{"id":8038,"date":"2022-10-04T14:44:33","date_gmt":"2022-10-04T21:44:33","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8038"},"modified":"2022-10-04T14:44:33","modified_gmt":"2022-10-04T21:44:33","slug":"ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/","title":{"rendered":"IPAM Powers Internal Threat Intelligence &#8211; Using IP Address Management for Telemetry"},"content":{"rendered":"<blockquote style=\"text-align: center;\"><p>\u201cToo often security departments and network departments ignore \u2026 easily accessible INTERNAL INTELLIGENCE.\u201d<\/p><\/blockquote>\n<h3>Introduction<\/h3>\n<p>This year was the first time I\u2019ve been back to the RSA Conference since 2018. I had the opportunity to experience the post COVID revival of the Security community. It was great to see old friends and meet some new ones.<\/p>\n<p>So, there I was at RSAC on booth duty, and I happened to get into a conversation with members of a SOC team for a large brokerage firm out of Chicago. The team\u2019s lead engineer had stumbled into the booth as he was shaking off some cobwebs from the party the night before and he asked me a few questions about what we do at Infoblox and how we impact security. I explained our DNS security solutions to him and how we can provide all kinds of metadata from DNS, DHCP and other information we collect from our IP Address Management (IPAM) system. While the DNS security was interesting to him, the IPAM information that we can make available almost knocked him over. He said he would be back, and he was going to get his SOC manager.<\/p>\n<p>Sure, enough an hour and a half later he shows up with his SOC manager and, while he knew about our DNS visibility capabilities, our DNS zero-day capabilities and our DNS-centric intelligence feeds, what totally caught his attention was the IPAM information.<\/p>\n<blockquote style=\"text-align: center;\"><p>\u201cThe point is to inform you that IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams.\u201d<\/p><\/blockquote>\n<h3>The Security Dance<\/h3>\n<p>This reaction was not a surprise to me as I have spent a large part of my career at Infoblox sharing and evangelizing the benefits and value a well-maintained <strong><a href=\"https:\/\/www.infoblox.com\/glossary\/ipam-ip-address-management\/\" target=\"_blank\" rel=\"noopener\">IPAM<\/a><\/strong> system can deliver to security teams. As a security professional, I\u2019ve spent many days chasing down bad actors and IP anomalies on my customers\u2019 networks. I know all too well the dance we do bouncing from DNS systems to DHCP logs to <strong><a href=\"https:\/\/www.infoblox.com\/glossary\/active-directory\/\" target=\"_blank\" rel=\"noopener\">Active Directory<\/a><\/strong> to network switches or maybe VMware or perhaps the wireless controller. This was back when most enterprises did not have a security team, or the security team and the network team were the same people. Now we have the added barriers of having to depend on the Windows Team or the Network Team to gather the information for the security teams. If we\u2019re lucky, we have good communications channels, and relations between these teams are favorable and we can get valuable timely data. In most environments this is not the case.<\/p>\n<h3>IPAM \u2013 Telemetry\/Targeting System<\/h3>\n<p>So back to the point of my story. I explained to the SOC manager that we had the ability to gather the Active Directory user ID and, if using Microsoft DNS\/DHCP, all DNS and DHCP information from the Microsoft servers. This process is done with a service account\u2013no agent\u2014as well as login authentication time and device. Then we discover all layer 2 and layer 3 information from your infrastructure\u2013routers, switches, firewalls, wireless controllers, etc. We map all the MAC and port information to the IP address. Finally, the information from virtual systems, such as public and private cloud information and SDN\/SDWAN information, is gathered via API. Performing discovery this way gives the security professionals a single place to go for up-to-the-hour telemetry on the internal network.<\/p>\n<p>Think of it as a targeting system or the smarts of a smart bomb or like the HIMARS the Ukrainians are using. IPAM systems can provide the Who, What, Where, When for any system on your network. Who authenticated to what system and when and on what port.<\/p>\n<p>That\u2019s just the beginning. This information is all in one place on the network and accessible through RESTful API. Additionally, there are triggerable automated capabilities that enable events to set off follow-on actions. For instance, when a new device gets discovered for the first time, the system can launch a Vulnerability Assessment tool, or CMDB information to be sent or even a NAC system to isolate a port based on a security event. Anyway, the point is not to sell you on our IPAM system, the point is to inform you that IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams.<\/p>\n<h3>The AHA Moment<\/h3>\n<p>So, we\u2019re standing at RSAC and the SOC manager looks at me and says, \u201cso your IPAM system is full of all the data my team needs to identify the who, what, where and when and is a treasure trove of information.\u201d (Honest, I can\u2019t even make that up).<\/p>\n<p>So that\u2019s the point of this article! In the DNS Security business, the use of properly curated reputational intelligence feeds and Newly Observed Domain feeds (we\u2019ll talk about these later) for <strong><a href=\"https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-solutions\/dns-security-solutions-response-policy-zones-rpz\/\" target=\"_blank\" rel=\"noopener\">Response Policy Zones (RPZs)<\/a><\/strong> are needed and very relevant. However, too often security departments and network departments ignore the more relevant and easily accessible INTERNAL INTELLIGENCE. It\u2019s not enough to stop the access to the bad sites, whether it\u2019s a bad actor or a disgruntled employee or an infected system; identifying the source and containing it is just as important. A well maintained IPAM system is a required foundation for identification and quick containment.<\/p>\n<p>Remember that Security is simple, so don\u2019t complicate it! Thanks for reading! ADR<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cToo often security departments and network departments ignore \u2026 easily accessible INTERNAL INTELLIGENCE.\u201d Introduction This year was the first time I\u2019ve been back to the RSA Conference since 2018. I had the opportunity to experience the post COVID revival of the Security community. It was great to see old friends and meet some new ones. [&hellip;]<\/p>\n","protected":false},"author":149,"featured_media":2626,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[40,28,479,766,360],"class_list":{"0":"post-8038","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-threat-intelligence","9":"tag-ddi","10":"tag-cyber-security","11":"tag-telemetry","12":"tag-dns-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Using IPAM Systems can Benefit Cybersecurity | Infoblox<\/title>\n<meta name=\"description\" content=\"IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams. Learn more about what the data found in these tools can provide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPAM Powers Internal Threat Intelligence - Using IP Address Management for Telemetry\" \/>\n<meta property=\"og:description\" content=\"IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams. Learn more about what the data found in these tools can provide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T21:44:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex del Rio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex del Rio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/\"},\"author\":{\"name\":\"Alex del Rio\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bc8e8b7b294434cc9e66450e81b22b4a\"},\"headline\":\"IPAM Powers Internal Threat Intelligence &#8211; Using IP Address Management for Telemetry\",\"datePublished\":\"2022-10-04T21:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/\"},\"wordCount\":909,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-4.png\",\"keywords\":[\"Threat Intelligence\",\"DDI\",\"Cyber security\",\"Telemetry\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/\",\"name\":\"How Using IPAM Systems can Benefit Cybersecurity | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-4.png\",\"datePublished\":\"2022-10-04T21:44:33+00:00\",\"description\":\"IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams. Learn more about what the data found in these tools can provide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-4.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-4.png\",\"width\":660,\"height\":454,\"caption\":\"Using the Infoblox IPAM Driver for Docker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPAM Powers Internal Threat Intelligence &#8211; Using IP Address Management for Telemetry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bc8e8b7b294434cc9e66450e81b22b4a\",\"name\":\"Alex del Rio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_149_1571767254-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_149_1571767254-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_149_1571767254-96x96.jpg\",\"caption\":\"Alex del Rio\"},\"description\":\"Alex del Rio is currently a Principal Solution Architect at Infoblox. Previously he has held positions at Landmark Education, Focused Networks, and Network Vigilance. Alex holds a Bachelor of Business Administration, Information Systems from the University of Houston.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/alex-del-rio\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Using IPAM Systems can Benefit Cybersecurity | Infoblox","description":"IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams. Learn more about what the data found in these tools can provide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/","og_locale":"en_US","og_type":"article","og_title":"IPAM Powers Internal Threat Intelligence - Using IP Address Management for Telemetry","og_description":"IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams. Learn more about what the data found in these tools can provide.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/","og_site_name":"Infoblox Blog","article_published_time":"2022-10-04T21:44:33+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-4.png","type":"image\/png"}],"author":"Alex del Rio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex del Rio","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/"},"author":{"name":"Alex del Rio","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bc8e8b7b294434cc9e66450e81b22b4a"},"headline":"IPAM Powers Internal Threat Intelligence &#8211; Using IP Address Management for Telemetry","datePublished":"2022-10-04T21:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/"},"wordCount":909,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-4.png","keywords":["Threat Intelligence","DDI","Cyber security","Telemetry","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/","url":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/","name":"How Using IPAM Systems can Benefit Cybersecurity | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-4.png","datePublished":"2022-10-04T21:44:33+00:00","description":"IPAM systems, when properly managed and deployed, are a powerful tool for your security and network teams. Learn more about what the data found in these tools can provide.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-4.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-4.png","width":660,"height":454,"caption":"Using the Infoblox IPAM Driver for Docker"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/ipam-powers-internal-threat-intelligence-using-ip-address-management-for-telemetry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"IPAM Powers Internal Threat Intelligence &#8211; Using IP Address Management for Telemetry"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bc8e8b7b294434cc9e66450e81b22b4a","name":"Alex del Rio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_149_1571767254-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_149_1571767254-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_149_1571767254-96x96.jpg","caption":"Alex del Rio"},"description":"Alex del Rio is currently a Principal Solution Architect at Infoblox. Previously he has held positions at Landmark Education, Focused Networks, and Network Vigilance. Alex holds a Bachelor of Business Administration, Information Systems from the University of Houston.","url":"https:\/\/www.infoblox.com\/blog\/author\/alex-del-rio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8038"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8038\/revisions"}],"predecessor-version":[{"id":8040,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8038\/revisions\/8040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2626"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}