{"id":771,"date":"2018-05-02T21:48:06","date_gmt":"2018-05-02T21:48:06","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=771"},"modified":"2020-05-06T10:27:06","modified_gmt":"2020-05-06T17:27:06","slug":"activetrust-anywhere-protecting-networks-and-devices-on-and-off","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/","title":{"rendered":"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises"},"content":{"rendered":"<p>The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices. In an ideal situation, a company could implement enterprise security policies and content categorization that always apply \u2013 independent of user actions. That\u2019s what we do at Infoblox. Our approach is to protect devices anywhere \u2013 on premises, roaming, or in remote or branch offices \u2013 without requiring any user authentication or action.<\/p>\n<h2 id=\"toc-hId--1333254541\">Traditional Security Approaches Don\u2019t Work Anymore<\/h2>\n<p>So, what\u2019s going on that\u2019s allowing more malware to get through enterprise defenses? Cybercriminals are always evolving their methods to get around traditional security measures. For example, enterprise security architectures are typically standardized around web proxies and next-generation firewalls. Attackers have worked around these traditional defenses, using DNS to sneak in. In fact, over 91% of malware attacks use DNS (per\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/mkto.cisco.com\/rs\/564-whv-323\/images\/cisco-asr-2016.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco 2016 Annual Security Report<\/a>) in the kill chain.<\/p>\n<p>Although DNS was used initially as the control plane for Command and Control (C&amp;C) servers, more and more hackers are using it as a data plane for payload acquisition or data exfiltration. They also are using DNS as a way to evade classical detection with methods like fast flux or DGA (domain generation algorithms).<\/p>\n<p>The implication is that infected end hosts may never issue a web request to the web proxy, which makes proxies useless in protecting the end host. In particular, these approaches have been very effective in\u00a0<a href=\"\/security\/how-to-stop-udpos-malware-from-stealing-your-pos-data-using-dns\/\" target=\"_blank\" rel=\"noopener noreferrer\">targeting point of sales systems<\/a>\u00a0(PoS) to load malware and exfiltrate data.<\/p>\n<p>Standard solutions are reactive and deliver protection very late in the chain. To deal with increasingly sophisticated malware, it is much more effective for enterprises to adopt a proactive approach and mitigate attacks at the very first step in the kill chain \u2013 DNS.<\/p>\n<h2 id=\"toc-hId--445750860\">DNS at the Center of the Storm<\/h2>\n<p>A lot of organizations mistakenly believe that they are protected \u201cby design\u201d with internal DNS roots (as I explain in a\u00a0<a href=\"\/community\/how-core-network-services-are-adapting-to-cloud-saas-world\/\" target=\"_blank\" rel=\"noopener noreferrer\">previous blog<\/a>) with SaaS, DNS relying only on reputational protection or because the normal process for an end host is to use a web proxy.<\/p>\n<p>Unfortunately, this is not the case, as most major threats use DNS. Infoblox provides a useful tool,\u00a0<a href=\"https:\/\/dex.infoblox.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Data Exfiltration Demo Portal<\/a>, to help you evaluate if your organization might be vulnerable to attack, including the following:<\/p>\n<ul>\n<li><strong>Data infiltration:<\/strong>\u00a0DNS is used as an open transport layer. A public authoritative DNS server stores malware payload encoded on TXT records. The malware then acquires and combines the data from several DNS responses.<\/li>\n<li><strong>Data exfiltration:<\/strong>\u00a0DNS is used as an open transport layer. The infected end host will facilitate data exfiltration two ways; 1) as a prefix in queries; e.g., encoded-base32-data.exfiltration-domain.com; and 2) in a TXT record txt-data; e.g., data1.exfiltration-domain.com TXT base64-encoded-data. A public authoritative DNS server then logs all the queries and rebuilds the original data.<\/li>\n<li><strong>Domain generation algorithm (DGA):<\/strong>\u00a0The malware locates its C2 server relying on domain names instead of IPs. The malware uses a built-in algorithm to determine which domain name should be used. Using such algorithmically generated domains allows the malware to evade firewalls and IPS IP blocking. More information on DGA is\u00a0<a href=\"\/company\/community-webinar-archive-using-machine-learning-in-detecting\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/li>\n<li><strong>Fast flux:<\/strong>\u00a0Malware communication relies on domain names; TTL for A records returned is very low, allowing for the IP used to change quickly. It allows attackers to evade firewalls and IPS IP blocking. To learn more about detecting new threats that don\u2019t have any history, check out this\u00a0<a href=\"\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">archived FB live session<\/a>\u00a0with two Infoblox experts.<\/li>\n<\/ul>\n<p>We have also observed increasing usage of:<\/p>\n<ul>\n<li><strong>NOD lookalike:\u00a0<\/strong>It is Newly Observed Domains that \u201cLookalike\u201d other domains. \u00a0\u00a0These\u00a0are like \u201cbankofamerial.<a href=\"http:\/\/bancofamerial.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">com<\/a>\u201d or \u201c<a href=\"http:\/\/goggle.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">goggle.com<\/a>.\u201d.\u00a0 These can be phishing sites or hijacking attempts. It can be based on user mistake or visual confusion on a hyperlink as Krebs on security detail it well\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2018\/03\/look-alike-domains-and-visual-confusion\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a><\/li>\n<\/ul>\n<h2 id=\"toc-hId-441752821\">Infoblox Protects Anywhere<\/h2>\n<p>Infoblox\u2019s approach is to protect devices no matter where they are being used \u2013 on premises, roaming, or in remote or branch offices without requiring any user authentication or action.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-775\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-protects-anywhere.png\" alt=\"Infoblox Protects Anywhere\" width=\"439\" height=\"379\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-protects-anywhere.png 439w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-protects-anywhere-300x259.png 300w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><\/p>\n<p>To deliver protection anywhere, the Infoblox ActiveTrust solution can be deployed in multiple ways, including on premises and off premises. On-premises, you can use Infoblox NIOS appliances to protect and identify the infected end host. Also, a complementary container or VM (DNS forwarding proxy) can be deployed to forward internal DNS queries to your existing internal DNS architecture and all other DNS queries to Infoblox ActiveTrust Cloud.<\/p>\n<p>Off-premises, you can leverage ActiveTrust Endpoint to protect devices. A Windows and MacOS client agent can be deployed using SCCM or McAfee ePO.<\/p>\n<h2 id=\"toc-hId-1329256502\">Enforce Custom Security and Content Policy<\/h2>\n<p>ActiveTrust leverages threat intelligence and advanced machine learning that can be configured to protect your organization, enforcing its custom policy of log, block or redirect. The solution provides:<\/p>\n<ul>\n<li>Reputation feeds that include domain names and IP by category of malware, such as MalwareDownload, MalwareC2, ExploitKit, Phishing, CompromisedHost, Bot and APT<\/li>\n<li>Machine learning, using neuronal networks and advanced AI, to detect and mitigate data infiltration, data exfiltration, domain generation algorithms, fast flux and NOD lookalike<\/li>\n<li>Partnership with leading content categorization vendors, such as McAfee, to categorize content and enforce policies at the DNS level<\/li>\n<\/ul>\n<p>The image shown below illustrates content categorization capabilities available in ActiveTrust.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-772\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-activetrust-content-categorization.png\" alt=\"Infoblox ActiveTrust Content Categorization\" width=\"600\" height=\"247\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-activetrust-content-categorization.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-activetrust-content-categorization-300x124.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2 id=\"toc-hId--2078207113\">Gain End-to-End Visibility<\/h2>\n<p>For your on-premises network infrastructure, visibility is provided up to the end host IP, even with complex, multilayer DNS architecture. And for devices that are off premises, ActiveTrust Endpoint sends device name and MAC address with each DNS request. In addition, the solution\u2019s Cloud Service Portal provides a single pane of glass for all security events.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-773\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-cloud-service-portal.png\" alt=\"Infoblox Cloud Service Portal\" width=\"600\" height=\"383\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-cloud-service-portal.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-cloud-service-portal-300x192.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2 id=\"toc-hId--303199751\">Leverage Integration and Automation<\/h2>\n<p>Because Active Trust traces the end host IP or device name and MAC address on and off premises, response action can be taken by third-party security solutions, including:<\/p>\n<ul>\n<li><strong>SIEM:<\/strong>\u00a0Fully qualified events are shared with SIEM along with threat intelligence and network intelligence data (IPAM metadata) allowing response teams to identify, prioritize and organize the response to infection campaign (see the\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Best-Practices\/Splunk-application-for-ActiveTrust-Cloud\/ba-p\/12170\" target=\"_blank\" rel=\"noopener noreferrer\">Splunk application example<\/a>)<\/li>\n<li><strong>Vulnerability assessment:<\/strong>\u00a0A device audit can be triggered on demand when a security event is detected by ActiveTrust<\/li>\n<li><strong>Network access control (NAC):<\/strong>\u00a0Infected devices can be automatically put into a quarantine network until IT teams can perform manual remediation<\/li>\n<li><strong>Next-gen endpoint:<\/strong>\u00a0End host IP and (malicious) requested fully qualified domain name (FQDN) are sent to the next-gen endpoint solution, which identifies which process has triggered this request and can terminate it locally and quarantine it on all devices within the organization<\/li>\n<\/ul>\n<p>The image below illustrates the breadth and coverage of Infoblox Partner Ecosystem.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-774\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-partner-ecosystem.png\" alt=\"Infoblox Partner Ecosystem\" width=\"599\" height=\"291\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-partner-ecosystem.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-partner-ecosystem-300x146.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<h2 id=\"toc-hId-584303930\">A Comprehensive Approach to DNS Security<\/h2>\n<p>Traditional approaches to security are no longer effective, requiring companies to rethink their enterprise security architectures. One very effective place to start is with a DNS security solution that covers you both on-prem and off. Infoblox makes it easy with Active Trust, which integrates with your existing security solutions and shares threat intelligence \u2013 strengthening your overall security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices. In an ideal situation, a company could implement enterprise security policies and content categorization that always apply \u2013 independent of [&hellip;]<\/p>\n","protected":false},"author":239,"featured_media":673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-771","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises<\/title>\n<meta name=\"description\" content=\"The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises\" \/>\n<meta property=\"og:description\" content=\"The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-02T21:48:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicholas Jeanselme\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicholas Jeanselme\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/\"},\"author\":{\"name\":\"Nicholas Jeanselme\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/fb776bb0169613b9649f13fa4622ff57\"},\"headline\":\"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises\",\"datePublished\":\"2018-05-02T21:48:06+00:00\",\"dateModified\":\"2020-05-06T17:27:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/\"},\"wordCount\":1183,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-1.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/\",\"name\":\"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-1.jpg\",\"datePublished\":\"2018-05-02T21:48:06+00:00\",\"dateModified\":\"2020-05-06T17:27:06+00:00\",\"description\":\"The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-1.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/fb776bb0169613b9649f13fa4622ff57\",\"name\":\"Nicholas Jeanselme\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_239_1571768593-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_239_1571768593-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_239_1571768593-96x96.jpg\",\"caption\":\"Nicholas Jeanselme\"},\"description\":\"Nicolas Jeanselme is a DNS security &amp; data analytics expert. He has joint Infoblox in 2011 and is Principal Systems Engineer in charge of Defense &amp; Industry major accounts in France. He uses his extensive security market knowledge to help his customers to get the best of their solutions via advanced integrations.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/nicholas-jeanselme\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises","description":"The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/","og_locale":"en_US","og_type":"article","og_title":"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises","og_description":"The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/","og_site_name":"Infoblox Blog","article_published_time":"2018-05-02T21:48:06+00:00","article_modified_time":"2020-05-06T17:27:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-1.jpg","type":"image\/jpeg"}],"author":"Nicholas Jeanselme","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nicholas Jeanselme","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/"},"author":{"name":"Nicholas Jeanselme","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/fb776bb0169613b9649f13fa4622ff57"},"headline":"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises","datePublished":"2018-05-02T21:48:06+00:00","dateModified":"2020-05-06T17:27:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/"},"wordCount":1183,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-1.jpg","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/","url":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/","name":"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-1.jpg","datePublished":"2018-05-02T21:48:06+00:00","dateModified":"2020-05-06T17:27:06+00:00","description":"The ubiquity \u2013 and convenience \u2013 of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-1.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/activetrust-anywhere-protecting-networks-and-devices-on-and-off\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"ActiveTrust Anywhere: Protecting Networks and Devices On and Off Premises"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/fb776bb0169613b9649f13fa4622ff57","name":"Nicholas Jeanselme","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_239_1571768593-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_239_1571768593-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_239_1571768593-96x96.jpg","caption":"Nicholas Jeanselme"},"description":"Nicolas Jeanselme is a DNS security &amp; data analytics expert. He has joint Infoblox in 2011 and is Principal Systems Engineer in charge of Defense &amp; Industry major accounts in France. He uses his extensive security market knowledge to help his customers to get the best of their solutions via advanced integrations.","url":"https:\/\/www.infoblox.com\/blog\/author\/nicholas-jeanselme\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/239"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=771"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/771\/revisions"}],"predecessor-version":[{"id":3657,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/771\/revisions\/3657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/673"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}