type":"image\/jpeg"}],"author":"PG Menon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"PG Menon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/"},"author":{"name":"PG Menon","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/c5a01da7db2d58edfbb231094dc37a3a"},"headline":"Network Identity in a Cloud-native World","datePublished":"2020-03-15T21:12:08+00:00","dateModified":"2024-04-30T13:38:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/"},"wordCount":424,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","keywords":["Cloud","Cloud Native","Identity","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/","url":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/","name":"Network Identity in a Cloud-native World","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","datePublished":"2020-03-15T21:12:08+00:00","dateModified":"2024-04-30T13:38:39+00:00","description":"Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise. Network identity has long been used as a means for\u00a0 authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","width":660,"height":454,"caption":"Cloud Security Provider Turns to Infoblox For Network Availability and Agility"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/network-identity-in-a-cloud-native-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Network Identity in a Cloud-native World"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/c5a01da7db2d58edfbb231094dc37a3a","name":"PG Menon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_247_1608573000-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_247_1608573000-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_247_1608573000-96x96.png","caption":"PG Menon"},"description":"PG Menon is Senior Director of Product Marketing at Infoblox. He was most recently Senior Director, at Aruba Networks, A Hewlett Packard Company where he was product marketing lead for its campus switching product line. Before Aruba, PG was senior director of technology strategy at Brocade Communications where he led several initiatives such as SDN and DevOps for cloud and datacenter markets. Prior to Brocade, PG was a founding executive in a number of startups. PG Menon has an MS EE from Rensselaer Polytechnic Institute and BS in EE from IIT, Varanasi, India.","url":"https:\/\/www.infoblox.com\/blog\/author\/pg-menon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4875"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4875\/revisions"}],"predecessor-version":[{"id":4901,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4875\/revisions\/4901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2806"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}