Featured
GigaVUE Cloud Suite Dependencies - AWS Ports & Protocols
Ron Howard, Technical Success Manager, Gigamon
Gigamon Product Clinic #3: GigaVUE Cloud Suite Dependencies - AWS Ports & Protocols
Join us for another clinic in our GigaVUE Cloud Suite Dependencies series. We will cover the details of AWS ports and protocols that you need to be familiar with if you are installing, configuring, and operating our products.
All episodes
-
Scaling VMware Visibility with Automation & Orchestration
Yazhini Rajesh, Technical Marketing Engineer, and Danush Ravishankar, Sr. Staff Professional Services Engineer
Visibility deployments in large and distributed hybrid cloud environments can be time-consuming as well as challenging. IaC, or Infrastructure as Code, can greatly simplify the process of scaling visibility solutions. The use of IaC addresses the issues of scaling deployments, upgrades, and rollbacks. In this session, Gigamon engineers will demonstrate an end-to-end deployment of Gigamon Cloud Suite for VMware using Ansible playbooks along with automating new technologies for accessing encrypted traffic.
-
NSX-T and container blind spots? Here’s what to do.
Bassam Khan, Gigamon VP of Product & Technical Marketing Engineering and Kevin Brady, VMware Staff Solutions Architect
Dev teams are running fast iteratively modernizing apps, often without involving operations teams. Unmonitored network blind spots continue to increase attack surface and make troubleshooting more difficult, often leading to finger-pointing at NetOps teams.
At this webinar VMware and Gigamon Product teams will provide you with walk throughs, use cases and best practices, and even show you a demo of new, cutting-edge technologies.
- 5 steps for successful cloud migration and app modernization
- Recommendations for containerizing and re-securing apps
- How to eliminate all east-west blind spots, including container communications, and
- New technology demo: Feeding intelligence from cloud traffic to your SIEM and observability tools -
Enhancing Your Public, Private & Hybrid Cloud Security Posture
Bassam Khan, VP of Product & Technical Marketing Engineering Gigamon
Clear Away The Fog with Gigamon Deep Observability: As the cloud becomes foggier and more complex, the need to provide teams and the tools they rely on with deep observability into all activity and traffic becomes critically important. For almost twenty years, Gigamon has been the leader in ensuring visibility and tools efficiency to enhance an organization’s public, private and hybrid cloud security postures. Join Gigamon to discover:
- How Gigamon Deep Observability pipeline delivers complete visibility into hybrid traffic
- Techniques to optimize traffic to tools and between hybrid platforms
- A revolutionary new approach to handling cloud traffic encryption and decryption -
A Practitioner's Guide to Container Tapping
Min Chen, Sr. Sales Engineer
App developers are running fast, but have they kept security in mind every step of the way? Even as more applications are containerized, accessing and inspecting container traffic remains elusive. That is, until now. Gigamon Universal Cloud Tap (UCT) is a gamechanger for container visibility. Hear from a veteran Gigamon Sales Engineer as he shares best practices for accessing container traffic to better secure your applications.
-
A Breakthrough Approach to Inspecting Encrypted Traffic
Brian O’Sullivan, Director Product Management, and Jim Mandelbaum, Field Chief Technology Officer
Encrypted traffic is a major blind spot, especially in hybrid could environments. Gigamon has introduced a breakthrough approach that, for the first time, gives your tools full visibility into all encrypted cloud traffic without the heavy lift of traditional decryption methods or the complexity of key management. Our single, non-agent approach works with all encryption protocol standards, including TLS 1.3. Learn about this novel approach and how to put it to work for you.
-
Logs or Packets — Which is Better for Hybrid Cloud Security?
Carl Rios, Cloud Architect, Public Sector, and Stephen Goudreault, Cloud Security Evangelist
If your security tools rely on logs, you may not be seeing the whole picture. In fact, the picture may not even be reliable. That’s because logs can be overwritten, manipulated, and deleted by bad actors. To achieve a more proactive security and compliance posture, adding network-derived context to MELT data brings the entire picture into focus. In this session, we’ll discuss how immutable network intelligence enables you to spot SSL/TLS vulnerabilities, identify port spoofing, and stop rogue activities before damage is done.
-
Cloud Tools: Products & Services Critical to Cloud Migration & Security
Jim Mandelbaum, Field Chief Technology Officer at Gigamon
Cloud Tools: Products and Services Critical to Cloud Migration, Security, Sustainability, and Success Summit
Join Jim Mendelbaum, Field CTO with Gigamon in this webinar to hear how you can better understand your Cloud Traffic and learn about Services Critical to Cloud Migration.
-
Moor Insights & Strategy: Network Observability in the Cloud: - Why it Matters
Will Townsend - Moor Insights & Strategy & Michael Dickman, Chief Product Officer - Gigamon
Network observability is a hot topic for many reasons: today’s distributed nature of work, hybrid cloud environments (including containers), and the evolving connectivity infrastructure, to name a few. Join industry experts Will Townsend from Moor Insights & Strategy and Michael Dickman from Gigamon as they discuss what network observability is all about, why it's crucial in today's cloud-centric landscape, and developments that could impact you in 2024.
-
Securing Your Borders: Evolving Each Layer of Your Security Program
Chaim Mazal, Chief Security Officer & Martyn Crew, Sr. Director Product Marketing - Gigamon
Security is more complicated than ever. Most organizations still have traditional networks, traditional datacenter assets, and employees inside the network. All those resources must be protected by iterating and innovating on the tried-and-true methods. Watch this webinar to learn how Gigamon uses innovative solutions to lock down the layers of your environment.
- Is layered security meaningful in a hybrid world?
- Is a single security model possible?
- How is Gigamon evolving our own IT against this background? -
Best Practices and Insights to Optimize your Cloud Journey
Chris Dittert, Director of Strategic Alliances - Gigamon & Aniket Daptari, Director of Product Management - Nutanix
It's cloudy out there, what direction are we headed?
Hybrid Cloud? Multi-Cloud? Cloud Native? Whether you're already there or planning to migrate, it's critical to understand the networking implications that can have a big impact on your happiness. In this webinar, Chris Dittert from Gigamon joins networking expert Aniket Daptari from Nutanix to discuss key architectural considerations and best practices to help minimize the bumps you may encounter in your cloud journey.
Join to learn more about these issues:
- Being Cloud smart
- Three infrastructure mistakes to avoid
- Seamless workload mobility -
Precryption™ – the New Decryption
Mark Jow, Director Sales Engineering - Gigamon & Tim Christie, Senior Regional Director - Gigamon
In this engaging session, our expert speakers, Tim Christie, and Mark Jow, will unveil the revolutionary Gigamon Precryption™ technology. Discover how Precryption eliminates the biggest blind spot in modern hybrid cloud infrastructure: With Precryption, you'll gain plaintext visibility into all encrypted communications without the need for decryption.
-
Shedding Light on Encrypted Lateral Traffic: Precryption™ Technology Unveiled
Bassam Khan, VP of Product & Technical Marketing Engineering Gigamon
Encrypted lateral traffic: Is there a bigger blind spot? We can only search where the light shines, not where we lost that proverbial key. The shadows today’s hybrid-cloud digital infrastructure provides a hiding space for both threat actors and pesky app troubleshooting issues.
Do any of these apply to your organization?
- Lack of network traffic visibility into east-west, lateral virtual traffic, including container pod-pod or client-server communications.
- No practical way to decrypt that traffic, especially TLS 1.3.
- Current SIEMs and observability tools cannot see and run analytics on unmanaged host communications.
- Tools cannot ingest network packets because of capability, capacity, and cost challenges.
- App owners resist agents in their apps and workloads.You will get a behind the curtain look at this new technology and see a demo of emerging real-life use cases that are just now coming to light. Join us for a view into the future of security and operations.
-
RiskyBiz Podcast: Precryption™ Technology
Ryan Mahoney, Product Marketing Director
In this Risky Business News podcast interviewer,Tom Uren, talks to Ryan Mahoney, Product Director at Giamon. The TLS 1.3 encryption standard makes passive network monitoring inside your network difficult without break and inspect cortortions. Listen to learn more about the Gigamon Precryption Solution.
-
Mastering Cloud Migration: 5 Key Considerations for Seamless Workload Migration
David Winter, AWS; Mark Grigoletto, Presidio; Srinivas Chakravarty, Gigamon
Join this exclusive webinar where industry experts from Gigamon, Presidio and AWS unveil the essential strategies for a successful workload migration to hybrid cloud environments. In today’s ever-evolving tech landscape, organizations are increasingly adopting hybrid cloud solutions powered by the strengths of Gigamon’s visibility and AWS’ cloud capabilities to achieve flexibility, scalability, and cost-efficiency.
During this informative session, we will dive into the top 5 key considerations that are crucial to ensure a smooth and secure transition of your workloads into the cloud, our expert panel will cover:
- Security and Compliance
- Data Migration Strategies
- Performance Monitoring
- Cost Optimization
- Scaling and Future-ProofingDon’t miss this chance to stay ahead in the cloud computing landscape.
-
Cloud Tools and Product Success Starts (and Ends) with the Data
Martyn Crew, Senior Director of Product Marketing at Gigamon
The cloud has done nothing to make IT simpler. Tools, products, and services have proliferated to an alarming degree and many people fear we are recreating the siloes of the 2000s. Learn how the Gigamon Deep Observability Pipeline can provide a single platform to amplify the power of your cloud, security, and observability tools with network-derived intelligence and insights. Find out how Gigamon:
-
Enhancing Business Agility: Amplifying Your Cloud and Security Program
Paul Farley, CISO, NCR Voyix and Jim Mandelbaum, Cloud Architect and Field CTO
Today’s modern cloud-first organizations are continuing to invest in advancing digital transformation initiatives to heighten business agility, while tackling an ever-more dangerous threat landscape in an uncertain economy. Join us for an engaging conversation on how to increase application performance, exceed expectations to realize the full potential of hybrid and multi-cloud infrastructures while cutting costs, and reducing complexity. Our panelists will also explore how to amplify the power of traditional security and observability tools with actionable network-derived intelligence and insights to eliminate blind spots, maintain visibility into all data-in-motion – including East-West encrypted and container traffic as well as improving fidelity and proactively mitigate compliance risk.
-
Unlock Ultimate Hybrid Cloud Security: Join Nutanix for Expert Insights
Srinivas Chakravarty, Vice President Cloud Ecosystems, and Aniket Daptari, Director of Product Management
In today's rapidly evolving digital landscape, securing your hybrid cloud environment while ensuring network stability has become paramount. Whether you're a seasoned IT professional or just beginning your cloud journey, this webinar is tailored to provide you with actionable insights and strategies to fortify your hybrid cloud infrastructure.
-
Gigamon Analyst Connection: 5 Pragmatic Tips for Preventing Ransomware
Alan Weckel, Co-Founder and Analyst, 650 Group; Michael Dickman, Chief Product Officer, Gigamon
Making security systems more effective with less cost
Ransomware is a devastating cyberthreat that continues to grow and wreak havoc throughout all industries. CISOs have a deep desire to protect against every threat they possibly can, and eliminate every potential blind spot, but rarely have unlimited budget, time, and people to do so. In this webinar, hear from Michael Dickman, Chief Product Officer at Gigamon, and Alan Weckel, Co-Founder and Analyst at the 650 Group, about how you can uplevel your defense against ransomware while keeping costs in check.
- Hear best practices for making Security investments go further, achieving better signal-to-noise while managing tooling costs
- Walk away understanding how to detect encrypted lateral movement from a threat actor
- Take SIEMs, NDRs, IDSs, and Firewalls to the next level -
Ensuring Security for Hybrid Cloud Companies
Nitin Negri, Senior Manager, Cyber Security Engineering & Oper, Micron Technologies and Martyn Crew, Senior Dir., Gigamon
As hybrid cloud architectures become the new normal for enterprises and government organizations, many IT and Security leaders struggle with maintaining the balance of meeting business demands for faster application development and deployment with the need to maintain and enhance their hybrid cloud security posture.
-
Why Firewalls Are No Longer Enough
Stephen Goudreault, Cloud Security Evangelist, Gigamon
Organizations are exploring solutions to fortify their security posture as the threat landscape becomes more sophisticated and the number of breaches skyrockets. As teams look for new solutions, the challenge remains:
How does an organization secure network traffic once it crosses a firewall and becomes East-West traffic?
Join us to learn how you can build a security posture that combines firewalls with E-W visibility to enable successful detection and response of security issues.
In this webinar, you will:
- Learn the importance of integrating East-West visibility into your security posture
- Discover the tools you need to effectively analyze East-West traffic
- Understand how to create a scalable security posture that combines covers North-South, East-West, and encrypted traffic -
Multi-Cloud Deep Observability From the Enterprise Cloud to the Tactical Edge
Carl Rios, Cloud Architect, Public Sector
Hosted By: Gigamon & Carahsoft
Hybrid cloud infrastructure is complex and time-consuming to secure, manage and maintain. Modern organizations must contend with multiple cloud providers and a myriad cloud, security, and observability tools, which add layers of complexity and make it challenging to detect security threats and performance anomalies.
The DoD must not only face these challenges, but also must account for disrupted, disconnected, intermittent and low-bandwidth (DDIL) cloud environments that support theaters of operation. This webinar included how the hybrid-cloud network is the foundation of the hyper-connected digital infrastructure, and why network visibility and control are paramount for the proper operation and protection of all the network components and capabilities.
During this webinar, attendees learned how to:
- Access network traffic insights without blind spots through Gigamon's Deep Observability Pipeline
- Empower their mission to safeguard critical network infrastructure and assets with high-performance, next-generation network visibility
- Become agile for edge and tactical cloud network deployments
- Normalize and consolidate network traffic insights with one Visibility Fabric
- Derive continuous insights into the behavior and activity in their networks -
See Concealed Threat Activity Before Encryption
Carl Rios, Cloud Architect, Public Sector
Hosted By: Gigamon & Carahsoft
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure.
This technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At the same time, Gigamon Precryption technology is reducing complexity and costs to decryption. Precryption offers plaintext visibility into encrypted communications before the payload is encrypted – no decryption required.
In this complimentary webinar, attendees learned how to:
- Understand Precryption technology and why it is different
- Eliminate blind spots and prevent cybercrime using Precryption
- Help security teams achieve TLS 1.3 compliance, boost DNS security and extend Zero Trust architecture into the hybrid cloud -
Securing the Hybrid Cloud: WWT, Nutanix and Gigamon
Bassam Khan, VP of Product & Technical Marketing Engineering, Gigamon; Matt Berry, WWT; Tu McLendon, Nutanix
The Security of hybrid cloud models is a crucial topic that holds significance in today's technology world. As the landscape of artificial intelligence continues to expand, safeguarding your data within the diverse realms of cloud environments becomes paramount.
This webinar will shed light on how prioritizing cloud security is essential for organizations. By investing in best practices for cloud security, businesses can not only fortify their data against potential threats but also optimize cloud performance.
Discover how the partnership between WWT, Gigamon and Nutanix can provide an innovative approach to securing your hybrid cloud environments.
-
Design a Cost-Efficient AWS Visibility Architecture
Jim Mandelbaum, Field CTO, Gigamon and Ryan Mahoney, Product Marketing Manager, Gigamon
Feeding traffic from AWS to security and performance monitoring tools can become very expensive as environments scale and deploy NDR/XDR sensors. Organizations can be overwhelmed by the surprisingly high costs of AWS, especially when load balancers are needed to support large amounts of volume.
-
Achieving a Holistic View of What Is Happening in Your Hybrid Infrastructure
Chris Nicholas, SVP, Cloud Solutions Group, Trace3, Adam Hicks, Practice Dir. Cloud Platform Engineering, Trace3
The complexity of hybrid application environments obscures root cause identification hinders proactive incident resolution, and negatively impacts user experience. Organizations need a unified observability solution that delivers full-stack visibility, leverages AI for predictive and prescriptive insights, establishes user-centric Service Level Objectives (SLOs), and generates timely, actionable alerts to maintain optimal service delivery.
-
Safeguarding Critical Infrastructure
Cyber Readiness Institute, Energy and Commerce Committee, House Energy and Commerce Committee
Critical infrastructure houses our nation’s most crucial assets, making it a prime target for adversaries. To address this threat, robust cybersecurity measures are necessary. In this panel, we’ll hear how Congress has worked together to pass legislation and policy that bolster our nation’s cybersecurity efforts and safeguard crucial assets. The discussion will shed light on recent incidents involving critical infrastructure, including the recent AT&T outage, and will also highlight the work that remains.
Presenters:
[Moderator] Karen Evans, Managing Director, Cyber Readiness Institute
Slate H. Herman, Counsel, Communications and Technology, Energy and Commerce Committee (Majority)
Johanna Thomas, Counsel, Communications and Technology Subcommittee, House Energy and Commerce Committee -
Hybrid Cloud Security: Closing the Preparedness Gap & Resolving Top Challenges
Melinda Marks, Practice Director, Enterprise Strategy Group & Martyn Crew, Senior Director, Gigamon
Enterprise Strategy Group (ESG) research data shows that 83% of organizations are lifting and shifting workloads to the cloud. As companies utilize cloud services for productivity, scale, and modernizing software development, security needs a means of keeping up and effectively securing these hybrid cloud environments.
However, the complexity of today’s attack surface, new stakeholders involved in security decisions, and limited cloud knowledge in SecOps teams impede effective hybrid cloud protection.
Register for this Fireside Chat to understand how to close the hybrid cloud security gap, with our expert speakers ESG Cybersecurity Practice Director Melinda Marks and Martyn Crew, Senior Director of Solutions Marketing and Partner Technologies at Gigamon. Together, Crew and Marks will cover, alongside rich ESG data:
• Cloud modernization trends
• Hybrid cloud security best practices
• AI preparedness: Cyber-adversary advantages gained from AI
• And the components of Gigamon Deep Observability Pipeline, which provides app monitoring across cloud environments. -
Protecting and Securing Cloud Environments
Martyn Crew, Senior Director of Solutions Marketing and Partner Technologies
Building defenses, protecting our walls and guarding the castle. They all sounded a lot easier when the castle walls were solid, clear and defined. These days, it can feel a bit more like you are jousting in fog to protect borders you can’t see or define. Not only are bad actors evolving, but the cloud environments you are asked to protect and secure are rapidly multiplying and becoming more complex. It is time to get out of the fog and stop jousting with air!
-
GigaVUE Cloud Suite Dependencies - AWS Ports & Protocols
Ron Howard, Technical Success Manager, Gigamon
Gigamon Product Clinic #3: GigaVUE Cloud Suite Dependencies - AWS Ports & Protocols
Join us for another clinic in our GigaVUE Cloud Suite Dependencies series. We will cover the details of AWS ports and protocols that you need to be familiar with if you are installing, configuring, and operating our products.