Hello everyone, it’s great to be here on the new community site! We’ve been dying to reintroduce ourselves here. My name is Rich Langston, and I’m part of a fast growing area within Infoblox – our security team.
Over the past year or so, we’ve been growing up the security team, adding new product managers, building our threat intelligence team, and increasing our field expertise. We’ve been doing this in response to the overwhelming acceptance of our security products. So now, we’ve built an amazing group of people including veterans of many great security companies working in engineering, threat intelligence, support, marketing, and the field. Personally, I’m here to help build world-class security directly into one of the most important infrastructure components on your network – one that many people neglect to think about.
So let’s talk about that infrastructure for a minute. Most of us who have been involved in running DNS servers, or who work on security teams, are well aware that DNS has had a history of vulnerabilities, and a unique set of inherent attack vectors. Generally, these have been seen as things to fix, or work around with load balancers or DDoS tools. Infoblox, of course, has some unique solutions to these issues which I’ll cover in a future blog.
However, looking at DNS strictly as a problem, as so many of us have, turns out to be quite short sighted. After all, what can you do on the internet without using DNS? As it turns out, almost nothing. So every thing your users do leaves a DNS fingerprint. In fact, this is just as true for the bad guys as it is for your users. Nearly all malware these days relies on DNS to keep connected with its command and control. So in order for the bad guys to do their jobs, they must constantly consult your internal DNS. This sounds like an opportunity rather than a problem.
Can you think of another service that everyone in your organization relies on for every thing they do? Unless DNS tells you where to go, there’s no way for you to get there. HTTP and HTTPS are also ubiquitous these days, but they lack the centralized control point of DNS. Given how unique and ubiquitous it is, DNS needs to evolve from a simple service measured by uptime and queries per second into a strategic visibility and control point in the network.
That’s why we’re here – because we are committed to building new layers of security and visibility into on of the internet’s key protocols. But good ideas don’t really matter – they are a dime a dozen these days. What matters is execution. Infoblox has been around for over 10 years, continuously delivering value to our DNS, DHCP, and IPAM customers. There are now over 7,000 organizations world wide who use Infoblox for DDI services, security, and cloud network automation. We have 50% marketshare in the core DDI market as defined by Gartner. What better platform for delivering the next generation of security?
What is it exactly that we are working on? Please check back here regularly for answers to that question. The first topic we’re going to address is very important for any enterprise – how to stop hackers and malware from using DNS to steal your critical data, right through your existing firewall.
Meanwhile, here’s a look at part of our team. From top to bottom, we’ve got Srikrupa, Rich, Jamison, UJ, Vadim, Jianhong, UJ again, Thomas, Alice, Craig, Azril, Dave, Seema, Vijayram, Rabih, Bin, Les, and Joe. We’re spread out around the globe looking out for threats to your DNS, including Silicon Valley, Maylasia, Burnaby Canada, Thailand, Bangalore, and home offices around the world.
Between us, we have decades of experience in security, having worked at places such as Palo Alto Networks, Netscreen/Juniper, PGP, Cisco Security, Symantec, Imperva, McAfee/Intel, BlueCoat, Webroot, Netskope, Sygate, and more.