{"id":720,"date":"2018-04-23T20:08:01","date_gmt":"2018-04-23T20:08:01","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=720"},"modified":"2020-05-06T10:27:07","modified_gmt":"2020-05-06T17:27:07","slug":"saas-dns-security-are-you-protected","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/","title":{"rendered":"SaaS DNS security: Are you protected?"},"content":{"rendered":"<p>Are SaaS security solutions truly the panacea they are publicized to be? The answer is, it depends on how the SaaS solution is architected. A majority of SaaS-only security solutions are \u201coverlay\u201d solutions that simply provide an additional layer of security on top of an enterprise\u2019s existing network and security infrastructure. These overlay solutions are easy for the vendor to develop, but difficult for the customer to combine with other existing security solutions and derive value from. In contrast, a hybrid approach to security is one that tightly integrates SaaS solutions with an enterprise\u2019s existing IT infrastructure and leverages SaaS capabilities to seamlessly extend and scale on-premise solution performance. With a hybrid solution, the vendor does the heavy lifting of seamless integration with existing infrastructure, thus providing a unified solution, which unlocks valuable context available from the on-premises infrastructure. Such context allows the hybrid solution to prioritize threats better. In addition, the unified solution enables sharing of data with broader security ecosystem for an efficient and optimized incident response.<\/p>\n<h1 id=\"toc-hId-474198284\">DNS as a Security Tool<\/h1>\n<p>As enterprises gear up to handle the barrage of increasingly targeted and sophisticated cyber attacks, security architects must take advantage of the visibility that each IT asset can provide. DNS is an excellent example of a scalable and pervasive network infrastructure protocol that offers unmatched visibility into network traffic patterns, malicious and otherwise. If used optimally, DNS can provide an affordable and scalable first line of defense for detection and mitigation of the vast majority of known threats. Behavioral analysis of DNS traffic can also serve as an \u201cearly warning system,\u201d flagging potential zero-day threats in the network.<\/p>\n<p>When it comes to DNS security, many organizations are interested in cloud-based SaaS-only solutions, which they think will be easier to implement and provide sufficient functionality to identify infected devices and protect against threats like malware and phishing attacks. SaaS for DNS security can be effective, but only when integrated with on-premise systems.<\/p>\n<h1 id=\"toc-hId-1361701965\">Overlay (SaaS-only) solution challenges<\/h1>\n<p>The way most SaaS-only DNS security solutions work is to enable businesses to forward their DNS traffic to the cloud, where DNS queries are processed and potential malicious activity is detected and flagged. In order to identify the infected end host, these solutions require the deployment of DNS forwarding proxies (running on virtual machines) deep inside the enterprise network or the use of endpoint agents. As enterprises move their workloads into private and public clouds, deploying and managing these proxies can become even more complicated.<\/p>\n<p>Most enterprise DNS servers support the ability to block access to domains via configuration of response policy zones. By directing all DNS traffic to the cloud, SaaS-only solutions fail to leverage these existing security capabilities, which allow an enterprise to block the most egregious threats at the very first DNS server that detects it.<\/p>\n<p>Further, because overlay solutions do not integrate with the incumbent enterprise DNS architecture, they leave enterprise administrators stuck with operating two separate and siloed management systems and having to manually correlate data between the two. Beyond the inefficiencies of managing two separate DNS systems, an even more significant drawback is that you sacrifice visibility and security context. Specifically, overlay solutions are unable to leverage the rich contextual data available in the enterprise DNS, DHCP, and IP address management systems (DDI). This context can help with prioritization of security threats, a key requirement for security analysts who are swamped with alerts they can\u2019t keep up with.<\/p>\n<h1 id=\"toc-hId--2045761650\">Why a hybrid approach for DNS security<\/h1>\n<p>To recap, a hybrid DNS security approach weaves security right into the network control fabric of the enterprise. Tight integration with the incumbent enterprise DNS, DHCP, and IPAM infrastructure simplifies deployment and management brings efficiency and scale and improves overall security efficacy and effectiveness.<\/p>\n<p>Hybrid solutions offer enterprises complete flexibility in terms of deployment options \u2013 the best combination of on-premise and SaaS. And regardless of the deployment model, enterprises get all the benefits of integration with their DDI infrastructure:<\/p>\n<ul>\n<li><strong>Reduces complexity<\/strong>: Hybrid solutions take away the hassle of deploying proxies throughout the network. The on-premise component of the solution can be configured to forward recursive DNS traffic to the DNS service in the cloud while preserving the ability to identify the end host associated with any security event detected in the cloud. This ability can be seamlessly extended to workloads running in private and public clouds as well.<\/li>\n<li><strong>Increases flexibility:<\/strong>\u00a0With a hybrid solution, customers may choose to leverage their on-premise DNS servers to block access to domains based on curated low false positive threat intelligence and leverage the cloud for a more comprehensive threat assessment based on a lot more threat data as well as big data analytics.<\/li>\n<li><strong>Improves visibility:<\/strong>\u00a0Hybrid solutions offer a single pane of glass for managing security across the enterprise DNS infrastructure.<\/li>\n<li><strong>Enables threat prioritization:<\/strong>\u00a0Rich network context data, e.g., where the device sits in the network, who is the user, how critical is the asset from a business standpoint, etc., that was locked up in network control protocols located on-premise can be made available in the security dashboards and used to intelligently prioritize threats for remediation.<\/li>\n<li><strong>Improves intelligence:\u00a0<\/strong>On-premise network and user context is automatically shared with the SaaS component of the solution, and security events detected in SaaS can be shared back with the security ecosystem on-premise, creating a closed intelligence loop across the enterprise. Indicators of compromise can be shared in real time with existing security infrastructure (on-premise or in the cloud) including endpoint security, NAC, vulnerability management, and SIEM solutions for an automated incident response such as quarantine, scan, or killing of malicious processes running on suspicious devices.<\/li>\n<\/ul>\n<h1 id=\"toc-hId--1158257969\">Infoblox ActiveTrust Suite<\/h1>\n<p>Although a few organizations are truly cloud-first, most enterprises maintain a hybrid environment and need a more flexible, comprehensive solution for DNS security. Infoblox ActiveTrust Suite is changing the model of how security is delivered. It is the industry\u2019s first and only DDI solution that provides a hybrid approach for security \u2013 on-premises and cloud-based security for protecting devices everywhere. L<a href=\"https:\/\/www.infoblox.com\/products\/activetrust-suite\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">earn about our ActiveTrust Suite<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are SaaS security solutions truly the panacea they are publicized to be? The answer is, it depends on how the SaaS solution is architected. A majority of SaaS-only security solutions are \u201coverlay\u201d solutions that simply provide an additional layer of security on top of an enterprise\u2019s existing network and security infrastructure. These overlay solutions are [&hellip;]<\/p>\n","protected":false},"author":229,"featured_media":2730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[15,40],"class_list":{"0":"post-720","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-security","9":"tag-threat-intelligence","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SaaS DNS security: Are you protected? - Infoblox Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SaaS DNS security: Are you protected?\" \/>\n<meta property=\"og:description\" content=\"Are SaaS security solutions truly the panacea they are publicized to be? The answer is, it depends on how the SaaS solution is architected. A majority of SaaS-only security solutions are \u201coverlay\u201d solutions that simply provide an additional layer of security on top of an enterprise\u2019s existing network and security infrastructure. These overlay solutions are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-23T20:08:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kanaiya Vasani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kanaiya Vasani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/\"},\"author\":{\"name\":\"Kanaiya Vasani\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/9942e593fefbad0c2fadc9228b26c71a\"},\"headline\":\"SaaS DNS security: Are you protected?\",\"datePublished\":\"2018-04-23T20:08:01+00:00\",\"dateModified\":\"2020-05-06T17:27:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/\"},\"wordCount\":1015,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"keywords\":[\"Security\",\"Threat Intelligence\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/\",\"name\":\"SaaS DNS security: Are you protected? - Infoblox Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"datePublished\":\"2018-04-23T20:08:01+00:00\",\"dateModified\":\"2020-05-06T17:27:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"Cable & Wireless Panama: Infoblox Helps Telecom Provider Protect From Attacks and Boost Uptime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/saas-dns-security-are-you-protected\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SaaS DNS security: Are you protected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/9942e593fefbad0c2fadc9228b26c71a\",\"name\":\"Kanaiya Vasani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/kanaiya-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/kanaiya-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/kanaiya-new-96x96.jpg\",\"caption\":\"Kanaiya Vasani\"},\"description\":\"Over the course of Kanaiya Vasani\u2019s career, he has held leadership roles in a broad array of corporate functions including strategy and corporate\\\/business development, product management and marketing, and general management and R&amp;D, in a variety of organizations ranging from early stage startups to large multi-billion dollar public companies. Presently he runs the Products and Corp Dev organization at Infoblox, driving its transition to SaaS and expansion into new adjacencies including security, analytics, and cloud. Executive Vice President, Products and Corporate Development at Infoblox.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/kanaiya-vasani\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SaaS DNS security: Are you protected? - Infoblox Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/","og_locale":"en_US","og_type":"article","og_title":"SaaS DNS security: Are you protected?","og_description":"Are SaaS security solutions truly the panacea they are publicized to be? The answer is, it depends on how the SaaS solution is architected. A majority of SaaS-only security solutions are \u201coverlay\u201d solutions that simply provide an additional layer of security on top of an enterprise\u2019s existing network and security infrastructure. These overlay solutions are [&hellip;]","og_url":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/","og_site_name":"Infoblox Blog","article_published_time":"2018-04-23T20:08:01+00:00","article_modified_time":"2020-05-06T17:27:07+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","type":"image\/jpeg"}],"author":"Kanaiya Vasani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kanaiya Vasani","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/"},"author":{"name":"Kanaiya Vasani","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/9942e593fefbad0c2fadc9228b26c71a"},"headline":"SaaS DNS security: Are you protected?","datePublished":"2018-04-23T20:08:01+00:00","dateModified":"2020-05-06T17:27:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/"},"wordCount":1015,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","keywords":["Security","Threat Intelligence"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/","url":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/","name":"SaaS DNS security: Are you protected? - Infoblox Blog","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","datePublished":"2018-04-23T20:08:01+00:00","dateModified":"2020-05-06T17:27:07+00:00","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","width":660,"height":454,"caption":"Cable & Wireless Panama: Infoblox Helps Telecom Provider Protect From Attacks and Boost Uptime"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/saas-dns-security-are-you-protected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"SaaS DNS security: Are you protected?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/9942e593fefbad0c2fadc9228b26c71a","name":"Kanaiya Vasani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/kanaiya-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/kanaiya-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/kanaiya-new-96x96.jpg","caption":"Kanaiya Vasani"},"description":"Over the course of Kanaiya Vasani\u2019s career, he has held leadership roles in a broad array of corporate functions including strategy and corporate\/business development, product management and marketing, and general management and R&amp;D, in a variety of organizations ranging from early stage startups to large multi-billion dollar public companies. Presently he runs the Products and Corp Dev organization at Infoblox, driving its transition to SaaS and expansion into new adjacencies including security, analytics, and cloud. Executive Vice President, Products and Corporate Development at Infoblox.","url":"https:\/\/www.infoblox.com\/blog\/author\/kanaiya-vasani\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/229"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=720"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/720\/revisions"}],"predecessor-version":[{"id":722,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/720\/revisions\/722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2730"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}