{"id":5095,"date":"2020-04-16T09:29:22","date_gmt":"2020-04-16T16:29:22","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5095"},"modified":"2020-05-06T10:26:49","modified_gmt":"2020-05-06T17:26:49","slug":"cybersecuritys-cloud-y-future","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/","title":{"rendered":"Cybersecurity\u2019s \u201cCloud\u201d-y future"},"content":{"rendered":"<p>The world is in its second month of \u201csocial distancing\u201d as we try to halt the spread of the novel coronavirus, and it\u2019s no longer a global experiment in working from home\u2014it\u2019s our new reality.<\/p>\n<p>We know that the \u201cnormal\u201d world that we return to will be dramatically different from the one we left. But the question on everyone\u2019s mind right now is: what exactly will be different?<\/p>\n<p>Last week, I read an <a href=\"https:\/\/www.wsj.com\/articles\/coronavirus-sets-up-accelerated-push-to-cloud-for-cybersecurity-industry-11586282401\"><strong>article<\/strong><\/a> in the <em>Wall Street Journal<\/em> that tried to forecast some of the changes that this pandemic is accelerating in the world of cybersecurity. In brief: it\u2019s going to be cloudy.<\/p>\n<p>\u201cThe pivot to working from home highlights the benefits of cloud-based services that can quickly scale up defenses around decentralized employees,\u201d they wrote.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5099 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cybersecurity-cloud-y-future-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-1024x672.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-300x197.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-768x504.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The overnight shift to near universal WFH status has challenged even the largest organizations. Everything from network infrastructure, to the devices that we use for work, to our assurances that users and corporate data remained safe and secure, has had to be re-thought on the fly.<\/p>\n<p>Cybersecurity in particular quickly rose to the top of everyone\u2019s list of concerns as bad actors took advantage of fears of COVID-19 for <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-073a\"><strong>phishing campaigns<\/strong><\/a> and other cyberattacks. Many turned to VPNs in response\u2014establishing private connections between users and the corporate network to encrypt and protect sensitive data.<\/p>\n<p>But, as we\u2019ve noted before, VPNs are only a <a href=\"https:\/\/blogs.infoblox.com\/security\/secure-dns-security-beyond-the-vpn\/\"><strong>partial solution<\/strong><\/a>. VPNs can only provide security when they are used to connect directly to a company\u2019s internal network.<\/p>\n<p>These days, more and more companies are using cloud-based applications like Office365, Google Cloud, and SFDC to get work done from home. And since many users are accessing these applications via the wider internet\u2014and not through a VPN connected to the corporate network\u2014they remain vulnerable to these cyber threats. Furthermore, VPNs rely on existing on-premises security infrastructure, which can be difficult to scale up and may not work as well with large numbers of remote workers.<\/p>\n<p>As the <em>Wall Street Journal<\/em> article indicates, and we at Infoblox believe, \u201cshort-term spending to keep workforces up and running will likely veer toward the cloud as the economy recovers and executives plan for a more remote-friendly future.\u201d<\/p>\n<p>Cloud-based security services make it easy to scale and add new users and devices, and aren\u2019t reliant on physical infrastructure to keep users safe. In fact, they can often be deployed without any new physical infrastructure at all.<\/p>\n<p>Since some 90% of malware uses DNS in some way, using a DNS security solution that can detect malware and other cyber threats is one of the best and most cost-effective ways that companies can secure a large and distributed workforce.<\/p>\n<p>At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><strong>BloxOne\u2122 Threat Defense<\/strong><\/a>, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.<\/p>\n<p>Read this\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/securing-remote-workers-in-the-age-of-teleworking\"><strong>whitepaper<\/strong><\/a><strong>\u00a0<\/strong>to learn more about how you can secure your teleworking employees. And sign up for a free trial of BloxOne Threat Defense\u00a0<a href=\"https:\/\/info.infoblox.com\/resources-evaluations-bloxone-threat-defense.html\"><strong>here<\/strong><\/a><strong>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The world is in its second month of \u201csocial distancing\u201d as we try to halt the spread of the novel coronavirus, and it\u2019s no longer a global experiment in working from home\u2014it\u2019s our new reality. We know that the \u201cnormal\u201d world that we return to will be dramatically different from the one we left. But [&hellip;]<\/p>\n","protected":false},"author":229,"featured_media":5098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[153,228,189,15,248],"class_list":{"0":"post-5095","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone","9":"tag-bloxone-threat-defense","10":"tag-cybersecurity","11":"tag-security","12":"tag-work-from-home","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity\u2019s \u201cCloud\u201d-y future | Infoblox<\/title>\n<meta name=\"description\" content=\"At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like BloxOne\u2122 Threat Defense, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\u2019s \u201cCloud\u201d-y future\" \/>\n<meta property=\"og:description\" content=\"At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like BloxOne\u2122 Threat Defense, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-16T16:29:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-tile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kanaiya Vasani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kanaiya Vasani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/\"},\"author\":{\"name\":\"Kanaiya Vasani\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/9942e593fefbad0c2fadc9228b26c71a\"},\"headline\":\"Cybersecurity\u2019s \u201cCloud\u201d-y future\",\"datePublished\":\"2020-04-16T16:29:22+00:00\",\"dateModified\":\"2020-05-06T17:26:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/\"},\"wordCount\":525,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-cloud-y-future-tile.jpg\",\"keywords\":[\"BloxOne\u00ae\",\"BloxOne\u00ae Threat Defense\",\"Cybersecurity\",\"Security\",\"Work From Home\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/\",\"name\":\"Cybersecurity\u2019s \u201cCloud\u201d-y future | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-cloud-y-future-tile.jpg\",\"datePublished\":\"2020-04-16T16:29:22+00:00\",\"dateModified\":\"2020-05-06T17:26:49+00:00\",\"description\":\"At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like BloxOne\u2122 Threat Defense, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-cloud-y-future-tile.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-cloud-y-future-tile.jpg\",\"width\":725,\"height\":483},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecuritys-cloud-y-future\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\u2019s \u201cCloud\u201d-y future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/9942e593fefbad0c2fadc9228b26c71a\",\"name\":\"Kanaiya Vasani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/kanaiya-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/kanaiya-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/kanaiya-new-96x96.jpg\",\"caption\":\"Kanaiya Vasani\"},\"description\":\"Over the course of Kanaiya Vasani\u2019s career, he has held leadership roles in a broad array of corporate functions including strategy and corporate\\\/business development, product management and marketing, and general management and R&amp;D, in a variety of organizations ranging from early stage startups to large multi-billion dollar public companies. Presently he runs the Products and Corp Dev organization at Infoblox, driving its transition to SaaS and expansion into new adjacencies including security, analytics, and cloud. Executive Vice President, Products and Corporate Development at Infoblox.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/kanaiya-vasani\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity\u2019s \u201cCloud\u201d-y future | Infoblox","description":"At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like BloxOne\u2122 Threat Defense, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity\u2019s \u201cCloud\u201d-y future","og_description":"At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like BloxOne\u2122 Threat Defense, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/","og_site_name":"Infoblox Blog","article_published_time":"2020-04-16T16:29:22+00:00","article_modified_time":"2020-05-06T17:26:49+00:00","og_image":[{"width":725,"height":483,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-tile.jpg","type":"image\/jpeg"}],"author":"Kanaiya Vasani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kanaiya Vasani","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/"},"author":{"name":"Kanaiya Vasani","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/9942e593fefbad0c2fadc9228b26c71a"},"headline":"Cybersecurity\u2019s \u201cCloud\u201d-y future","datePublished":"2020-04-16T16:29:22+00:00","dateModified":"2020-05-06T17:26:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/"},"wordCount":525,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-tile.jpg","keywords":["BloxOne\u00ae","BloxOne\u00ae Threat Defense","Cybersecurity","Security","Work From Home"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/","url":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/","name":"Cybersecurity\u2019s \u201cCloud\u201d-y future | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-tile.jpg","datePublished":"2020-04-16T16:29:22+00:00","dateModified":"2020-05-06T17:26:49+00:00","description":"At Infoblox, we recommend that organizations secure their employees and enterprise assets with cloud-based DNS security solutions like BloxOne\u2122 Threat Defense, that can provide a ubiquitous layer of security for teleworking employees, no matter where they set up their remote offices.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-tile.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-cloud-y-future-tile.jpg","width":725,"height":483},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecuritys-cloud-y-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity\u2019s \u201cCloud\u201d-y future"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/9942e593fefbad0c2fadc9228b26c71a","name":"Kanaiya Vasani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/kanaiya-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/kanaiya-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/kanaiya-new-96x96.jpg","caption":"Kanaiya Vasani"},"description":"Over the course of Kanaiya Vasani\u2019s career, he has held leadership roles in a broad array of corporate functions including strategy and corporate\/business development, product management and marketing, and general management and R&amp;D, in a variety of organizations ranging from early stage startups to large multi-billion dollar public companies. Presently he runs the Products and Corp Dev organization at Infoblox, driving its transition to SaaS and expansion into new adjacencies including security, analytics, and cloud. Executive Vice President, Products and Corporate Development at Infoblox.","url":"https:\/\/www.infoblox.com\/blog\/author\/kanaiya-vasani\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/229"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5095"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5095\/revisions"}],"predecessor-version":[{"id":5125,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5095\/revisions\/5125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/5098"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}