{"id":5034,"date":"2020-04-07T10:04:21","date_gmt":"2020-04-07T17:04:21","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5034"},"modified":"2020-07-30T08:30:36","modified_gmt":"2020-07-30T15:30:36","slug":"secure-dns-security-beyond-the-vpn","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/","title":{"rendered":"Secure DNS: Security beyond the VPN"},"content":{"rendered":"<p>As companies enter the fourth week of the global work from home experiment due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally been concerned about the challenges of securing employee\u2019s access to the corporate network.<\/p>\n<p>Virtual Private Networks (VPNs) have been touted by some as a solution to this challenge. VPNs encrypt a user\u2019s web traffic and send it through a private connection to the corporate network, allowing employees to access corporate data and applications with some measure of security and privacy.<\/p>\n<p>Today, however, due to the proliferation of cloud-based applications like Office 365, SFDC, Google Drive, and others, it is uncommon for organizations to rely solely on VPN-based access to corporate resources. Instead, VPN is usually used to access just a small subset of internal corporate platforms, leaving remote users unprotected when accessing these cloud-based applications, and exposed to <strong><a href=\"https:\/\/blogs.infoblox.com\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/\">threats<\/a> <\/strong>on the internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5040 size-full\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn.jpg\" alt=\"Learn about now secure DNS services can best protect enterprise tele-workforces\" width=\"725\" height=\"483\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn.jpg 725w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-300x200.jpg 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/p>\n<p>Furthermore, VPNs may not provide the level of security that\u2019s necessary in today\u2019s threat environment. According to a recent alert issued by the <strong><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-073a\" target=\"_blank\" rel=\"noopener noreferrer\">US Cybersecurity and Infrastructure Agency (CISA)<\/a><\/strong>, malicious cyber actors are finding and targeting vulnerabilities in VPNs as employees increasingly use them for telework amid the pandemic. And since VPNs are considered 24\/7 infrastructure\u2014that is they are always on to facilitate secure connection to the enterprise network\u2014organizations are less likely to keep them updated with the latest patches. Finally, since many VPN providers charge by the user, many organizations may have a limited number of VPN connections available, meaning that any additional employees can no longer telework or securely access corporate data.<\/p>\n<p>In this environment, one of the best and most cost-effective ways enterprises can secure such a large-scale tele-workforce is by using DNS as a first line of defense. Every connection to the internet goes through DNS\u2014those working from home are typically using either public DNS or DNS provided by their internet service provider, both of which seldom do security enforcement on DNS. Companies are increasingly interested in implementing secure DNS services that can quickly start protecting their remote workforce per a recent <strong><a href=\"https:\/\/www.csoonline.com\/article\/3534521\/3-ways-covid-19-is-changing-ciso-priorities.html\" target=\"_blank\" rel=\"noopener noreferrer\">CSO article.<\/a><\/strong><\/p>\n<p>Infoblox recommends using secure DNS services, like <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><strong>BloxOne\u2122 Threat Defense<\/strong><\/a>, that can extend enterprise-level security to teleworking employees, their devices, and corporate networks, no matter where they are located.<\/p>\n<p>BloxOne Threat Defense:<\/p>\n<ul>\n<li>Uses DNS as the first line of defense to detect and block phishing, exploits, ransomware and other modern malware by preventing teleworking employees from accessing malicious websites;<\/li>\n<li>Blocks access to objectionable content restricted by policy;<\/li>\n<li>Uses unique patented technology to prevent data from being exfiltrated using DNS and keep sensitive data secure; and<\/li>\n<li>Monitors for advanced threats, including the rise of lookalike domains.<\/li>\n<\/ul>\n<p>BloxOne Threat Defense can be deployed on teleworking users\u2019 devices from the cloud, and is easy to manage. It securely redirects users\u2019 DNS to the Infoblox cloud for anytime, anywhere protection and monitoring.<\/p>\n<p>Read this <strong><a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/securing-remote-workers-in-the-age-of-teleworking\">whitepaper<\/a> <\/strong>to learn more about securing teleworking employees. And sign up for a free trial of BloxOne Threat Defense <strong><a href=\"https:\/\/info.infoblox.com\/resources-evaluations-bloxone-threat-defense.html\">here<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As companies enter the fourth week of the global work from home experiment due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally been concerned about the challenges of securing employee\u2019s access to the corporate network. Virtual Private Networks (VPNs) have been touted by some as a solution to this challenge. VPNs [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":5042,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[153,228,189,15,248],"class_list":{"0":"post-5034","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone","9":"tag-bloxone-threat-defense","10":"tag-cybersecurity","11":"tag-security","12":"tag-work-from-home","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure DNS: Security beyond the VPN | Infoblox<\/title>\n<meta name=\"description\" content=\"Learn about the security limitations of VPN and how secure DNS services can be one of the best ways to secure enterprise, large-scale tele-workforces.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure DNS: Security beyond the VPN\" \/>\n<meta property=\"og:description\" content=\"Learn about the security limitations of VPN and how secure DNS services can be one of the best ways to secure enterprise, large-scale tele-workforces.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-07T17:04:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-30T15:30:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Secure DNS: Security beyond the VPN\",\"datePublished\":\"2020-04-07T17:04:21+00:00\",\"dateModified\":\"2020-07-30T15:30:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/\"},\"wordCount\":507,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg\",\"keywords\":[\"BloxOne\u00ae\",\"BloxOne\u00ae Threat Defense\",\"Cybersecurity\",\"Security\",\"Work From Home\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/\",\"name\":\"Secure DNS: Security beyond the VPN | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg\",\"datePublished\":\"2020-04-07T17:04:21+00:00\",\"dateModified\":\"2020-07-30T15:30:36+00:00\",\"description\":\"Learn about the security limitations of VPN and how secure DNS services can be one of the best ways to secure enterprise, large-scale tele-workforces.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg\",\"width\":600,\"height\":338},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/secure-dns-security-beyond-the-vpn\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure DNS: Security beyond the VPN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure DNS: Security beyond the VPN | Infoblox","description":"Learn about the security limitations of VPN and how secure DNS services can be one of the best ways to secure enterprise, large-scale tele-workforces.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/","og_locale":"en_US","og_type":"article","og_title":"Secure DNS: Security beyond the VPN","og_description":"Learn about the security limitations of VPN and how secure DNS services can be one of the best ways to secure enterprise, large-scale tele-workforces.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/","og_site_name":"Infoblox Blog","article_published_time":"2020-04-07T17:04:21+00:00","article_modified_time":"2020-07-30T15:30:36+00:00","og_image":[{"width":600,"height":338,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Secure DNS: Security beyond the VPN","datePublished":"2020-04-07T17:04:21+00:00","dateModified":"2020-07-30T15:30:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/"},"wordCount":507,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg","keywords":["BloxOne\u00ae","BloxOne\u00ae Threat Defense","Cybersecurity","Security","Work From Home"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/","url":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/","name":"Secure DNS: Security beyond the VPN | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg","datePublished":"2020-04-07T17:04:21+00:00","dateModified":"2020-07-30T15:30:36+00:00","description":"Learn about the security limitations of VPN and how secure DNS services can be one of the best ways to secure enterprise, large-scale tele-workforces.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/secure-dns-security-beyond-the-vpn-thumbnail-v2.jpg","width":600,"height":338},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/secure-dns-security-beyond-the-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Secure DNS: Security beyond the VPN"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5034"}],"version-history":[{"count":9,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5034\/revisions"}],"predecessor-version":[{"id":5458,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5034\/revisions\/5458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/5042"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}