Infoblox’s global team of threat hunters uncovers a DNS operation with the ability to bypass traditional security measures and control the Great Firewall of China. Read about “Muddling Meerkat” and the many other threat actors discovered by Infoblox Threat Intel here.


This is an open group. Sign in and click the "Join Group" button to become a group member and start posting.
Yes. It is Possible to Make Security Operations Teams Happy and Effective.
Posts: 21
Registered: ‎10-26-2017
Posts: 23

Challenges faced by security teams:


Today, customers use hundreds of security products to protect their network from evolving threats right from applications, cloud infrastructure, to internal networks. But a big problem is that these products create silos and don’t communicate with each other either process point of view or data point of view, which makes it difficult for network admins to get real-time visibility into threats in an easy to consume manner. Also, these security products produce a large volume of incidents but security teams have difficulty in prioritizing the threats. Based on the Enterprise security group (ESG)-research-insight-report published in March 2017, security teams are constantly struggling to keep up with the volume of security alerts. These security teams are often understaffed and lack advanced skills necessary for security operations. These factors limit security operations effectiveness and make organizations extremely vulnerable to targeted attacks by sophisticated cyber-adversaries.


According to the survey conducted for the report cited above:


  1. Keeping up with the volume of security alerts (35%) and lack of integration between security tools used (29%) are the top two challenges related to security operations.
  2. Other major challenges include keeping up with the volume of external threat intelligence (23%) and dependency on too many security tools for incident detection and response (19%).

Big challenges for security ops.png

According to same ESG report, the top security operations priorities for 2017 include:


  1. Invest in technologies to automate security operations related to incident response (39%).
  2. Invest in new threat detection technologies (35%).
  3. Create a security operation architecture by integrating multiple tools (29%).
  4. Invest in process and technologies that help organizations enhance investigation capabilities (29%)

Security Ops Priorities.png

The figure below accurately depicts the GAP between where security teams are and associated issue with the current situation:


Gap Analysis.png


The Infoblox and Tenable SecurityCenter integration helps security team to bridge the gaps mentioned above.

Why Infoblox partners with Tenable: Tenable is world’s first Cyber Exposure platform that provides live discovery and visibility of all modern assets across the environment, add the context of risk to prioritize remediation and provides a clear view of your security posture.


Infoblox - Tenable Joint Solution Overview


The Tenable joint solution helps team alleviate these challenges by breaking down the silos and provides benefits such as context-based action, security orchestration, and improved security efficiency as shown in the figure below: 


Breaking Down Silos tenable.png 


Infoblox is the first and only DDI vendor to integrate with Tenable to automate asset discovery, provide in-depth and continuous visibility and enhance overall security posture. This integration enables security operation teams to:


  1. Discover new assets automatically by searching the network, monitoring the traffic and gathering all information on network, hardware and web applications on the network.
  2. Gain visibility and context around new devices or hosts that join the network.
  3. Initiate on-demand scanning in near real-time when threats are discovered.

This to decide the priority of threats by providing of the threats and it also provides near-real-time visibility into network devices by discovering new assets automatically.


Solution diagram:


 Tenable Solution Diagram.png



Benefits of the Infoblox-Tenable joint solution include:


  1. Security orchestration: By automating response to malicious events on the network, the integrated Infoblox-Tenable solution provides security orchestration by performing vulnerability and compliance assessment based on events in real time, thus eliminating blind spots within the network.
  2. The context for prioritization of threats: By leveraging DDI data, security teams can get context around unmanaged devices, infected hosts, which helps security teams prioritize action based on the actual risk of the asset.
  3. Improved ROI of security investments already made: Security teams can improve ROI for security investments already made by allowing different security tools to work together.

To summarize, Infoblox and Tenable joint solution enables automated response for network and malicious events, provide context to prioritize actions and allows 100s of security devices to work together, thereby reducing the volume of security alerts and saving invaluable time for network and security teams.    


To learn more about the joint solution, read the solution note:




Showing results for 
Search instead for 
Did you mean: