{"id":7623,"date":"2022-04-01T12:05:33","date_gmt":"2022-04-01T19:05:33","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7623"},"modified":"2022-04-01T12:05:33","modified_gmt":"2022-04-01T19:05:33","slug":"lets-improve-cybersecurity-asset-management-capabilities","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/","title":{"rendered":"Let\u2019s Improve Cybersecurity Asset Management Capabilities"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What are the possible gaps that you need to identify and address?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It all starts with what\u2019s on your network!!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Industry frameworks like NIST or CIS, heavily emphasize on identifying what\u2019s on your network and asset management, including current inventory of an organization\u2019s enterprise and software assets. The foundational key to an effective cybersecurity strategy is to make IT asset management a priority. Most of the organizations, IT teams and cybersecurity teams, struggle to get an understanding of what is on their network (assets), what is on it (what type of data, access, and its criticality), who has it (the owner and users), and where it is located (geographically and logically). With increased use of multi-cloud environments (in addition to on-premises), and often having two or three cloud providers, telemetry and visibility becomes even more critical.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The modern hybrid architecture has increased the attack surface, and to be able to reduce the risk of users being compromised, start identifying physical and virtual assets and what they are doing. Having the ability to automatically capture details of every device that has connected to the network when it asks for an IP address via DHCP provides great insight into what type of device it is, and what OS it is running. Together with IPAM (IP Address Management) data, you can also know who the user is that is logged on (via AD integration) and which access point or switch port did the device connect to. IT and security teams benefit by identifying assets, tracking and updating it\u2019s network location whenever there are changes. Organizations can automate and have a single source of asset information using the IP Address Management (IPAM) Database.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An IPAM database collectively improves the whole asset management and Incident response process.\u00a0 Having visibility into assets connected virtually and physically can assist the IT and security teams to easily lookup asset information related to a security alert within the IPAM database, and quickly identify the compromised device, with the help of user and network location. Another way to have an efficient asset management capability is to streamline security monitoring, threat intelligence, and vulnerability management capabilities with the IPAM database and other\u00a0 existing asset discovery capabilities. By integrating asset management system(s) to the organization&#8217;s security ecosystem (SIEM\/SOAR, vulnerability management, ITSM) security teams can\u00a0 automate their response to new and\/or compromised assets in the environment resulting in reduced Incident response time by 2\/3rds.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7624 \" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/asset-management-1.png\" alt=\"\" width=\"803\" height=\"533\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management-1.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management-1-300x199.png 300w\" sizes=\"auto, (max-width: 803px) 100vw, 803px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Prioritizing asset management security capability reduces the unknown risks or uncertainty relating to rogue devices\/virtual machines and provides a significant return on investment in cybersecurity investigation. With the explosive growth of SaaS and cloud solutions, having centralized visibility of IP infrastructure streamlines workflows, reduces issues caused by unauthorized changes, automates discovery of assets, and improves reporting for IT and security teams.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0 What are the possible gaps that you need to identify and address?\u00a0 It all starts with what\u2019s [&hellip;]<\/p>\n","protected":false},"author":348,"featured_media":7625,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[479,625],"class_list":{"0":"post-7623","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyber-security","9":"tag-asset-management","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Let\u2019s Improve Cybersecurity Asset Management Capabilities<\/title>\n<meta name=\"description\" content=\"Let\u2019s Improve Cybersecurity Asset Management Capabilities. When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Let\u2019s Improve Cybersecurity Asset Management Capabilities\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s Improve Cybersecurity Asset Management Capabilities. When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-01T19:05:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"326\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pallavi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pallavi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/\"},\"author\":{\"name\":\"Pallavi Singh\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb0e7070ac45e19413b08d8713273194\"},\"headline\":\"Let\u2019s Improve Cybersecurity Asset Management Capabilities\",\"datePublished\":\"2022-04-01T19:05:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/asset-management.png\",\"keywords\":[\"Cyber security\",\"asset management\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/\",\"name\":\"Let\u2019s Improve Cybersecurity Asset Management Capabilities\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/asset-management.png\",\"datePublished\":\"2022-04-01T19:05:33+00:00\",\"description\":\"Let\u2019s Improve Cybersecurity Asset Management Capabilities. When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/asset-management.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/asset-management.png\",\"width\":512,\"height\":326},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/lets-improve-cybersecurity-asset-management-capabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Let\u2019s Improve Cybersecurity Asset Management Capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb0e7070ac45e19413b08d8713273194\",\"name\":\"Pallavi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"caption\":\"Pallavi Singh\"},\"description\":\"Pallavi is an Associate Product Marketing Manager, Cyber Security at Infoblox. She\u2019s a cyber security enthusiast with a strong focus on cyber security management, risk assessments, and culture and awareness. She is currently managing the Technology Alliance Program (Security and Networking) content creation and GTM activities at Infoblox. Prior to joining Infoblox, Pallavi was a Cyber Security Consultant at Deloitte Canada. She has done her Masters in Telecommunication and Information Security from University of Victoria, BC and had an opportunity to Intern at Nokia Threat Intelligence Lab as a Malware Research Assistant.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/pallavi-singh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Let\u2019s Improve Cybersecurity Asset Management Capabilities","description":"Let\u2019s Improve Cybersecurity Asset Management Capabilities. When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/","og_locale":"en_US","og_type":"article","og_title":"Let\u2019s Improve Cybersecurity Asset Management Capabilities","og_description":"Let\u2019s Improve Cybersecurity Asset Management Capabilities. When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0","og_url":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/","og_site_name":"Infoblox Blog","article_published_time":"2022-04-01T19:05:33+00:00","og_image":[{"width":512,"height":326,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management.png","type":"image\/png"}],"author":"Pallavi Singh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pallavi Singh","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/"},"author":{"name":"Pallavi Singh","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cb0e7070ac45e19413b08d8713273194"},"headline":"Let\u2019s Improve Cybersecurity Asset Management Capabilities","datePublished":"2022-04-01T19:05:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/"},"wordCount":517,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management.png","keywords":["Cyber security","asset management"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/","url":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/","name":"Let\u2019s Improve Cybersecurity Asset Management Capabilities","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management.png","datePublished":"2022-04-01T19:05:33+00:00","description":"Let\u2019s Improve Cybersecurity Asset Management Capabilities. When you as an organization assess your security controls and map your security characteristics to guidance and best practices, an important factor to think about is how to quickly identify anomalous behavior before it snowballs into something big.\u00a0","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/asset-management.png","width":512,"height":326},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/lets-improve-cybersecurity-asset-management-capabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Let\u2019s Improve Cybersecurity Asset Management Capabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cb0e7070ac45e19413b08d8713273194","name":"Pallavi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","caption":"Pallavi Singh"},"description":"Pallavi is an Associate Product Marketing Manager, Cyber Security at Infoblox. She\u2019s a cyber security enthusiast with a strong focus on cyber security management, risk assessments, and culture and awareness. She is currently managing the Technology Alliance Program (Security and Networking) content creation and GTM activities at Infoblox. Prior to joining Infoblox, Pallavi was a Cyber Security Consultant at Deloitte Canada. She has done her Masters in Telecommunication and Information Security from University of Victoria, BC and had an opportunity to Intern at Nokia Threat Intelligence Lab as a Malware Research Assistant.","url":"https:\/\/www.infoblox.com\/blog\/author\/pallavi-singh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/348"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7623"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7623\/revisions"}],"predecessor-version":[{"id":7628,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7623\/revisions\/7628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7625"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}