All episodes
-
Welcome, Gigamon Momentum and Breakthrough Cybersecurity Innovations
Shane Buckley, President and Chief Executive Officer, and Michael Dickman, Chief Product Officer
Join President and CEO Shane Buckley and Chief Product Officer Michael Dickman as they share the latest updates on the company’s upbeat business momentum and technology roadmap. This session will include a breakthrough cybersecurity innovation announcement of a new single decryption solution that sees concealed threat activity in the cloud and seamlessly integrates with both modern and legacy TLS encryption standards. Learn how to advance your security posture and reduce operational complexity.
-
Panel Discussion: Customer insights and perspectives on hybrid cloud security
Chaim Mazal, Chief Security Officer
This interactive panel of cybersecurity experts will share their challenges and what keeps them up at night in maintaining the security of their hybrid cloud infrastructure. The panel will also explore and discuss the latest challenges associated with gaining visibility into encrypted communications to detect concealed threat activity and how Gigamon is helping them to gain deep observability and improve their overall security posture.
-
A Breakthrough Approach to Inspecting Encrypted Traffic
Brian O’Sullivan, Director Product Management, and Jim Mandelbaum, Field Chief Technology Officer
Encrypted traffic is a major blind spot, especially in hybrid could environments. Gigamon has introduced a breakthrough approach that, for the first time, gives your tools full visibility into all encrypted cloud traffic without the heavy lift of traditional decryption methods or the complexity of key management. Our single, non-agent approach works with all encryption protocol standards, including TLS 1.3. Learn about this novel approach and how to put it to work for you.
-
Forrester Discusses the Power of Visibility in Addressing Threat Landscape
Tope Olufon, Senior Analyst, Forrester
Forrester security analyst, Tope Olufon, discusses the threat landscape and how we can deal with it in very practical terms, using deep observability techniques, visibility into encrypted traffic, and focusing on the network layer.
-
Scaling VMware Visibility with Automation and Orchestration
Yazhini Rajesh, Technical Marketing Engineer, and Danush Ravishankar, Sr. Staff Professional Services Engineer
Visibility deployments in large and distributed hybrid cloud environments can be time-consuming as well as challenging. IaC, or Infrastructure as Code, can greatly simplify the process of scaling visibility solutions. The use of IaC addresses the issues of scaling deployments, upgrades, and rollbacks. In this session, Gigamon engineers will demonstrate an end-to-end deployment of Gigamon Cloud Suite for VMware using Ansible playbooks along with automating new technologies for accessing encrypted traffic.
-
Application Intelligence Best Practices: Leveraging Layer 4-7 Capabilities
Surbhi Paul, Director, Product Marketing, and Muhammad Durrani, Technical Marketing Engineer
With today’s evolving hybrid cloud, you can’t afford to compromise when it comes to application performance and security monitoring. Gigamon Application Filtering Intelligence (AFI) reduces tool burden by selectively sending application traffic to tools. Application Metadata Intelligence (AMI) goes one step further to extract application attributes from traffic and then efficiently deliver them to SIEMs, APMs, and observability tools. In this session, Gigamon technical leaders will demonstrate how to use App Intel to isolate performance bottlenecks and solve tough security cases.
-
Elevate Your Network Architecture: Navigating AWS Cloud Networking
Anthony Smith, Sr. Partner Solutions Architect, Cloud Security AWS and Chris Dittert, Director Cloud Alliances
Digital transformation is accelerating cloud adoption and changing the way network operations teams work. Mission-critical applications are increasingly deployed in a hybrid fashion – often across the AWS cloud and on-premise infrastructure. This shift brings pressing questions: How do you secure a hybrid architecture? How do you ensure access, uptime and an excellent customer experience? How do you architect hybrid applications for immediate value and long-term scalability? This session will show how one of the world's largest airlines leveraged Presidio, AWS, and Gigamon as a solution to these questions.
-
A Practitioner's Guide to Container Tapping
Min Chen, Sr. Sales Engineer
App developers are running fast, but have they kept security in mind every step of the way? Even as more applications are containerized, accessing and inspecting container traffic remains elusive. That is, until now. Gigamon Universal Cloud Tap (UCT) is a gamechanger for container visibility. Hear from a veteran Gigamon Sales Engineer as he shares best practices for accessing container traffic to better secure your applications.
-
Demystifying Zero Trust: Navigate the Journey One Step at a Time
Ian Farquhar, Security CTO and Vimesh Patel, Chief Technology Advisor – Federal, World Wide Technology
In a digital landscape fraught with sophisticated cyber threats, traditional security models fall short in providing adequate protection. It's time to embrace a revolutionary approach – Zero Trust Security. Join us for a game-changing discussion where we delve into the depths of Zero Trust, the future of cybersecurity.
-
Deep Observability: Delivering a Superior Application User Experience
Martyn Crew, Senior Director, Solutions Marketing, and Stephen Goudreault, Cloud Security Evangelist
Log-based tools make it nearly impossible for CloudOps and DevOps teams to quickly pinpoint customer experience and performance issues. While logs are important for understanding what’s happened on the network, they can’t provide the real-time North-South and East-West visibility that’s needed for effective monitoring and troubleshooting. See how the Gigamon Deep Observability Pipeline delivers network-derived intelligence to MELT (Metrics, Events, Logs, and Traces)-based observability and SIEM tools like Dynatrace and Splunk.
-
Maximizing Tools Efficiency, Minimizing Carbon Footprint
Ryan Mahoney, Product Marketing Director, and Naveen Bodla, Sr. Principal Solutions Architect
As networks grow, so does the resource demands on network monitoring and security tools. Gigamon has an extensive array of tool optimization technologies, designed to extend the life of tools, saving both tool costs and carbon footprint. We’ll talk about the Gigamon tech enabling these savings. Plus, we’ll show you how to estimate your own savings, as well as demonstrate our free Discovery & Optimization Kit, which you can use to directly measure the efficiency savings in your own environment.
-
Gain Visibility into Encrypted Core and 4G+5G Converged Core
Ryan Mahoney, Product Marketing Director, and Meenal Aggarwal, Director Product Management
How can we get clear-text visibility into a modern encrypted 5G core?” is one of the questions we hear most often from our mobile operator customers. Learn how Gigamon addresses this critical visibility issue and how we support the world’s largest mobile operators when they make the choice to go with a converged core, serving both 4G and 5G traffic.
-
We have decrypted traffic. Now what?
Ian Farquhar, Security CTO
Decryption is not the end goal; it's the means to the end, which is traffic inspection. Our Security CTO will discuss how plaintext data access can introduce privacy and insider threat concerns, and mitigation strategies used by our customers.
-
Unlock Ultimate Hybrid Cloud Security: Join Nutanix for Expert Insights
Srinivas Chakravarty, Vice President Cloud Ecosystems, and Aniket Daptari, Director of Product Management
In today's rapidly evolving digital landscape, securing your hybrid cloud environment while ensuring network stability has become paramount. Whether you're a seasoned IT professional or just beginning your cloud journey, this webinar is tailored to provide you with actionable insights and strategies to fortify your hybrid cloud infrastructure.
-
Using a Security Data Lake to Reduce SIEM Costs
Martyn Crew, Senior Director, Solutions Marketing and Bryan Lokey, Senior Director, Security Engineering
SIEMs are one of the most important but also one of the most expensive security tools employed today. However, with the advent of high-performance cloud-based databases and low-cost storage, organizations — including Gigamon — are using these technologies to develop SIEM capabilities at a fraction of the cost of traditional SIEMs. In this session, we will highlight the potential financial and operational benefits of this approach and examine key issues when designing and deploying a security data lake.
-
Logs or Packets — Which is Better for Hybrid Cloud Security?
Carl Rios, Cloud Architect, Public Sector, and Stephen Goudreault, Cloud Security Evangelist
If your security tools rely on logs, you may not be seeing the whole picture. In fact, the picture may not even be reliable. That’s because logs can be overwritten, manipulated, and deleted by bad actors. To achieve a more proactive security and compliance posture, adding network-derived context to MELT data brings the entire picture into focus. In this session, we’ll discuss how immutable network intelligence enables you to spot SSL/TLS vulnerabilities, identify port spoofing, and stop rogue activities before damage is done.
-
Security Automation Architecture Strategies
Martyn Crew, Senior Director, Solutions Marketing, Chris Ebley, CTO Blackwood, and Crist Watts, Technical Lead Aplura
Join Chris Ebley (CTO at Blackwood Associates) and Crist Watts (Splunk Technical Lead at Aplura) as they share security automation strategies and answer frequently asked questions. Both Chris and Crist work for Gigamon professional services partners and have developed successful strategies that leverage Gigamon for faster detection and reaction to threats across the hybrid enterprise. These strategies, ideas, and techniques increase network-layer visibility and your organization’s ability to proactively detect and respond to threats, supporting security operations and compliance efforts as well.
-
Operationalizing Zero Trust: What It Really Takes
Ian Farquhar, Security CTO
Has a vendor ever told you “Buy us and your Zero Trust journey is complete?” They either don’t understand Zero Trust or think you don’t. In this session, Gigamon Security CTO Ian Farquhar will discuss what it really takes to operationalize Zero Trust. Hear about minimizing implicit trust, implementing constant risk and posture assessments, and how to orchestrate security responses driven by risk determination. Ian will also discuss how to introduce these concepts to improve overall security posture.