Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

9/22/2014
05:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Infoblox Network Insight Delivers New Levels of Visibility and Productivity

You Can't Manage What You Can't See

SANTA CLARA, Calif., September 22, 2014—Infoblox Inc. (NYSE:BLOX), the network control company, today announced enhancements to Infoblox Network Insight, a solution that brings previously disparate real-time network infrastructure data into a single authoritative database, to help make enterprise networks easier to manage and more secure.

Until now, network data has existed in multiple silos managed by various teams. One silo tracks network devices such as routers, switches, firewalls, and load balancers, often on outdated spreadsheets. Another silo has information on connected endpoint devices such as PCs, smart phones, and tablets. Yet another silo tracks configuration of the Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address allocations and history.  Blocked by these silos, networking teams do not have a shared, big-picture view into what is happening across the network and cannot effectively respond to network issues in real time. Network management tasks therefore take longer and require error-prone manual processeswhich increase cost, complexity, and risk.

Infoblox Network Insight (www.infoblox.com/networkinsight), introduced in January 2014, brings these silos together in a single authoritative IP address management (IPAM) database. This database empowers network engineers to automatically gather a broad range of information, analyze it, and in the latest version, take action in real time through a single point of control. Infoblox Network Insight delivers an unprecedented range of capabilities, including:

·         Automated discovery. Comprehensive, automated discovery of all layer-2 and layer-3 network devices as well as endpoint devices and switch ports, gives network teams an always-up-to-date view of what is on the network.

·         Switch-port control. New in this version, administrators can control individual switch ports and manage their global switch-port inventory, improving productivity, lowering risk, increasing resource utilization, and reducing the constant headaches and conflicts associated with port managementall from one user interface. 

·         A unified, authoritative source of network data. Diverse teams managing different network functions can now share one source of accurate, up-to-date network information. Everything from IP address history to network and endpoint device information to protocol-related data such as DNS and DHCP information is reconciled in one place, giving a comprehensive view of critical network data. 

·         Enhanced security. Every networking device can be individually identified for rapid isolation of unauthorized or unmanaged units. Rogue devices and unmanaged IP addresses can be seen in one place, in real time. Switch ports can be maintained in an inactive mode and turned on only when a valid device is provisioned, preventing unauthorized use of inactive ports.

·         Higher network availability. Outages caused by configuration errors when readjusting network devices or placing new equipment on the network can be significantly reduced. Conflict detection also helps maintain data that represents the actual state of the network.

·         Easier expansion. When combining enterprise networks because of mergers or acquisitions, down time due to overlapping IP addresses, lost knowledge, or missing network architecture documentation can be avoided or even eliminated.

 

In short, better data enables better decisions. The enhanced visibility and control delivered by Infoblox Network Insight can bring measurable improvements to the work of IT teams by supporting:

 

·         Faster validation that actual network deployment matches original network designs

·         More efficient utilization of network infrastructure

·         Fewer staff hours wasted on trivial network administration tasks, allowing the network team to spend more time on higher-level assignments

·         Faster time to value for existing Infoblox users, because Network Insight is integrated into the Infoblox graphical user interface.

 

“Enterprise networks today are full of blind spots that slow down day-to-day work and increase operating expenses,” said Scott Fulton, executive vice president of products at Infoblox. “One network manager told us it is sometimes easier for him to buy a new switch than figure out what ports are available on current switches. Another manager described days of work by multiple teams to fix network outages in multiple branch offices, which turned out to be caused by a well-intentioned employee who had installed a home router without permission. These examples show the benefit of Infoblox Network Insight in overcoming the lack of visibility that prevents IT teams from fully controlling and securing their networks.”

 

Pricing and Availability

Infoblox Network Insight is available now worldwide. Pricing information is available from Infoblox sales representatives and channel partners.

 

About Infoblox

Infoblox (NYSE:BLOX) delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable approximately 7,500 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Infoblox (www.infoblox.com) is headquartered in Santa Clara, California, and has operations in over 25 countries.

 

Forward-looking and Cautionary Statements – Infoblox
Certain statements in this release are forward-looking statements, which involve a number of risks and uncertainties that could cause actual results to differ materially from those in such forward-looking statements. As such, this release is subject to the safe harbors created by U.S. Federal Securities Laws. The risks and uncertainties relating to these statements include, but are not limited to, risks that there may be design flaws in the company’s products, shifts in customer demand and the IT services market in general, shifts in strategic relationships, delays in the ability to deliver products, or announcements by competitors. These and other risks may be detailed from time to time in Infoblox’s periodic reports filed with the Securities and Exchange Commission, copies of which may be obtained from www.sec.gov. Infoblox is under no obligation to (and expressly disclaims any such obligation to) update or alter its forward-looking statements whether as a result of new information, future events or otherwise.

 

# # #

 

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4590
PUBLISHED: 2020-09-21
IBM WebSphere Application Server Liberty 17.0.0.3 through 20.0.0.9 running oauth-2.0 or openidConnectServer-1.0 server features is vulnerable to a denial of service attack conducted by an authenticated client. IBM X-Force ID: 184650.
CVE-2020-4731
PUBLISHED: 2020-09-21
IBM Aspera Web Application 1.9.14 PL1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188055.
CVE-2020-4315
PUBLISHED: 2020-09-21
IBM Business Automation Content Analyzer on Cloud 1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the i...
CVE-2020-4579
PUBLISHED: 2020-09-21
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted HTTP/2 request with invalid characters. IBM X-Force ID: 184438.
CVE-2020-4580
PUBLISHED: 2020-09-21
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted a JSON request with invalid characters. IBM X-Force ID: 184439.