{"id":5232,"date":"2020-05-28T09:19:20","date_gmt":"2020-05-28T16:19:20","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5232"},"modified":"2023-09-07T10:06:26","modified_gmt":"2023-09-07T17:06:26","slug":"soar-solutions-powered-by-infoblox-partner-integrations","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/","title":{"rendered":"SOAR Solutions Powered by Infoblox Partner Integrations"},"content":{"rendered":"<p>Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.<\/p>\n<ul>\n<li><strong>Too Many Products:\u00a0<\/strong>Large enterprises have deployed 30+ security products on an average, and they have staff or expertise to manage only 12 of them.<\/li>\n<li><strong>Alert Fatigue:<\/strong> 92% of companies get more than 500 alerts per day. A single security analyst can handle only 10 alerts per day.<\/li>\n<li><strong>Cybersecurity Skills Shortage:<\/strong> The global IT security skills shortage has surpassed 4 million, according to ISC<sup>2<\/sup>. Only 4% of the alerts get investigated &#8211; there are not enough humans to keep up with the security alerts.<\/li>\n<\/ul>\n<h3>Need for SOAR to Speed Up Incident Response<\/h3>\n<p>IT security organizations are looking for ways to improve threat detection efficiencies and speed up incident response by replacing repetitive manual tasks with automated workflows, so a limited set of security analysts can focus on the tougher security problems that truly require their deeper analysis and triage skills.<\/p>\n<p>Gartner defined the market segment of security technologies\/solutions that enable IT security to reduce the incident response time by taking mitigation actions using automated workflows as <a href=\"https:\/\/www.gartner.com\/en\/documents\/3942064\/market-guide-for-security-orchestration-automation-and-r\">Security Orchestration Automation and Response (SOAR<\/a>). Such solutions can be achieved by integrating security products that detect security incidents with products that can respond to these incidents using automated scripts\/APIs.<\/p>\n<p>SOAR solutions represent a substantial leap forward in cybersecurity, by automating the mundane mitigation tasks to reduce the meantime to respond to an incident. It includes a combination of technologies that provide the following types of functions as shown in Figure 1 below.<\/p>\n<ul>\n<li><strong>Security Orchestration and Automation (SOA):<\/strong> technologies that handle the orchestration and automation of workflows using scripted playbooks, processes, policy execution and enables reporting.<\/li>\n<li><strong>Security Incident Response (SIR):<\/strong> enables organizations to apply some form of enforcement to mitigate the threat. Some may lockout a user whose credentials have been compromised or quarantine an infected laptop that is beaconing to a C&amp;C server.<\/li>\n<li><strong>Threat Intelligence Platforms (TIP):<\/strong> take one or more threat feeds and curate them by analyzing further looking for unusual patterns to mine valuable data that can be used to respond to a threat.<\/li>\n<\/ul>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5241 size-full\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Gartner-SOAR-Solutions.png\" alt=\"\" width=\"1028\" height=\"936\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Gartner-SOAR-Solutions.png 1028w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Gartner-SOAR-Solutions-300x273.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Gartner-SOAR-Solutions-1024x932.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Gartner-SOAR-Solutions-768x699.png 768w\" sizes=\"auto, (max-width: 1028px) 100vw, 1028px\" \/><\/h3>\n<h5 style=\"text-align: center;\">Figure 1: Gartner SOAR Solution Types<\/h5>\n<p>&nbsp;<\/p>\n<h3>Infoblox Contextual Intelligence<\/h3>\n<p>To fully deliver the promise of SOAR, you need contextual data and precise visibility into the network activity associated with the rogue user\/system\/device. This can be obtained from the deep contextual intelligence gathered by the network infrastructure services \u2013 Domain Name Service (DNS), Domain Host Control Protocol (DHCP), and IP Address Management (IPAM) in the Infoblox DDI platform \u2013 collectively referred to as \u2018DDI\u2019.<\/p>\n<p>As shown in Figure 2, Infoblox can provide SOAR solutions with crucial device and security event information automatically and in real-time. On receiving data on IP addresses, network devices, and malicious events from Infoblox, any SOAR platform can use that data to block or unblock domains, check information on IP, host, network, and domains and enrich other security tools in the stack with that information.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5235 size-full\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Infoblox-Data-Integration-with-SOAR.png\" alt=\"\" width=\"986\" height=\"770\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Data-Integration-with-SOAR.png 986w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Data-Integration-with-SOAR-300x234.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Data-Integration-with-SOAR-768x600.png 768w\" sizes=\"auto, (max-width: 986px) 100vw, 986px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 2: Infoblox Data Integration with SOAR<\/p>\n<p>While the Infoblox BloxOne\u2122 Threat Defense security solution enables threat intelligence sharing throughout the security stack, and delivers many unique automation capabilities, it integrates with partner solutions, including SOAR solutions, with the understanding that our security stacks must better coordinate to address the realities of modern security requirements.<\/p>\n<h3>Infoblox Partner Integrations Powering SOAR Solutions<\/h3>\n<p>Infoblox Ecosystem Exchange is a set of partner integrations that enable organizations to eliminate silos, optimize SOAR solutions, and improve the ROI of their cybersecurity ecosystem of multi-vendor products.<\/p>\n<p>Infoblox offers more than 30 API-level partner integrations to power SOAR solutions as shown in Figure 3 below, enabling IT security and network teams to reap the following benefits:<\/p>\n<ul>\n<li>Reduce cost associated with manual intervention and human errors<\/li>\n<li>Decrease the time to remediate by two-thirds with automated api-based response<\/li>\n<li>Make threat analysts three times more productive by providing contextual intelligence<\/li>\n<li>Get better ROI on existing security and network investments<\/li>\n<li>Optimize SOAR solutions by automatically sharing contextual threat information<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5236 size-full\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Infoblox-Ecosystem-Exchange.png\" alt=\"\" width=\"1430\" height=\"705\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Ecosystem-Exchange.png 1430w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Ecosystem-Exchange-300x148.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Ecosystem-Exchange-1024x505.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Infoblox-Ecosystem-Exchange-768x379.png 768w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 3: Infoblox Ecosystem Exchange: Set of Partner Integrations Powering SOAR<\/p>\n<p>To better illustrate the extent of integrations Infoblox enables, let\u2019s take a look at the top 5 partner solution areas that enable IT security organizations to better mitigate advanced threats and improve incident response leveraging the ecosystem of security products that you may have already deployed in your enterprise.<\/p>\n<p>&nbsp;<\/p>\n<table width=\"666\">\n<tbody>\n<tr>\n<td width=\"198\"><strong>Ecosystem Technology<\/strong><\/td>\n<td width=\"258\"><strong>Integration Overview<\/strong><\/td>\n<td width=\"210\"><strong>Benefits<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Next Generation Firewall<\/strong><\/p>\n<p>(Palo Alto Networks)<\/td>\n<td width=\"258\">\u00b7 Infoblox sends IP address, domain-name, URL of command &amp; control server to NG Firewall.<\/p>\n<p>\u00b7 NG Firewall blocks network traffic malicious C&amp;C server to stop data exfiltration<\/td>\n<td width=\"210\">\u00b7 Provides vital context for threat prioritization<\/p>\n<p>\u00b7 Speeds up incident response by automatically blocking malicious traffic<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>NG Endpoint Protection<\/strong><\/p>\n<p>(Carbon Black, McAfee ePO)<\/td>\n<td width=\"258\">\n<p style=\"text-align: left;\">\u00b7 Infoblox detects DNS based malware communication and informs NG EPP technology<\/p>\n<p>\u00b7 NG EPP can kill rogue process and quarantine the endpoint<\/td>\n<td width=\"210\">\u00b7 Prevents DNS based endpoint communication to malicious domains<\/p>\n<p>\u00b7 Automatically responds to endpoint threats by reducing dwell time<\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Web Gateway<\/strong><\/p>\n<p>(McAfee)<\/td>\n<td width=\"258\">\u00b7 BloxOne<sup>TM<\/sup> Threat Defense blocks DNS based data exfiltration, as well as DNS requests to malicious domains, before forwarding traffic to McAfee Gateway<\/p>\n<p>\u00b7 Web Gateway scans web traffic for further inspection with URL filtering, SSL and more<\/td>\n<td width=\"210\">\u00b7 Provides broader protection by unifying domain blocking and application (http) security<\/p>\n<p>\u00b7 Speeds detection of malicious traffic originating from infected endpoints regardless of location<\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Threat Intelligence Platform (TIP)<\/strong><\/p>\n<p>(ThreatConnect, Cisco Threat Intelligence Director, Checkpoint ThreatCloud)<\/td>\n<td width=\"258\">\u00b7 Infoblox Threat Intelligence Data Exchange (TIDE) sends information on malicious host names, IP address and URLs to the TIP platform<\/p>\n<p>\u00b7 TIP acts a repository of threat intelligence that other security products can query and take action<\/td>\n<td width=\"210\">\u00b7 Curated information in TIP reduces false positive<\/p>\n<p>\u00b7 Improve situational awareness of network and security organizations<\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Security Information and Event Management (SIEM)<\/strong><\/p>\n<p>(LogRythm, Splunk McAfee, IBM QRadar, Micro Focus ArcSight)<\/td>\n<td width=\"258\">\u00b7 Infoblox sends context intel \u2013 IP address of infected device, suspicious DNS requests\/ responses to SIEM<\/p>\n<p>\u00b7 SIEM uses this information to do threat analysis and take action<\/td>\n<td width=\"210\">\u00b7 Provides visibility into suspicious device activity<\/p>\n<p>\u00b7 Supplies context for more accurate prioritization<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Learn more about the rest of 30 or more Infoblox partner integrations by reading the <a href=\"https:\/\/www.infoblox.com\/resources\/solution-note\/infoblox-as-part-of-the-ecosystem\" target=\"_blank\" rel=\"noopener\">solution note on Infoblox Ecosystem Exchange<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts. Too Many Products:\u00a0Large enterprises [&hellip;]<\/p>\n","protected":false},"author":333,"featured_media":4249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15,77,40],"class_list":{"0":"post-5232","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"tag-soar","10":"tag-threat-intelligence","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SOAR Solutions Powered by Infoblox Partner Integrations<\/title>\n<meta name=\"description\" content=\"Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOAR Solutions Powered by Infoblox Partner Integrations\" \/>\n<meta property=\"og:description\" content=\"Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-28T16:19:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-07T17:06:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"824\" \/>\n\t<meta property=\"og:image:height\" content=\"583\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Narayan Makaram\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Narayan Makaram\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/\"},\"author\":{\"name\":\"Narayan Makaram\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e590a2634abc746b9ccc3c0439784d14\"},\"headline\":\"SOAR Solutions Powered by Infoblox Partner Integrations\",\"datePublished\":\"2020-05-28T16:19:20+00:00\",\"dateModified\":\"2023-09-07T17:06:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/\"},\"wordCount\":1045,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"keywords\":[\"Security\",\"SOAR\",\"Threat Intelligence\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/\",\"name\":\"SOAR Solutions Powered by Infoblox Partner Integrations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"datePublished\":\"2020-05-28T16:19:20+00:00\",\"dateModified\":\"2023-09-07T17:06:26+00:00\",\"description\":\"Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"width\":824,\"height\":583,\"caption\":\"Projecting The Future\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/soar-solutions-powered-by-infoblox-partner-integrations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SOAR Solutions Powered by Infoblox Partner Integrations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e590a2634abc746b9ccc3c0439784d14\",\"name\":\"Narayan Makaram\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_333_1586469017-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_333_1586469017-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_333_1586469017-96x96.jpg\",\"caption\":\"Narayan Makaram\"},\"description\":\"Narayan Makaram, CEO, Cybernetix Security, has over 20 years of experience, leading product marketing, product management and strategic alliances at several companies including Arctic Wolf Networks, Imperva, Tenable, FireEye, ArcSight and Hewlett-Packard. His expertise are in the areas of Managed Detection and Response (MDR), Network Security, Application Security, Security Information and Event Management(SIEM) and Data Protection.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/narayan-makaram\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOAR Solutions Powered by Infoblox Partner Integrations","description":"Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/","og_locale":"en_US","og_type":"article","og_title":"SOAR Solutions Powered by Infoblox Partner Integrations","og_description":"Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/","og_site_name":"Infoblox Blog","article_published_time":"2020-05-28T16:19:20+00:00","article_modified_time":"2023-09-07T17:06:26+00:00","og_image":[{"width":824,"height":583,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","type":"image\/jpeg"}],"author":"Narayan Makaram","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Narayan Makaram","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/"},"author":{"name":"Narayan Makaram","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e590a2634abc746b9ccc3c0439784d14"},"headline":"SOAR Solutions Powered by Infoblox Partner Integrations","datePublished":"2020-05-28T16:19:20+00:00","dateModified":"2023-09-07T17:06:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/"},"wordCount":1045,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","keywords":["Security","SOAR","Threat Intelligence"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/","url":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/","name":"SOAR Solutions Powered by Infoblox Partner Integrations","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","datePublished":"2020-05-28T16:19:20+00:00","dateModified":"2023-09-07T17:06:26+00:00","description":"Several operational challenges plague the IT security teams in companies today. To protect themselves from an ever-growing number of cyber-attacks, companies have deployed too many security products, which are generating too many alerts, and they do not have enough IT staff with cybersecurity skills to triage and respond to these alerts.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","width":824,"height":583,"caption":"Projecting The Future"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/soar-solutions-powered-by-infoblox-partner-integrations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"SOAR Solutions Powered by Infoblox Partner Integrations"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e590a2634abc746b9ccc3c0439784d14","name":"Narayan Makaram","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_333_1586469017-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_333_1586469017-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_333_1586469017-96x96.jpg","caption":"Narayan Makaram"},"description":"Narayan Makaram, CEO, Cybernetix Security, has over 20 years of experience, leading product marketing, product management and strategic alliances at several companies including Arctic Wolf Networks, Imperva, Tenable, FireEye, ArcSight and Hewlett-Packard. His expertise are in the areas of Managed Detection and Response (MDR), Network Security, Application Security, Security Information and Event Management(SIEM) and Data Protection.","url":"https:\/\/www.infoblox.com\/blog\/author\/narayan-makaram\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/333"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5232"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5232\/revisions"}],"predecessor-version":[{"id":8870,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5232\/revisions\/8870"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4249"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}