All episodes
-
Visibility: Now and into the Future
Paul Hooper, CEO, Gigamon, Shehzad Merchant, CTO, Gigamon
The inside-out enterprise remains in flux, and the world of hybrid cloud is the new normal. Comprehensive infrastructure visibility is no longer just an IT goal; it’s now mission-critical to every organization’s digitization journey. You navigated your organization’s success through pandemic-caused challenges —now it’s time to put yourself in the driver’s seat for the next segment of the journey.
The only guarantee we have about the future is that change is coming, and change is synonymous with risk. Thus, we have to look at new paradigms to address recovery and resiliency that do not require dependency on armies of people. In his keynote, Shehzad Merchant, Chief Technology Officer at Gigamon, will share one such paradigm that is distributed, immutable, and ephemeral. Plus, he will show how the DevOps model compares to traditional world of IT operations and security.
-
Visibility and Security: Best Practices to Eliminate Blind Spots
Ollie Sheridan Principal Sales Engineer Security Architecture Team Gigamon
The truism that you can't secure what you can't see is more relevant now than ever. With the ever-growing adoption of encrypted traffic and distributed infrastructure, it's getting more and more difficult to see all traffic. But it doesn't have to be that way — if you take action.
-
What is Guided-SaaS Network Detection and Response?
George Sandford Sr. Manager, Gigamon ThreatINSIGHT Technical Success Management Team Gigamon
NDRs have become the critical tool of choice at mature SOCs, along with EDRs and SIEMs (forming the SOC visibility triad). But not all NDRs are delivered the same. See how organizations are leveraging Guided-SaaS NDRs to close the SOC visibility gap, remove burdensome SOC distractions, and provide expert advisory guidance when it counts to alleviate SOC analysts burnout.
Note: CPE credits not offered for on demand sessions.
-
Executive Panel - Cloud: Cloud Workload Migrations are Complex and Often Fail; S
Session Moderator Paul Hooper, CEO, Gigamon and a diverse group of panelists
While the move to cloud computing is portrayed as being an imperative for digital transformation, the journey to the cloud, whether for entire datacenters or individual workload migrations, is complex and fraught with risk. However, it is a journey that many organizations have successfully undertaken with all manner of workloads including highly sensitive and complex workloads, and there is now a wealth of knowledge on how to plan and execute these projects. This private one-hour event will focus on the key learnings and best practices to de-risk and manage mission-critical workload migration to the cloud.
• Why do some cloud migration projects fail or under-deliver?
• How do you avoid recreating siloes in the cloud?
• What is the role of private and hyperconverged clouds in the world of the public cloud?
• SaaS, PaaS, IaaS – how do you decide the right approach for a particular application?
• DevOps led migrations – is this a breakthrough approach or an unwarranted risk?Panelists:
Ilan Rabinovitch, Senior VP, Product and Community, Data Dog
Tanu Sood, Senior Director, Marketing cloud products portfolio, Nutanix
Joe Vadakkan, Global Strategic Services Leader, Cloud & Security Platform, Optiv
Clive D'Souze, Sr. Director, OCI Engineering, Oracle
Mike Fluharty, CISO, Accenture Federal -
Nokia 5G focus: analytics and AI to deliver a new experience paradigm
Daniele Brancato, Head of Cognitive Customer Centric Ops Nokia
5G is the enabler of new use cases, business models but as well brings new technological complexity. New business opportunities can be unlocked with a smart use of the data where the focus is not just the subscriber's QoE but as well the quality of applications QoA.
-
Take Control with Application Visibility in Nutanix Private Clouds
Jason Burns Technical Marketing Engineer Nutanix and Muhammad Durrani Technical Product Marketing Gigamon
Private Clouds are on the ascent. To ensure comprehensive security with superior performance, you need full packet and application visibility. These environments are also very dynamic and complex, so automation is critical to success. In this session, we will demonstrate how Gigamon and Nutanix automatically provision agentless VMs to obtain all traffic. Next, app flows are identified and optimally processed and distributed to the proper tools. Network efficiency rises, user experience is enhanced and over 50% of duplicate or irrelevant traffic can be eliminated — thereby improving tool effectiveness with less scaling.
-
Securing the Hybrid Cloud and the Compliance Challenges It Presents
James Mandelbaum Sr. Security Engineer Gigamon
As adoption of hybrid cloud grows, so does concern about how to secure the diverse and distributed infrastructure. At this session we will discuss the shared responsibility model of security, compliance, and governance and the role of visibility.
Note: CPE credits not offered for on demand sessions.
-
Life of A Flow Mapped Packet
Patrick Riley, Product Management Director Gigamon
Come along on a journey inside the orange Gigamon box as we follow a packet on its path from the TAP to the tool. Gain insights into the inner workings of Flow Mapping and GigaVUE-OS to help you architect and troubleshoot your Visiblity and Analytics Fabric.
Note: CPE credits not offered for on demand sessions.
-
5G and Visibility
Ryan Mahoney, Product Management Director - Service Providers Gigamon
As 5G deployments pick up steam across the globe, the approaches and options adopted vary considerably. One aspect that is crucial to successful 5G deployments, no matter what approach or options are selected, is visibility into the network traffic. In this session we will discuss a number of the challenges, including costs, and a number of key solutions for addressing these challenges.
-
Container Visibility
Guy White, Sales Engineer Gigamon / Cameron Smith, Director of Product Management Gigamon
"OpenShift, K8s, Mesh Service.....huh? What language is this? In this session we'll review the not-so-new-but-very-confusing world of software containers that have accelerated digital transformation (DX), and how Gigamon helps with maintaining consistent, pervasive visibility in a very dynamic environment.
Note: CPE credits not offered for on demand sessions."
-
Catch Threats Like a GATR
Josh Day, Director, Applied Threat Research Gigamon
Attackers are agile and don’t limit themselves to a single technique, so modern security solutions can’t either. Learn Gigamon Applied Threat Research's (GATR) methodology on blending proprietary threat knowledge, behavior-based systems, and machine-learning techniques to provide active threat discovery, knowledge on adversary intent, and guided steps to mitigate incidents.
Note: CPE credits not offered for on demand sessions.
-
Level Up with Fabric Manager
Patrick Riley, Product Management Director Gigamon / Shawn Philips, Network Security Architect Federal Systems integrator
More than just a GUI, GigaVUE-FM fabric manager can level up your use of the Visibility and Analytics Fabric and maximize your return on investment. Come and see the fresh new look, unlock new capabilties, and learn some new tricks.
-
Traffic Reduction Techniques for Service Providers
Arun Manoharan, Sr. Manager, Professional Services Gigamon
One major challenge to obtaining necessary visibility into network traffic in the 5G core is the volume of traffic and number of endpoints. This session will describe in detail a number of methods to control and reduce the volume of traffic and number of sessions to be sent to monitoring and security tools — without sacrificing visibility.
Note: CPE credits not offered for on demand sessions.
-
Using AWS & Gigamon to Gain Visibility into Performance and Security
Scott Ward, Principal Solutions Architect Amazon Web Services
Having visibility into your network is a foundational item that is needed to help ensure that your network is secure and functional. This is no different for customers who are running workloads on Amazon Web Services. In this session we will provide an overview of how you can gain visibility into your AWS network traffic, leverage Gigamon to help with analytics and management of your traffic, and gain more confidence around the operations and security of your network traffic.
-
Executive Panel - Security: Security is at the Heart of Digital Transformation
Session Moderator - Robert Rodriguez, Founder, SINET
Security can determine the success – or failure - of digital transformation and cloud migration initiatives. To ensure a streamlined and secure customer and employee experience, you need complete, consistent visibility into all the data on your hybrid network. This challenge becomes even greater as it’s not just your infrastructure that is now hybrid, it is also your customers and workforce who demand secure access 24/7 at home, in the office, and on the road.
During the course of this interactive, one-hour event, you’ll have a chance to discuss the intersection of security, cloud migration and management, and digital transformation.
• Cyber threats: fast discovery and fast response are non-negotiable
• Implementing Zero Trust practices to better secure your network
• Balancing security and performance to achieve optimal business outcome
• Network detection and visibility in multi-cloud environments
• Best-practices to ensure a secure digital transformationPanelists:
Jerry Archer, SVP & CSO, Sallie Mae Bank
Tim Callahan, SVP & Global CISO, Aflac
Jeremiah Salzberg, Security Technologist, Sirius
Neil Daswani, Co-Director, Advanced Security Certification Program; Published Author, Standford University
Shehzad Merchant, CTO, Gigamon -
Measuring ROI
Paul Mortimer, Sales Engineer Gigamon / Darshan Shah, Sr. Solutions Marketing Manager Gigamon
Many customers are surprised to understand the extent and value of cost savings possible with Gigamon traffic reduction techniques. In a number of medium enterprises, for example, the savings exceeded $1M in a short timeframe. In this session we will describe traffic reduction capabilities that are fast to implement, plus demonstrate an easy-to-use cost calculator that quantifies traffic reduction into dollar savings.
Note: CPE credits not offered for on demand sessions.
-
Profiling and Posturing your IoMT Network
Rob Langley Sales Engineer Gigamon / Martyn Crew, Senior Director, Solutions Marketing and Partner Technologies Gigamon
As internet of medical things (IoMT) devices proliferate in the healthcare industry, so too does the frequency and range of security attacks that target these devices. Gaining visibility into these devices and the traffic they generate is key to mitigating the risks to your data and operations.
Note: CPE credits not offered for on demand sessions.
-
Measuring Service Provider ROI
Brad Bolger, Consulting Sales Engineer, Service Providers Gigamon
The volume of traffic, the number of endpoints, and the associated costs for monitoring and security — these are the major challenges to obtaining visibility into network traffic in the 5G core. In this session we will cover ways to measure ROI to understand which traffic reduction techniques are most effective and valuable to reducing your network monitoring and security costs.
Note: CPE credits not offered for on demand sessions.
-
5G Use Cases
Gordon Beith, Senior Director, Product Marketing Gigamon
5G core networks have almost every currently used architecture and technology applied, from physical links and dedicated appliances to containers, SDNs, and CUPS. It's not easy to monitor the 5G core network for performance and security with sufficient visibility. One way to simplify this is to break it down into illustrative use cases.
Note: CPE credits not offered for on demand sessions.
-
Eyes Wide Open: ThreatINSIGHT Observations as a Threat Hunting Accelerator
Technical Success Management Team at Gigamon
Beyond detection and response, threat hunting can enable security teams to discover anomalies and potentially malicious behavior in their environment. But knowing where to start can be tricky. Learn how ThreatINSIGHT observations can kick-start your efforts and act as valuable starting points for investigation and hunting.
Note: CPE credits not offered for on demand sessions.
-
Scaling Out VPC Mirroring
Baseer Balazadeh, Sr Technical Marketing Engineer Gigamon
It's all about AUTOMATION!!! Build the script once, deploy as many times as needed. In this session, we'll review Terraform and provide a hands-on demo. Plus, we'll share how to quickly and easily expand your footprint using automation languages.
Note: CPE credits not offered for on demand sessions.
-
IoT/OT: Fortifying Security Through Pervasive Visibility
Beau Nuanes, Systems Engineer Thundercat Technology
With the ever-growing expansion of IoT/OT in the workplace, we find ourselves in a place where we have to decide on how to not only protect these assets, but also how to identify them as well. Let's have a conversation around the discovery, security, and compliance of these workplace devices.
-
Traffic Visibility: Eliminate Blind Spots with TLS Decryption
Dale Guise, Principal Security Architect Gigamon / Greg Maples, Consulting Security Architect Gigamon
While TLS encryption ensures data confidentially and integrity, it also presents challenges for enterprise security inspection and monitoring. With 90 percent of traffic encrypted and 70 percent of malware using encrypted channels in 2021, effective decryption is imperative. Come explore the Gigamon approach.
Note: CPE credits not offered for on demand sessions.
-
Using Wire Data in Monitoring and Security Use-Cases
Mitch Roberson, Director of Infrastructure Curo Financial / Martyn Crew, Senior Director of Product Marketing Gigamon
There is a wealth of rich information in wire data that can be tapped to support a wide range of monitoring and security use-cases. Join Mitch Roberson, Infrastructure Director at Curo Financial, to learn valuable best practices in using this data.
Note: CPE credits not offered for on demand sessions.
-
Tap and Agg: Back to Basics with a Foundational Approach
Mike Valladeo Sr. Sales Engineer Gigamon / Justin Jolly Sr. Sales Engineer Gigamon
While the topic of tap and agg certainly isn't as interesting as containers or the cloud, it continues to be a core pillar of an organization's visibility solution by generating significant network, analytic, and security insights. This session drills into our roots by covering how to achieve cost-effective visibility by leveraging tap and agg — including for containers and the cloud.
Note: CPE credits not offered for on demand sessions.
-
5G Features Walkthrough
Gordon Beith, Senior Director, Product Marketing Gigamon
To support network visibility for 5G core networks, there are a number of super cool features you can use to help improve the effectiveness and reduce the costs of performance and security monitoring. Join us as we explore many of these features in detail.
Note: CPE credits not offered for on demand sessions.
-
Private Cloud Visibility
Lafon Hamilton, Sales Engineer, Federal Gigamon
Bet you thought you'd need a whole new solution to gain private cloud visiblity? Nope! See how Gigamon Cloud Suite provides a single platform (GigaVUE-FM fabric manager) to expand across the different clouds to provide consistent pervasive visibility in a very dynamic environment. In this session we'll show you how to combine the power of Gigamon hardware and software.
Note: CPE credits not offered for on demand sessions.
-
Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler
Rahim Ibrahim, Business Development & Technology Alliances Zscaler/ Stephen Newman,VP of Product Marketing, Gigamon
As temporary workplace policies move mainstream, enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this session we'll highlight the visibility benefits that our enterprise customers are receiving as they implemented new work-from-home policies.
Note: CPE credits not offered for on demand sessions.
-
Riverbed Unified NPM Platform, Full Fidelity Platform
Jeff Heng, Sr. Solution Architect Riberbed
Unified NPM Platform, Full Fidelity Visibility, Multi-Telemetry -
What does this really mean, and do you need it?Digital businesses need secure, high-performing networks more than ever before. It’s an uphill battle when it comes to protecting applications as enterprises migrate from the datacenter to the cloud. And with today’s hybrid cloud architectures, maintaining both a high-performing and secure network requires a broad and deep network centric view across the entire enterprise, which includes inside your fortified perimeters.
Learn how a truly unified network visibility solution, with data from packets, flows, and network device metrics, can collect details with no sampling, all the time. Realize the benefits to NetOps for understanding the impact of network performance on critical business initiatives. And when that inevitable zero-day breach happens, find out how SecOps can identify threats inside the network with access to every network conversation.
-
Living in the Cloud
Thomas Koulopoulos - Author, Futurist, Visionary, and Leader - Delphi Group
The single most significant shift of the 21st Century is well underway – the advent and rise of Digital Business Ecosystems built in the Cloud, These rich and complex Cloud Ecosystems will be at the heart of every major trend in our business, economy, government, and society. Understanding and leveraging this trend will be one of the most challenging and important steps forward in how we build the future of how we live, work, and play.
Cloud-based ecosystems will not only change the way we run today's business but create entirely new business models that we haven't even conceived of yet.
Visibility, which was of extreme importance for traditional networks, is even more critical for cloud environments. From the growing importance of the cloud in creating a foundation for these new business models, to the increasing threat of cyber, to the mind-bending increase in data and the role of Cloud AI, Tom will take us over the digital waterfall to help us navigate the uncharted and tumultuous waters ahead.
How tumultuous? Well, consider that by the end of this century we may well have more bits of data than atoms that make up the Earth!
Entertaining, insightful, and often unorthodox, his unique perspective will help us prepare for the next 30 years of Living in the Cloud.
-
Multi-Cloud Visibility
Cameron Smith Director, Cloud Product Management, Gigamon / Baseer Balazadeh, Sr Technical Marketing Engineer, Gigamon
Bet you thought you'd need a whole new solution to gain multi-cloud visiblity?
Nope! See how Gigamon Cloud Suite provides a single platform (GigaVUE-FM fabric manager) to expand across the different clouds to provide consistent pervasive visibility in a very dynamic environment. In this session we'll show you how to combine the power of Gigamon hardware and software.
Note: CPE credits not offered for on demand sessions.
-
How Gigamon Enables Zero Trust
Martyn Crew, Product Marketing & Matt Ashton, Systems Engineer, Gigamon / Terry Stockman, Consulting Engineer, Clearshark
Zero Trust has become a high priority for both government and commercial organizations. Whether you are implementing Zero Trust or planning a ZT-based next-gen security model, learn how Gigamon enables the critical components of a ZT architecture.
Note: CPE credits not offered for on demand sessions.
-
App Intel: Elevate Application Visibility and Metadata Generation
Chetan Shah, Product Management, Gigamon / John Gudmundson, Product Marketing, Gigamon
To fully visualize network traffic and optimally distribute to the right tools with contextual insights, you need to automatically identify and selectively filter thousands of applications and derive app-aware metadata.
Only then can you ensure tool effectiveness with reduced scaling while driving enhanced security and superior user experiences.
Note: CPE credits not offered for on demand sessions.
-
What 5G Means for the Enterprise
David Anderson, Senior Sales Engineer, Federal Team, Gigamon
Isn't 5G just for service providers?
Well, it was designed originally with mobile service providers in mind, but it's just as applicable for other network service providers.
There's also a lot of interest from many large enterprises and governmental organizations to be able to deploy their own private 5G networks. Join us as we explore this topic.
Note: CPE credits not offered for on demand sessions.
-
Cloud Visibility in the Age of Zero Trust
Martin Holste, CTO, Cloud, FireEye, Inc.
When you think of cloud visibility, you may think of getting packet traces from hard-to-reach places, audit logs, or network flow records.
The truth is that it takes all of these things to know what’s happening in your cloud, especially when network perimeters erode, and you find yourself in a zero trust world.
At FireEye, we see first-hand everyday how attackers steal credentials and penetrate networks. This session will show how to create visibility for a defensible network so you can start gaining some trust back.
-
Security Starts with Visibility
Jamison Utter, Sr Director of Product and Solutions Evangelism, Ordr
Delivering security in the hyper converged Cyber-Physical era is imperative.
Learn the nature and rationale for cloud-to-ground visibility and network control in the hyper converged IoT world of Digital business.
We will explore the cause and effect of hyper convergence and some industry examples of how and why cloud-to-ground are used. We will conclude by sharing seven steps to implement a convergence plan in your enterprise.
-
Does the Datacenter and the Core Network Have a Future in a Cloudy World?
Session Moderator: Shane Buckley, President and COO, Gigamon
The datacenter and core network continue to thrive in a world that we are continually told is moving to the cloud.
Many CIOs, CISOs and experts believe that the datacenter will continue to play a critical role as IT faces ever-increasing volume, variety and velocity of data; connectivity to millions of users, processes, managed and unmanaged devices especially in the face of unprecedented levels of cyber-terrorism, malware and ransomware.
Join your executive peers in a one-hour private session to discuss the role and value of the datacenter and corporate networks in the coming decade.
•How will the concept and role of the datacenter evolve?
•What workloads belong in the datacenter and what drives this determination?
•What are the best-practices to ensure effective cloud and datacenter interoperability?
•Is the datacenter the security and compliance hub of the enterprise?
•Are the roles of the datacenter and centralized IT inextricably linked?Panelists
•Bob Laliberte, Analyst, ESG
•Vince Berk, CTO, Riverbed
•Mike Hoyt, SVP Eng & Ops, WeLink
•Darrin Good, Director of Business Development, Enterprise Networking and Security, Compunet
•Michael Dickman, Chief Product Officer, Gigamon -
Cloud Automation — Terraform
Baseer Balazadeh, Sr Technical Marketing Engineer, Gigamon
It's all about AUTOMATION!!!
Build the script once, deploy as many times as needed.
In this session we'll go over Terraform to provide a hands-on ""show and tell"" on how to quickly and easily expand your footprint using automation languages.
Note: CPE credits not offered for on demand sessions.
-
Cloud Migration Journey
Min-Hsao Chen, PE, CISSP, Sales Engineer, Gigamon
Come join us in exploring the cloud migration journey and some of the common challenges that we face during this journey.
We will be sharing some current experiences of visibility challenges and expectations.
-
Using ThreatINSIGHT Like a Pro
Gene Berger, Sr. Sales Engineer, Gigamon ThreatINSIGHT, Gigamon
Come see how efficient and sophisticated SOCs use ThreatINSIGHT to close the SOC visibility gap, identify active threats along the MITRE ATT&CK framework with certainty, and perform rapid threat hunting/investigations that yield robust incident-response actions.
-
Cloud Network Metadata: A Guide to Using Metadata for Monitoring and Security
Bassam Khan, VP of Product and Technical Marketing, Gigamon / Muhammad Durrani, Technical Marketing Manager, Gigamon
Networks communications carries a wealth of information from physical, virtual and cloud platforms. For app monitoring and security, network metadata brings new potential to observability tools, which are mostly reliant on logs, traces and metrics.
At this session we will see how metadata can be extracted from network traffic, and we will examine some metadata use cases using observability tools, and mining raw metadata using AWS S3 with ELK Stack and Athena. We will close with a live demo of Gigamon and DataDog concept integration.
Note: CPE credits not offered for on demand sessions.
-
Automation — Ansible
Sriram Kallidaikurichi, Principal Solutions Engineer, Gigamon
Automation is no longer a nice-to-have in today's IT environment.
Through the use of YAML, automation means faster deployment, easier integration, and less manual work and errors.At this session we will demonstrate how Gigamon supports Ansible, walk through use cases, and show how you can implement Ansible at your site.
Note: CPE credits not offered for on demand sessions.
-
Automation in Telco Networks
Andy Burrell, Head of Portfolio Marketing, Nokia
Join this session to discover how communication service providers (CSPs) from around the world are automating network and service operations.
We will reveal the most successful strategies that CSPs have adopted, and how automation can reduce operating costs and manage complexity.
70% of the CSPs surveyed have a strategy to grow revenues from services that extend beyond connectivity and automation will play an integral role in bringing new services to market, faster.
-
Handling Encrypted Traffic in 5G
Ryan Mahoney, Product Management Director, Service Providers, Gigamon
5G standards were designed with the use of ephemeral key-based encryption.
With the scale of devices, volume of traffic, and virtualization in the 5G core, the ability to gain visibility into the encrypted traffic for effective performance monitoring and security can be quite difficult.
In this session we will explore some of the options for avoiding these challenges.
-
Automation — Ansible for 5G
Kiet A. Duong, Consulting Sales Engineer, Gigamon
Due to the scale of 5G core, CUPS architecture, and the number of systems that need to be configured to effectively manage the 5G traffic, using a point-and-click GUI or CLI for initial configuration and ongoing maintenance of the visibility fabric can be very laborious and error prone.
At this session we will dive into the use of YAML and Ansible scripting for automation of these and other tasks.
Note: CPE credits not offered for on demand sessions.