{"id":8565,"date":"2023-03-10T14:31:08","date_gmt":"2023-03-10T22:31:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8565"},"modified":"2023-04-26T11:06:24","modified_gmt":"2023-04-26T18:06:24","slug":"increase-visibility-and-control-with-bloxone-application-discovery","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/","title":{"rendered":"Increase Visibility and Control with BloxOne\u2122 Application Discovery"},"content":{"rendered":"<p>Network security teams know that getting visibility into the activity of your organization\u2019s devices can be a monumental challenge. The growing influence of bring your own software, or BYOS, can make things even worse. BYOS can bring a lot of concerns to security teams, particularly Shadow IT, Insider Threats, and maintaining Compliance.<\/p>\n<p>Here are some basic explanations of what these challenges are:<\/p>\n<ul>\n<li>Shadow IT is when a user installs and uses their own software or cloud application without ITs knowledge or approval. These apps may or may not be secure, or even permitted by corporate policy.<\/li>\n<li>Insider Threats, where users exfiltrate data from your organization by using their personal cloud storage account, or via other means. This type of action may be benign, or worst case, malicious.<\/li>\n<li>Compliance, where some governing bodies have regulations that may require monitoring and tracking application use, or an organization may need to restrict certain applications to avoid going afoul of certain regulations. If an organization fails to comply with compliance mandates they may lose the ability to do business with certain entities\/regions.<\/li>\n<\/ul>\n<p>What are some ways of gaining insight into application usage, and solving these concerns? Sure, you could block what your users have access to, but sometimes that just isn\u2019t possible. For example, a business partner might require the usage of a specific cloud storage platform, or web conferencing software. Thankfully, Infoblox\u00ae has released a new feature called Application Discovery in BloxOne\u2122 Threat Defense\u00ae that can help.<\/p>\n<p>As you may know, a key strength of BloxOne Threat Defense is that it can leverage existing DNS infrastructure to gain insight into user and device activity. Application Discovery leverages this unique position to discover what applications are in use in your organization. Sally is using a Cloud storage platform that puts your organization at risk? You can see that! Drew is using a VPN that prevents you from seeing their internet traffic? You can see that! Best of all, using it is as easy as logging in to the Infoblox Cloud Services Portal if you have the BloxOne Threat Defense Advanced license.<\/p>\n<p>As noted before, it can be extremely difficult to simply \u2018block\u2019 every application that might pose a risk. So the primary benefit of this feature is the visibility it gives you to understand what applications are in use, how often, and by whom. In many cases, this tool helps reveal applications that are truly necessary for conducting business even if it is just a cloud file sharing site that is required for only one specific partner. IT can work with users to officially recognize (and secure) some applications, and other users may simply need to be educated on the availability and use of already approved applications to change their behavior. However, when harsher methods are called for, Application Discovery can be used to identify applications as \u2018approved\u2019 or \u2018unapproved\u2019, and provides options to allow, alert, log or block access as necessary.<\/p>\n<p>To access Application Discovery, log in to the CSP, and navigate to Reports \u2192 Application Discovery.<br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-1.png\" \/><\/p>\n<p>In the Application Discovery interface we can view a variety of tables containing the following information: top applications, categories of applications used, top applications that are needing review, top devices that are using unapproved applications, and top unapproved applications. Here and on the Applications page, highlighting an application will show more information about it. Also, clicking any hyperlinked text will take us to the Applications tab with a filter that matches the hyperlink that was clicked.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-2.png\" \/><\/p>\n<p>On the Applications tab we can drill down into the data that was summarized on the Summary tab. On this page we can filter based on the status of the application, the application category, and manufacturer of the application. For each individual application we can view its name, category, amount of requests made, status, devices that have accessed it, and the manufacturer.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-3.png\" \/><\/p>\n<p>By clicking on the hamburger icon of any application we can choose to assign it as Approved, or Unapproved. Note that this action alone does not designate whether or not a device can access this application, but it helps us filter on the summary page. This information can prove to be invaluable for security teams in helping them in their investigation and response activities, reaching compliance, and monitoring both Shadow IT and insider threats.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-4.png\" \/><\/p>\n<p>Finally, the Devices tab allows us to see a breakdown of each device\u2019s application usage.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-5.png\" \/><\/p>\n<p>So let\u2019s say you\u2019d like to block all unapproved applications, or maybe log all email usage. Well, application filters can help accomplish that. Navigate to Policies \u2192 Security Policies \u2192 Filters (tab).<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-6.png\" \/><\/p>\n<p>On this page we can see a couple predefined Application filters: All Approved Applications and All Unapproved Applications. As you\u2019d guess, these filters are populated with the approved and unapproved applications from BloxOne\u2019s Application Discovery.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-7.png\" \/><\/p>\n<p>You can even create your own filters if desired. This is easily done by clicking Create Filter, then selecting Create App Filter in the drop-down<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-8.png\" \/><\/p>\n<p>In the Create Application Filter panel you create a filter with any of the predetermined application types.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-9.png\" \/><\/p>\n<p>Adding an application filter to a security policy is similar to adding a custom list, or a feed to a policy. In the Policy Rules tab of any policy Application filters can be added. In the screenshot you can see that I added the automatically generated \u2018All Unapproved Applications\u2019 list, and set it to block with a redirect (and logging).<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/increase-visibility-and-control-with-bloxone-application-discovery-10.png\" \/><\/p>\n<p>With BloxOne\u2019s Application Discovery you can easily enhance your security toolkit. Application Discovery provides IT with tools to quickly filter activity in reports to get useful insights and make informed policy decisions about applications to allow, block, or to simply monitor. By leveraging this tool you can better protect against Shadow IT, Insider Threats (intentional and accidental), and prove your organization\u2019s compliance. If you\u2019d like to know more about Application Discovery, check out the <a href=\"https:\/\/www.infoblox.com\/resources\/solution-note\/application-discovery\" target=\"_blank\" rel=\"noopener\">Application Discovery feature solution note<\/a>, this short video on: <a href=\"https:\/\/www.youtube.com\/watch?v=Ohg1TblE_fU\" target=\"_blank\" rel=\"noopener\">https:\/\/www.youtube.com\/watch?v=Ohg1TblE_fU<\/a>, or review the Application Discovery documentation at <a href=\"http:\/\/docs.infoblox.com\" target=\"_blank\" rel=\"noopener\">docs.infoblox.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network security teams know that getting visibility into the activity of your organization\u2019s devices can be a monumental challenge. The growing influence of bring your own software, or BYOS, can make things even worse. BYOS can bring a lot of concerns to security teams, particularly Shadow IT, Insider Threats, and maintaining Compliance. Here are some [&hellip;]<\/p>\n","protected":false},"author":350,"featured_media":8464,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[228,164,233,576,850,153,361],"class_list":{"0":"post-8565","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone-threat-defense","9":"tag-saas","10":"tag-shadow-it","11":"tag-compliance","12":"tag-insider-threats","13":"tag-bloxone","14":"tag-network-security","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gain Visibility into Your Organization\u2019s Devices with Application Discovery in BloxOne Threat Defense | Infoblox<\/title>\n<meta name=\"description\" content=\"Network security teams face significant challenges in getting visibility into their organization\u2019s device activity, particularly with the growing use of BYOS. BloxOne Threat Defense\u2019s Application Discovery feature provides insights into application usage and solves concerns around Shadow IT, Insider Threats, and Compliance. Learn how to leverage this unique tool to protect your organization better.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increase Visibility and Control with BloxOne\u2122 Application Discovery\" \/>\n<meta property=\"og:description\" content=\"Network security teams face significant challenges in getting visibility into their organization\u2019s device activity, particularly with the growing use of BYOS. BloxOne Threat Defense\u2019s Application Discovery feature provides insights into application usage and solves concerns around Shadow IT, Insider Threats, and Compliance. Learn how to leverage this unique tool to protect your organization better.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-10T22:31:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-26T18:06:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/cti-image-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Zenone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Zenone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/\"},\"author\":{\"name\":\"David Zenone\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/44f8c830b167b6fd384677b115cf9ec7\"},\"headline\":\"Increase Visibility and Control with BloxOne\u2122 Application Discovery\",\"datePublished\":\"2023-03-10T22:31:08+00:00\",\"dateModified\":\"2023-04-26T18:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/\"},\"wordCount\":1018,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-02.jpg\",\"keywords\":[\"BloxOne\u00ae Threat Defense\",\"SaaS\",\"Shadow IT\",\"compliance\",\"Insider Threats\",\"BloxOne\u00ae\",\"Network Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/\",\"name\":\"Gain Visibility into Your Organization\u2019s Devices with Application Discovery in BloxOne Threat Defense | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-02.jpg\",\"datePublished\":\"2023-03-10T22:31:08+00:00\",\"dateModified\":\"2023-04-26T18:06:24+00:00\",\"description\":\"Network security teams face significant challenges in getting visibility into their organization\u2019s device activity, particularly with the growing use of BYOS. BloxOne Threat Defense\u2019s Application Discovery feature provides insights into application usage and solves concerns around Shadow IT, Insider Threats, and Compliance. Learn how to leverage this unique tool to protect your organization better.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-02.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-02.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/security\\\/increase-visibility-and-control-with-bloxone-application-discovery\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Increase Visibility and Control with BloxOne\u2122 Application Discovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/44f8c830b167b6fd384677b115cf9ec7\",\"name\":\"David Zenone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"caption\":\"David Zenone\"},\"description\":\"David Zenone is a Technical Marketing Engineer. David joined Infoblox in late 2019 and has created multiple integrations with NIOS using Outbound Notifications. In addition to building Security Ecosystem integrations David has become a subject matter expert on Infoblox\u2019s SaaS offerings. In his free time he enjoys playing the Guitar, building and playing on PCs, and spending time with his family.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/david-zenone\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gain Visibility into Your Organization\u2019s Devices with Application Discovery in BloxOne Threat Defense | Infoblox","description":"Network security teams face significant challenges in getting visibility into their organization\u2019s device activity, particularly with the growing use of BYOS. BloxOne Threat Defense\u2019s Application Discovery feature provides insights into application usage and solves concerns around Shadow IT, Insider Threats, and Compliance. Learn how to leverage this unique tool to protect your organization better.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/","og_locale":"en_US","og_type":"article","og_title":"Increase Visibility and Control with BloxOne\u2122 Application Discovery","og_description":"Network security teams face significant challenges in getting visibility into their organization\u2019s device activity, particularly with the growing use of BYOS. BloxOne Threat Defense\u2019s Application Discovery feature provides insights into application usage and solves concerns around Shadow IT, Insider Threats, and Compliance. Learn how to leverage this unique tool to protect your organization better.","og_url":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/","og_site_name":"Infoblox Blog","article_published_time":"2023-03-10T22:31:08+00:00","article_modified_time":"2023-04-26T18:06:24+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/cti-image-02.jpg","type":"image\/jpeg"}],"author":"David Zenone","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Zenone","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#article","isPartOf":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/"},"author":{"name":"David Zenone","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/44f8c830b167b6fd384677b115cf9ec7"},"headline":"Increase Visibility and Control with BloxOne\u2122 Application Discovery","datePublished":"2023-03-10T22:31:08+00:00","dateModified":"2023-04-26T18:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/"},"wordCount":1018,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-02.jpg","keywords":["BloxOne\u00ae Threat Defense","SaaS","Shadow IT","compliance","Insider Threats","BloxOne\u00ae","Network Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/","name":"Gain Visibility into Your Organization\u2019s Devices with Application Discovery in BloxOne Threat Defense | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#primaryimage"},"image":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-02.jpg","datePublished":"2023-03-10T22:31:08+00:00","dateModified":"2023-04-26T18:06:24+00:00","description":"Network security teams face significant challenges in getting visibility into their organization\u2019s device activity, particularly with the growing use of BYOS. BloxOne Threat Defense\u2019s Application Discovery feature provides insights into application usage and solves concerns around Shadow IT, Insider Threats, and Compliance. Learn how to leverage this unique tool to protect your organization better.","breadcrumb":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-02.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-02.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/security\/increase-visibility-and-control-with-bloxone-application-discovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Increase Visibility and Control with BloxOne\u2122 Application Discovery"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/44f8c830b167b6fd384677b115cf9ec7","name":"David Zenone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","caption":"David Zenone"},"description":"David Zenone is a Technical Marketing Engineer. David joined Infoblox in late 2019 and has created multiple integrations with NIOS using Outbound Notifications. In addition to building Security Ecosystem integrations David has become a subject matter expert on Infoblox\u2019s SaaS offerings. In his free time he enjoys playing the Guitar, building and playing on PCs, and spending time with his family.","url":"https:\/\/www.infoblox.com\/blog\/author\/david-zenone\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8565"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8565\/revisions"}],"predecessor-version":[{"id":8579,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8565\/revisions\/8579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8464"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}