All episodes
-
Extend Your Security and Visibility in AWS
Anthony G. Smith, Sr. Partner Solutions Architect, AWS
A centralized shared services model can increase network availability and security. In this session, you will learn how VPCs and Amazon Web Services (AWS) accounts have:
• Security and compliance of AWS resources
• AWS Network Monitoring including:
- Traffic Visibility
- Connectivity Testing
- Events Notification and Automation
- API Activity Monitoring
• Gigamon Deep Observability Pipeline with AWS Gateway Load Balancers
____
This session originally aired during Gigamon Visualyze Boot Camp -
A Conversation with A Race Car Driver and The Creator of Zero Trust
Robert Megennis, Race Car Driver, and John Kindervag, Creator of Zero Trust
Racing, Data & Visibility are closely connected -- Find out how in this interactive conversation with Robert Megennis, race car driver, and John Kindervag, creator of Zero Trust.
____
This session originally aired during Gigamon Visualyze Boot Camp -
Observability and Security from a Common Platform (Sumo Logic)
Drew Horn, Technology Alliances Director, Sumo Logic
With the emergence of DevSecOps, security teams have been charged with “shifting left” and tearing down the walls dividing operations, development, and security teams. What is the driving force behind this mandate? But how is this actually done? How can teams actually drive and quantify more reliable, secure digital experiences for their customers?
Join this session to hear Sumo Logic Technology Alliances Director, Drew Horn, discuss how Gigamon can be leveraged by both your operational and security teams.
____
This session originally aired during Gigamon Visualyze Boot Camp -
The Pragmatic Approach to Zero Trust with Deep Observability
Ian Farquhar Gigamon CISO and Matthew Plummer Gigamon Public Sector CTO
Zero Trust not going as planned? Hear our CTOs explain why deep observability is foundational for a robust ZTA model.
The science fiction writer, William Gibson, is well-known for saying, “The future is here. It is just not evenly distributed yet.” The future is already here with Zero Trust, yet many organizations still can’t see how they can implement it in practical terms. Gigamon is here to help you successfully adopt Zero Trust Cybersecurity Principles. Join our CTOs as they discuss Zero Trust Architecture and how you can turn the tables on threats by:
- Gaining deep observability into the entire network
- Implementing network segmentation without disruption
- Getting powerful capabilities to observe adversarial actions in your networks
____
This session originally aired during Gigamon Visualyze Boot Camp -
We're Going on a Threat Hunt
George Sanford, Josh Day, and Chris Borales
Is the thought that threat actors could be hiding under your bed, in your closet, or having a wild rumpus in your network keeping you up at night? Does the thought of bad guys hiding in plain sight make every day a terrible, horrible, no good, very bad day?
Even though your network should be a safe place, breaches are inevitable. Come along as we take a whimsical but serious approach to thinking about looking for evil-doers in your environment. You’ll learn how to find the signs of attacker activity “stumble-trip” style – by looking for clues and indicators beyond just detections and signatures. You’ll learn about the tools you’ll need to spot attacker behavior before they can wreak havoc.
____
This session originally aired during Gigamon Visualyze Boot Camp -
Gear Up with Supercharged Fabric Manager – What’s New
Patrick Riley, Product Management Director, Muhammad Durrani, Marketing Engineer, Srudi Dinneshan, Product Marketing
Level-up your knowledge of GigaVUE-FM Fabric Manager. In this session, you will learn more about Fabric Health Analytics, Topology Visualization, and other features of the GigaVUE-OS 6.0 release.
In addition to what’s new, you will learn about best practices and the top 3 things you should know about FM.
____
This session originally aired during Gigamon Visualyze Boot Camp -
Introducing HC1-Plus: 2X the Performance with Half the Footprint
Gordon Beith, Sr. Dir. Product Marketing, and Jerry Ho, Sr. Product Manager of Gigamon
Introducing the latest addition to GigaVUE HC Series that offers tremendous traffic processing power and capabilities to optimize and forward your network traffic, including GigaSMART applications. Learn how HC1-Plus can be used for various solutions, including datacenter visibility, network security, and Zero Trust architectures.
____
This session originally aired during Gigamon Visualyze Boot Camp -
A New Approach to Monitoring & Observability for Modern IT Architecture
David Monahan, Business Information Security Officer Allergan Aesthetics and James Crawshaw, Practice Leader Omdia
Enterprises and telecom operators are shifting toward hybrid and multi-cloud to accelerate their digital transformation —and, public cloud is more challenging than on-premise networking.
Dealing with multiple cloud providers and relying on log-based tools alone makes it difficult to identify security threats, performance bottlenecks, and troubleshoot issues. There are a lot of visibility gaps and blind spots when organizations move workloads and applications to the cloud without a well-thought-out, monitoring strategy.
Hear from experts at AbbVie, Gigamon, and Omdia about how to address the challenges of taking back visibility and control of your hybrid cloud network.
____
This session originally aired during Gigamon Visualyze Boot Camp -
A Conversation with Gigamon Chief Development Officer, Ljubo Mandic
Ljubo Mandic, Chief Development Officer Gigamon and Michael Dickman, Chief Product Officer Gigamon
Listen in on an informal chat about a wide variety of topics at Gigamon ranging across quality, innovation, cloud development, and more.
Pull back the curtains on the people and principles behind Gigamon Research & Development with Gigamon’s Chief Development Officer, Ljubo Mandic, and Chief Product Officer, Michael Dickman.
Ljubo also shares some personal perspectives on how he came to Gigamon and the industry in general.
____
This session originally aired during Gigamon Visualyze Boot Camp -
The All-in-one Observability Platform (New Relic).
Jemiah Sius, Director Developer Relations for New Relic
Security risks are a major concern for organizations operating in the digital age. Learn how to monitor hybrid cloud environments, understand traffic flow, and combat security threats.
____
This session originally aired during Gigamon Visualyze Boot Camp
Join us as we take a look at the state of cloud computing, specifically around the complexities of operating hybrid cloud environments to discover how data-informed teams and organizations are keeping their networks safe and secure while keeping up with the pace of innovation.
____
This session originally aired during Gigamon Visualyze Boot Camp -
Deep Observability Pipeline: What it is and why it Matters
Stephen Goudreault, Gigamon and Bassam Khan, Gigamon
In today's hybrid and multi-cloud world, it’s more important than ever for infrastructure and security teams to get unified visibility across multiple cloud platforms and tools. In this session, you’ll learn how a deep observability pipeline provides unfettered visibility across your different environments. Plus, we’ll show how network-derived intelligence can augment metrics, events, logs, and traces (MELT), empowering observability tools with critical data to troubleshoot security and performance issues.
____
This session originally aired during Gigamon Visualyze Boot Camp -
Why Gigamon Application Metadata Intelligence (AMI) is a Game-Changer
Martyn Crew, Senior Director, Solutions Marketing - Gigamon + Muhammad Durrani, Technical Marketing Engineer - Gigamon
Gigamon Application Metadata Intelligence (AMI) is a game-changer for our customers. We’ll explain why and show you step-by-step in GigaVUE- FM Fabric Manager how to configure and send selected application and protocol attributes to your observability and security tools. Using Dynatrace as the tool in this tutorial, we will demonstrate how application metadata enables detection of unsanctioned activities that would otherwise be invisible to your observability and security tools.
____
This session originally aired during Gigamon Visualyze Boot Camp -
Service Provider Metadata: Real World Solutions
Ryan Mahoney, Product Management Dir., Service Providers - Gigamon + Gordon Beith, Sr. Product Marketing Dir. - Gigamon
Come join us for a presentation and discussion about four real-world use cases for service provider networks, and Gigamon's metadata-based solutions for them.
- MEC: Reporting Mobile Edge Compute (MEC) latency by application, without a probe
- Security: Deep network security analysis for subscribers using unknown applications
- Performance: Optimize cell configuration through analysis of subscribers, applications, and QCI levels on 4G and 5G cells
- Analytics: Deflecting or preventing customer service calls using response-code extraction
____
This session originally aired during Gigamon Visualyze Boot Camp -
Inline TLS/SSL Decryption: What We've Learned after 1,000+ Deployments
Greg Maples, CISSP, Principal Solutions Architect - Gigamon + Ollie Sheridan, Consulting Sales Engineer, Security - Gigamon
Let's be honest, deploying inline decryption — even with Gigamon — is not a walk in the park. But if you don't decrypt, you have a huge blind spot in your network. In this session, we'll show you best practices in deploying Inline SSL/TLS decryption based on our experience with over 1,000 deployments. Learn from our field experts how to deploy inline SSL with minimal pain and maximum gain. Then they’ll walk you through how to implement inline decryption using GigaVUE-FM Fabric Manager and cover topics like PII/compliance challenges and whether it makes sense to do centralized or per tool decryption.
____
This session originally aired during Gigamon Visualyze Boot Camp