{"id":6037,"date":"2021-02-18T10:36:11","date_gmt":"2021-02-18T18:36:11","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6037"},"modified":"2021-02-18T10:36:49","modified_gmt":"2021-02-18T18:36:49","slug":"dns-still-remains-the-quintessential-security-piece","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/","title":{"rendered":"DNS Still Remains the Quintessential Security Piece!"},"content":{"rendered":"<p>During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). \u00a0With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.<\/p>\n<p>DNS attacks can get very sophisticated and attackers can cause serious damage to a firm\u2019s assets and reputation, especially with people resorting to working from home. In a study conducted by Cambridge University\u2019s Cybercrime Centre,\u00a0they found that the number of DDoS (a type of DNS based attack) went up sharply during lockdown and there was a remarkable increase in the number of new attackers conducting these attacks\u00b9. Businesses need to keep up with the advancement and take DNS security seriously while understanding the downside of not implementing it. Attackers are always in the lookout for open DNS servers which serve as a point of entry to an organization\u2019s data. With an ever-increasing exposure to attack surfaces, DNS offers the potential to understand and reduce the impact of an attack. Organizations at times find it difficult to track, manage and monitor all the devices in their network. These devices can act as a safe haven to enter an organization for further exploitation. IT teams need to continuously check for new devices added to the network and ensure they adhere to a firm\u2019s security standards.<\/p>\n<p>Once the network is set, security team needs to focus on monitoring the DNS for anomalies. DNS can act as a powerful tool to detect attacks offering the ability to detect malicious activities through sudden spikes in traffic. Most of the DNS systems provide reporting capabilities that enable companies to observe the network and application-level traffic changes. This in turn helps teams identify key traffic patterns and inconsistencies. DNS also has several protocols namely DoH, DoT and DNSSEC that can be leveraged to increase security. DNSSEC does not encrypt traffic but it enhances security by authenticating a connection. DoT and DoH on the other hand route traffic to ports that can carry encrypted traffic. All of these focus on solving the last mile problem and Infoblox supports them all. Details on Infoblox\u2019s DoH and DoT capabilities can be found in <a href=\"https:\/\/www.infoblox.com\/company\/news-events\/press-releases\/infoblox-announces-dot-doh-policies\/\">this press release<\/a>.<\/p>\n<p>The detection of threats can get better with new emerging technologies such as artificial intelligence and machine learning wherein the algorithms can be developed to facilitate early identification of abnormal traffic patterns. Early detection provides security teams with sufficient time to address and respond to these attacks.<\/p>\n<p>As the number of attacks on businesses increase, IT teams need to be more vigilant of the role DNS plays in securing the network. While the quantity of data sent out in each DNS packet is not large, it surely can suffice to extract and export sensitive information.<\/p>\n<p>Using appropriate technology can not only help in the early detection and mitigation of DNS based attacks, but also help organizations respond to these attacks and save them from reputation damage. Infoblox with its patented Grid technology strengthens organizations\u2019 DNS infrastructure by providing the ability to centrally manage and automate critical aspects of DNS. For more information, please contact us.<\/p>\n<p>\u00b9 <a href=\"https:\/\/www.businesswire.com\/news\/home\/20200916005132\/en\/DDoS-Attacks-Increase-by-151-in-First-Half-of-2020\">https:\/\/www.businesswire.com\/news\/home\/20200916005132\/en\/DDoS-Attacks-Increase-by-151-in-First-Half-of-2020<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). \u00a0With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based [&hellip;]<\/p>\n","protected":false},"author":353,"featured_media":5440,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[333,360],"class_list":{"0":"post-6037","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyberattack","9":"tag-dns-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS still remains the quintessential security piece!<\/title>\n<meta name=\"description\" content=\"DNS still remains the quintessential security piece! During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Still Remains the Quintessential Security Piece!\" \/>\n<meta property=\"og:description\" content=\"DNS still remains the quintessential security piece! During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-18T18:36:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-18T18:36:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-importance-of-diversity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Avani Patel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Avani Patel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/\"},\"author\":{\"name\":\"Avani Patel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/8d56f82403e0a56c9eb0a53dd7e7854a\"},\"headline\":\"DNS Still Remains the Quintessential Security Piece!\",\"datePublished\":\"2021-02-18T18:36:11+00:00\",\"dateModified\":\"2021-02-18T18:36:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-importance-of-diversity.jpg\",\"keywords\":[\"Cyberattack\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/\",\"name\":\"DNS still remains the quintessential security piece!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-importance-of-diversity.jpg\",\"datePublished\":\"2021-02-18T18:36:11+00:00\",\"dateModified\":\"2021-02-18T18:36:49+00:00\",\"description\":\"DNS still remains the quintessential security piece! During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-importance-of-diversity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-importance-of-diversity.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-still-remains-the-quintessential-security-piece\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Still Remains the Quintessential Security Piece!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/8d56f82403e0a56c9eb0a53dd7e7854a\",\"name\":\"Avani Patel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_353_1613671722-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_353_1613671722-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_353_1613671722-96x96.jpg\",\"caption\":\"Avani Patel\"},\"description\":\"Avani is a Product Manager leading the Competitive Intelligence Program for Infoblox. She is a seasoned strategic professional with deep analytical strengths. She is big picture-oriented and possesses skills in distilling down myriad sources of information, extracting key findings and providing internal customers with strategic recommendations. Avani has previously worked for FedEx, focusing on pricing strategy. She holds an MBA degree from University of Rochester, Simon Business School.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/avani-patel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS still remains the quintessential security piece!","description":"DNS still remains the quintessential security piece! During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/","og_locale":"en_US","og_type":"article","og_title":"DNS Still Remains the Quintessential Security Piece!","og_description":"DNS still remains the quintessential security piece! During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/","og_site_name":"Infoblox Blog","article_published_time":"2021-02-18T18:36:11+00:00","article_modified_time":"2021-02-18T18:36:49+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-importance-of-diversity.jpg","type":"image\/jpeg"}],"author":"Avani Patel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Avani Patel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/"},"author":{"name":"Avani Patel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/8d56f82403e0a56c9eb0a53dd7e7854a"},"headline":"DNS Still Remains the Quintessential Security Piece!","datePublished":"2021-02-18T18:36:11+00:00","dateModified":"2021-02-18T18:36:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/"},"wordCount":586,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-importance-of-diversity.jpg","keywords":["Cyberattack","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/","name":"DNS still remains the quintessential security piece!","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-importance-of-diversity.jpg","datePublished":"2021-02-18T18:36:11+00:00","dateModified":"2021-02-18T18:36:49+00:00","description":"DNS still remains the quintessential security piece! During the last decade, businesses have experienced a surge in DNS based attacks (attacks targeting availability of a network\u2019s DNS). With the sophistication and modernization of technologies over time, businesses have expanded their technological workspace thereby exposing the security landscape and making it more attractive to attackers. Even with an increasing number of DNS based attacks, organizations do not pay serious heed to organization\u2019s foundational DNS security and it has been found that IT teams often leave the DNS gateways unprotected.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-importance-of-diversity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-importance-of-diversity.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-still-remains-the-quintessential-security-piece\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS Still Remains the Quintessential Security Piece!"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/8d56f82403e0a56c9eb0a53dd7e7854a","name":"Avani Patel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_353_1613671722-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_353_1613671722-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_353_1613671722-96x96.jpg","caption":"Avani Patel"},"description":"Avani is a Product Manager leading the Competitive Intelligence Program for Infoblox. She is a seasoned strategic professional with deep analytical strengths. She is big picture-oriented and possesses skills in distilling down myriad sources of information, extracting key findings and providing internal customers with strategic recommendations. Avani has previously worked for FedEx, focusing on pricing strategy. She holds an MBA degree from University of Rochester, Simon Business School.","url":"https:\/\/www.infoblox.com\/blog\/author\/avani-patel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/353"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6037"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6037\/revisions"}],"predecessor-version":[{"id":6040,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6037\/revisions\/6040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/5440"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}