Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

9/22/2014
05:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Infoblox Network Insight Delivers New Levels of Visibility and Productivity

You Can't Manage What You Can't See

SANTA CLARA, Calif., September 22, 2014—Infoblox Inc. (NYSE:BLOX), the network control company, today announced enhancements to Infoblox Network Insight, a solution that brings previously disparate real-time network infrastructure data into a single authoritative database, to help make enterprise networks easier to manage and more secure.

Until now, network data has existed in multiple silos managed by various teams. One silo tracks network devices such as routers, switches, firewalls, and load balancers, often on outdated spreadsheets. Another silo has information on connected endpoint devices such as PCs, smart phones, and tablets. Yet another silo tracks configuration of the Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address allocations and history.  Blocked by these silos, networking teams do not have a shared, big-picture view into what is happening across the network and cannot effectively respond to network issues in real time. Network management tasks therefore take longer and require error-prone manual processeswhich increase cost, complexity, and risk.

Infoblox Network Insight (www.infoblox.com/networkinsight), introduced in January 2014, brings these silos together in a single authoritative IP address management (IPAM) database. This database empowers network engineers to automatically gather a broad range of information, analyze it, and in the latest version, take action in real time through a single point of control. Infoblox Network Insight delivers an unprecedented range of capabilities, including:

·         Automated discovery. Comprehensive, automated discovery of all layer-2 and layer-3 network devices as well as endpoint devices and switch ports, gives network teams an always-up-to-date view of what is on the network.

·         Switch-port control. New in this version, administrators can control individual switch ports and manage their global switch-port inventory, improving productivity, lowering risk, increasing resource utilization, and reducing the constant headaches and conflicts associated with port managementall from one user interface. 

·         A unified, authoritative source of network data. Diverse teams managing different network functions can now share one source of accurate, up-to-date network information. Everything from IP address history to network and endpoint device information to protocol-related data such as DNS and DHCP information is reconciled in one place, giving a comprehensive view of critical network data. 

·         Enhanced security. Every networking device can be individually identified for rapid isolation of unauthorized or unmanaged units. Rogue devices and unmanaged IP addresses can be seen in one place, in real time. Switch ports can be maintained in an inactive mode and turned on only when a valid device is provisioned, preventing unauthorized use of inactive ports.

·         Higher network availability. Outages caused by configuration errors when readjusting network devices or placing new equipment on the network can be significantly reduced. Conflict detection also helps maintain data that represents the actual state of the network.

·         Easier expansion. When combining enterprise networks because of mergers or acquisitions, down time due to overlapping IP addresses, lost knowledge, or missing network architecture documentation can be avoided or even eliminated.

 

In short, better data enables better decisions. The enhanced visibility and control delivered by Infoblox Network Insight can bring measurable improvements to the work of IT teams by supporting:

 

·         Faster validation that actual network deployment matches original network designs

·         More efficient utilization of network infrastructure

·         Fewer staff hours wasted on trivial network administration tasks, allowing the network team to spend more time on higher-level assignments

·         Faster time to value for existing Infoblox users, because Network Insight is integrated into the Infoblox graphical user interface.

 

“Enterprise networks today are full of blind spots that slow down day-to-day work and increase operating expenses,” said Scott Fulton, executive vice president of products at Infoblox. “One network manager told us it is sometimes easier for him to buy a new switch than figure out what ports are available on current switches. Another manager described days of work by multiple teams to fix network outages in multiple branch offices, which turned out to be caused by a well-intentioned employee who had installed a home router without permission. These examples show the benefit of Infoblox Network Insight in overcoming the lack of visibility that prevents IT teams from fully controlling and securing their networks.”

 

Pricing and Availability

Infoblox Network Insight is available now worldwide. Pricing information is available from Infoblox sales representatives and channel partners.

 

About Infoblox

Infoblox (NYSE:BLOX) delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable approximately 7,500 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Infoblox (www.infoblox.com) is headquartered in Santa Clara, California, and has operations in over 25 countries.

 

Forward-looking and Cautionary Statements – Infoblox
Certain statements in this release are forward-looking statements, which involve a number of risks and uncertainties that could cause actual results to differ materially from those in such forward-looking statements. As such, this release is subject to the safe harbors created by U.S. Federal Securities Laws. The risks and uncertainties relating to these statements include, but are not limited to, risks that there may be design flaws in the company’s products, shifts in customer demand and the IT services market in general, shifts in strategic relationships, delays in the ability to deliver products, or announcements by competitors. These and other risks may be detailed from time to time in Infoblox’s periodic reports filed with the Securities and Exchange Commission, copies of which may be obtained from www.sec.gov. Infoblox is under no obligation to (and expressly disclaims any such obligation to) update or alter its forward-looking statements whether as a result of new information, future events or otherwise.

 

# # #

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.