Featured

Securing Your Borders: Evolving Each Layer of Your Security Program
Chaim Mazal, Chief Security Officer & Martyn Crew, Sr. Director Product Marketing - Gigamon
Security is more complicated than ever. Most organizations still have traditional networks, traditional datacenter assets, and employees inside the network. All those resources must be protected by iterating and innovating on the tried-and-true methods. Watch this webinar to learn how Gigamon uses innovative solutions to lock down the layers of your environment.
- Is layered security meaningful in a hybrid world?
- Is a single security model possible?
- How is Gigamon evolving our own IT against this background?
All episodes
-
The Key Role of Network Visibility for Zero Trust
John Kindervag Creator of Zero Trust, Guest Speaker & Ian Farquhar, Field CTO - Gigamon
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated.
-
Forrester – The Power of Visibility in Addressing Today’s Threat Landscape
Tope Olufon, Senior Analyst - Forrester
Gigamon’s guest, Forrester security analyst, Tope Olufon, discusses the threat landscape and how we can deal with it in very practical terms, using deep observability techniques, visibility into encrypted traffic, and focusing on the network layer.
-
Zero Trust Security: Truth vs. Fiction
Ian Farquhar, Security CTO - Gigamon
As organizations progress along their Zero Trust journey, many start to pursue approaches which pivot around particular capabilities: endpoint, identity, firewalls. Often these orgs are paying back some technical debt in doing so, and the vendors who benefit are cheering on this investment. But is this a truly sensible approach? Is this Zero Trust truth, or Zero Trust fiction? How can we plan our Zero Trust journey to reap the benefits Zero Trust can give?
-
Operationalizing Zero Trust with Deep Observability
John Quezada, Sr. Solutions Engineer, Public Sector - Gigamon
Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and elimination of blind spots is implicitly assumed.
-
Operationalizing Zero Trust: What It Really Takes
Ian Farquhar, Security CTO - Gigamon
Has a vendor ever told you “Buy us and your Zero Trust journey is complete?” They either don’t understand Zero Trust or think you don’t. In this session, Gigamon Security CTO Ian Farquhar will discuss what it really takes to operationalize Zero Trust. Hear about minimizing implicit trust, implementing constant risk and posture assessments, and how to orchestrate security responses driven by risk determination. Ian will also discuss how to introduce these concepts to improve overall security posture.
-
Securing Your Borders: Evolving Each Layer of Your Security Program
Chaim Mazal, Chief Security Officer & Martyn Crew, Sr. Director Product Marketing - Gigamon
Security is more complicated than ever. Most organizations still have traditional networks, traditional datacenter assets, and employees inside the network. All those resources must be protected by iterating and innovating on the tried-and-true methods. Watch this webinar to learn how Gigamon uses innovative solutions to lock down the layers of your environment.
- Is layered security meaningful in a hybrid world?
- Is a single security model possible?
- How is Gigamon evolving our own IT against this background? -
Zero Trust in An Encrypted World
Stephen Goudreault, Cloud Security Evangelist - Gigamon
Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and techniques over and over again. In this presentation, we will briefly examine two top models and then explore what that means on a practical level. We will broadly look at some traditional network visibility solutions and challenge some of the norms around these systems. Do they really solve the problem in the best way in a world where everything is encrypted and threat actors hide in plain sight?
Key takeaways:
- Can classic tools such as logging really solve for the visibility gap?
- How to deal with the encryption/decryption paradox?
- What method can solve for lateral visibility? -
See Concealed Threat Activity Before Encryption with Precryption
Ryan Mahoney, Product Marketing Director - Gigamon
Threat actors conceal lateral movement and other activity within encrypted communications, making it incredibly difficult to detect. Gigamon Precryption™ technology is a breakthrough approach to eliminating this blind spot in hybrid cloud infrastructure while achieving TLS 1.3 compliance. Precryption offers plaintext visibility into encrypted communications before the payload is encrypted -- no decryption required. Join us to learn how this technology works and hear about four key use cases.
What you’ll learn:
- What is Precryption technology is and why is it different?
- How does Precryption eliminate blind spots and thwart cybercrime?
- How does Precryption help security teams achieve TLS 1.3 compliance, boost DNS security, and extend Zero Trust Architecture into the hybrid cloud? -
Precryption™ – the New Decryption
Mark Jow, Director Sales Engineering - Gigamon & Tim Christie, Senior Regional Director - Gigamon
In this engaging session, our expert speakers, Tim Christie, and Mark Jow, will unveil the revolutionary Gigamon Precryption™ technology. Discover how Precryption eliminates the biggest blind spot in modern hybrid cloud infrastructure: With Precryption, you'll gain plaintext visibility into all encrypted communications without the need for decryption.