{"id":6168,"date":"2021-03-25T10:46:04","date_gmt":"2021-03-25T17:46:04","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6168"},"modified":"2021-06-08T11:35:58","modified_gmt":"2021-06-08T18:35:58","slug":"osterman-research-survey-reveals-key-areas-for-endpoint-security-investment","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/","title":{"rendered":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment"},"content":{"rendered":"<h3><strong>Current measures won\u2019t work for the long-term<\/strong><\/h3>\n<p>A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response.\u00a0 The results were often surprising.<\/p>\n<p>First, it was great to see that security leaders around the world proved worthy of their pay as COVID-19 emerged, forcing an almost over-night shift to a massive \u2018work-from-home\u2019 posture.\u00a0 Respondents overwhelming reported that, while some productivity and IT functions suffered, they were able to maintain a significant level of security despite facing new challenges with near-zero warning.\u00a0 Almost half of respondents reported that the effectiveness of their endpoint security changes delivered a significant if not major improvement in security, to the extent that many believe their remote workers are more security today than they were pre-pandemic.<\/p>\n<p>It was interesting that, while most survey results were reasonably consistent globally, there were some regional differences regarding the early impact the pandemic had on key areas of their organizations.\u00a0 Here is one of the charts from the report showing this regional disparity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6169\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Osterman-1.png\" alt=\"\" width=\"624\" height=\"438\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Osterman-1.png 624w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Osterman-1-300x211.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p>To minimize risks overall, security leaders relied on well-known technologies even thought they were never designed, deployed, or configured for the scale of the situation, such as VPN.\u00a0 Many respondents reported performance, stability and other core challenges that are driving them to consider other options.\u00a0 As a result, security personnel found themselves spending more time simply maintaining these systems.\u00a0 Again, VPN showed most prominently as creating a \u2018hassle\u2019 for users as well those responsible for setup and maintenance (32% of respondents).<\/p>\n<p>So, despite having performed a miracle securing their organization under unprecedented situation, respondents have determined that the current measures are not sustainable for the long-term and are looking at alternatives.<\/p>\n<p>Respondents considered 18 different areas of technology they felt could help them reduce their reliance on VPN, identifying which ones they used today as well as those they are looking to acquire, deploy, or expand to support the work-from-anywhere reality they have accepted as the future for their organization.\u00a0 Osterman noted in this section of the report that:<\/p>\n<p style=\"text-align: center;\"><strong>\u201cAmong the solutions that will be acquired or deployed by the fourth quarter of 2021, the leading solutions are Cloud Application Security Brokers (32 percent), DNS security (26 percent), and next-generation firewalls (22 percent).\u201d<\/strong><\/p>\n<p>I was obviously please that, among these three, the only one that also appeared in the top three on the other lists was DNS Security.\u00a0 Regardless of their location, endpoints require DNS to connect to any application, service, or data source, and malware needs DNS at multiple stages of an attack.\u00a0 With the proper tools, DNS can provide the visibility necessary to block attacks other defenses do not see, improve breach detection, and drive faster and more effective incident response.<\/p>\n<p>Now no one expects a single solution to solve the problem.\u00a0 Each organization needs to review this entire list and evaluate their current investment and use of the technologies noted by their peers in this survey. For example, while IAM didn\u2019t make the top 3, it was a close #4 to NGFW, and it is clear that stolen credentials remains one of the most common early stages of an attack making that a critical technology adoption.\u00a0 But DNS security is likely in the top three because it is an established, foundational technology.\u00a0 Tapping it for a greater role in security is a low-risk investment with high-potential.<\/p>\n<p>If you would like to know more about how others are looking at a more sustainable endpoint security strategy, you can access <a href=\"https:\/\/info.infoblox.com\/resources-whitepapers-osterman-report-organizations-face-securing-work-from-anywhere-transformation\">the full survey report<\/a>, or <a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/global-quest-for-sustainable-work-from-anywhere-security\/\">watch the webinar<\/a> with Michael Osterman, founder and president of Osterman Research.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Current measures won\u2019t work for the long-term A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response.\u00a0 The results were often surprising. First, it was great to see that security leaders [&hellip;]<\/p>\n","protected":false},"author":334,"featured_media":4921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[463,255,464],"class_list":{"0":"post-6168","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-endpoint-security","9":"tag-covid-19","10":"tag-remote-workers","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Osterman Research Survey Reveals Key Areas For Endpoint Security Investment<\/title>\n<meta name=\"description\" content=\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment. A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response. The results were often surprising.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment\" \/>\n<meta property=\"og:description\" content=\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment. A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response. The results were often surprising.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-25T17:46:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-08T18:35:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Hansmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hansmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/\"},\"author\":{\"name\":\"Bob Hansmann\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\"},\"headline\":\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment\",\"datePublished\":\"2021-03-25T17:46:04+00:00\",\"dateModified\":\"2021-06-08T18:35:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/\"},\"wordCount\":618,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/photo-WFH.jpg\",\"keywords\":[\"Endpoint security\",\"Covid-19\",\"Remote workers\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/\",\"name\":\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/photo-WFH.jpg\",\"datePublished\":\"2021-03-25T17:46:04+00:00\",\"dateModified\":\"2021-06-08T18:35:58+00:00\",\"description\":\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment. A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response. The results were often surprising.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/photo-WFH.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/photo-WFH.jpg\",\"width\":1200,\"height\":788},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\",\"name\":\"Bob Hansmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"caption\":\"Bob Hansmann\"},\"description\":\"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-hansmann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment","description":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment. A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response. The results were often surprising.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/","og_locale":"en_US","og_type":"article","og_title":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment","og_description":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment. A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response. The results were often surprising.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/","og_site_name":"Infoblox Blog","article_published_time":"2021-03-25T17:46:04+00:00","article_modified_time":"2021-06-08T18:35:58+00:00","og_image":[{"width":1200,"height":788,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg","type":"image\/jpeg"}],"author":"Bob Hansmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Hansmann","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/"},"author":{"name":"Bob Hansmann","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8"},"headline":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment","datePublished":"2021-03-25T17:46:04+00:00","dateModified":"2021-06-08T18:35:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/"},"wordCount":618,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg","keywords":["Endpoint security","Covid-19","Remote workers"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/","url":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/","name":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg","datePublished":"2021-03-25T17:46:04+00:00","dateModified":"2021-06-08T18:35:58+00:00","description":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment. A global survey by Osterman Research, conducted almost a year into the pandemic, asked security leaders about their long-term plans for endpoint security in the wake of the lessons learned from their initial response. The results were often surprising.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg","width":1200,"height":788},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/osterman-research-survey-reveals-key-areas-for-endpoint-security-investment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Osterman Research Survey Reveals Key Areas For Endpoint Security Investment"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8","name":"Bob Hansmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","caption":"Bob Hansmann"},"description":"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-hansmann\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/334"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6168"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6168\/revisions"}],"predecessor-version":[{"id":6172,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6168\/revisions\/6172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4921"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}