Featured
Maximizing Network Threat Detection: Enhancing Security
Matt Berry, Global Field Cyber CTO, WWT; Martyn Crew, Senior Director of Product Marketing and Partner Technologies, Gigamon; Grant Dishman, Director of Channel Sales Engineering, ExtraHop
Unlocking Speed, Precision, and Efficiency in NDR
NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of ExtraHop’s threat detection by ensuring it has access to all network traffic regardless of whether this is data center or cloud traffic. Join WWT, ExtraHop and Gigamon experts as they discuss how ExtraHop and Gigamon combine to provide:
- The fastest, most precise, and efficient network threat detection
- Access to lateral, encrypted and container traffic to eliminate blind spots
- Massively reduced cloud traffic access costs
All episodes
-
Delivering a Superior Application User Experience
Martyn Crew, Senior Director, Solutions Marketing - Gigamon & Stephen Goudreault, Cloud Security Evangelist - Gigamon
Log-based tools make it nearly impossible for CloudOps and DevOps teams to quickly pinpoint customer experience and performance issues. While logs are important for understanding what’s happened on the network, they can’t provide the real-time North-South and East-West visibility that’s needed for effective monitoring and troubleshooting. See how the Gigamon Deep Observability Pipeline delivers network-derived intelligence to MELT (Metrics, Events, Logs, and Traces)-based observability and SIEM tools like Dynatrace and Splunk.
-
How to Get Ahead of Network Issues
Irvan Guerra, Solutions Marketing Manager - Gigamon & Scott Hamilton, Sr. Sales Engineer - Gigamon
As networks become more complex, ensuring availability, reliability, performance, and security becomes increasingly difficult. While Gigamon provides powerful troubleshooting capabilities, preventing the occurrence of problems in the first place is a key part of any resilience strategy. Over the years, Gigamon has developed tools and approaches to ensure the optimal health of your network. Learn how to use our no-cost GigaScan and HealthCheck services to assess the health of your network and avoid costly downtime.
-
Application Intelligence Best Practices: Leveraging Layer 4-7 Capabilities
Surbhi Paul, Director, Product Marketing - Gigamon & Muhammad Durrani, Technical Marketing Engineer - Gigamon
With today’s evolving hybrid cloud, you can’t afford to compromise when it comes to application performance and security monitoring. Gigamon Application Filtering Intelligence (AFI) reduces tool burden by selectively sending application traffic to tools. Application Metadata Intelligence (AMI) goes one step further to extract application attributes from traffic and then efficiently deliver them to SIEMs, APMs, and observability tools. In this session, Gigamon technical leaders will demonstrate how to use App Intel to isolate performance bottlenecks and solve tough security cases.
-
Using a Security Data Lake to Reduce SIEM Costs
Martyn Crew, Senior Director, Solutions Marketing - Gigamon & Bryan Lokey, Sr Director, Security Engineering - Gigamon
SIEMs are one of the most important but also one of the most expensive security tools employed today. However, with the advent of high-performance cloud-based databases and low-cost storage, organizations — including Gigamon — are using these technologies to develop SIEM capabilities at a fraction of the cost of traditional SIEMs. In this session, we will highlight the potential financial and operational benefits of this approach and examine key issues when designing and deploying a security data lake.
-
Gain Visibility into Encrypted Core and 4G+5G Converged Core
Ryan Mahoney, Product Marketing Director - Gigamon & Meenal Agarwal, Director Product Management - Gigamon
“How can we get clear-text visibility into a modern encrypted 5G core?” is one of the questions we hear most often from our mobile operator customers. Learn how Gigamon addresses this critical visibility issue and how we support the world’s largest mobile operators when they make the choice to go with a converged core, serving both 4G and 5G traffic.
-
Maximizing Tools Efficiency, Minimizing Carbon Footprint
Ryan Mahoney, Product Marketing Director - Gigamon & Naveen Bodla, Sr. Principal Solutions Architect - Gigamon
As networks grow, so does the resource demands on network monitoring and security tools. Gigamon has an extensive array of tool optimization technologies, designed to extend the life of tools, saving both tool costs and carbon footprint. We’ll talk about the Gigamon tech enabling these savings. Plus, we’ll show you how to estimate your own savings, as well as demonstrate our free Discovery & Optimization Kit, which you can use to directly measure the efficiency savings in your own environment.
-
Modern Security Portfolio – Toolsets Organizations Need Now
Martyn Crew, Senior Director of Solutions Marketing and Partner Technologies - Gigamon
Building defenses, protecting our walls and guarding the castle. They all sounded a lot easier when the castle walls were solid, clear and defined. These days, it can feel a bit more like you are jousting in fog to protect borders you can’t see or define. Not only are bad actors evolving, but the cloud environments you are asked to protect and secure are rapidly multiplying and becoming more complex. It is time to get out of the fog and stop jousting with air! In this webinar, you will learn how to enable a modern security portfolio through identify tools, strategies and solutions to build the protective defense layers your organization needs to secure its’ vital cloud environments.
-
Securing Your Borders: Evolving Each Layer of Your Security Program
Chaim Mazal, Chief Security Officer & Martyn Crew, Sr. Director Product Marketing - Gigamon
Security is more complicated than ever. Most organizations still have traditional networks, traditional datacenter assets, and employees inside the network. All those resources must be protected by iterating and innovating on the tried-and-true methods. Watch this webinar to learn how Gigamon uses innovative solutions to lock down the layers of your environment.
- Is layered security meaningful in a hybrid world?
- Is a single security model possible?
- How is Gigamon evolving our own IT against this background? -
Precryption™ – the New Decryption
Mark Jow, Director Sales Engineering - Gigamon & Tim Christie, Senior Regional Director - Gigamon
In this engaging session, our expert speakers, Tim Christie, and Mark Jow, will unveil the revolutionary Gigamon Precryption™ technology.
Discover how Precryption eliminates the biggest blind spot in modern hybrid cloud infrastructure: With Precryption, you'll gain plaintext visibility into all encrypted communications without the need for decryption.
-
RiskyBiz Podcast : Precryption™
Ryan Mahoney, Product Marketing Director - Gigamon
In this Risky Business News podcast interviewer,Tom Uren, talks to Ryan Mahoney, Product Director at Giamon. The TLS 1.3 encryption standard makes passive network monitoring inside your network difficult without break and inspect cortortions. Listen to learn more about the Gigamon Precryption Solution.
-
Shedding Light on Encrypted Lateral Traffic: Precryption™ Unveiled
Bassam Khan, VP of Product & Technical Marketing Engineering - Gigamon
Encrypted lateral traffic: Is there a bigger blind spot? We can only search where the light shines, not where we lost that proverbial key. The shadows today’s hybrid-cloud digital infrastructure provides a hiding space for both threat actors and pesky app troubleshooting issues.
Do any of these apply to your organization?
- Lack of network traffic visibility into east-west, lateral virtual traffic, including container pod-pod or client-server communications.
- No practical way to decrypt that traffic, especially TLS 1.3.
- Current SIEMs and observability tools cannot see and run analytics on unmanaged host communications.
- Tools cannot ingest network packets because of capability, capacity, and cost challenges.
- App owners resist agents in their apps and workloads.You will get a behind the curtain look at this new technology and see a demo of emerging real-life use cases that are just now coming to light. Join us for a view into the future of security and operations.
-
Protect Your Edge And Tactical Environments With Gigamon Deep Observability
Josh O'Sullivan, Chief Technology Officer, Ardalyst and LaFon Hamilton, Deep Observability Engineer, Gigamon
One of the challenges facing public sector organizations, such as U.S. and international government agencies, is the inability to carry IT gear from one place to another to ensure security and compliance. Many of these organizations have critical requirements for mobile deployable units that don’t compromise enterprise-grade functionality for comprehensive traffic and security intelligence.
Join us to learn more about Gigamon and Ardalyst. They are dedicated to enabling organizations to build an effective and efficient cybersecurity posture, making Gigamon the ideal choice for organizations to uplevel their security and monitoring capabilities.
Learn how to:
- Empower your mission to safeguard critical network infrastructure and assets with high-performance, next-generation network visibility
- Become agile for edge and tactical deployments to help future-proof complex network visibility requirements through small footprint
- Provide satellite network protection from cyberattacks and secure OT environments through robust security measures and continuous monitoring -
Security Automation Architecture Strategies
Martyn Crew, Senior Director, Solutions Marketing, Chris Ebley, CTO Blackwood, and Crist Watts, Technical Lead Aplura
Join Chris Ebley (CTO at Blackwood Associates) and Crist Watts (Splunk Technical Lead at Aplura) as they share security automation strategies and answer frequently asked questions. Both Chris and Crist work for Gigamon professional services partners and have developed successful strategies that leverage Gigamon for faster detection and reaction to threats across the hybrid enterprise. These strategies, ideas, and techniques increase network-layer visibility and your organization’s ability to proactively detect and respond to threats, supporting security operations and compliance efforts as well.
-
Gigamon Analyst Connection: 5 Pragmatic Tips for Preventing Ransomware
Alan Weckel, Co-Founder and Analyst, 650 Group; Michael Dickman, Chief Product Officer, Gigamon
Making security systems more effective with less cost
Ransomware is a devastating cyberthreat that continues to grow and wreak havoc throughout all industries. CISOs have a deep desire to protect against every threat they possibly can, and eliminate every potential blind spot, but rarely have unlimited budget, time, and people to do so. In this webinar, hear from Michael Dickman, Chief Product Officer at Gigamon, and Alan Weckel, Co-Founder and Analyst at the 650 Group, about how you can uplevel your defense against ransomware while keeping costs in check.
- Hear best practices for making Security investments go further, achieving better signal-to-noise while managing tooling costs
- Walk away understanding how to detect encrypted lateral movement from a threat actor
- Take SIEMs, NDRs, IDSs, and Firewalls to the next level -
Why Firewalls Are No Longer Enough
Stephen Goudreault, Cloud Security Evangelist, Gigamon
Organizations are exploring solutions to fortify their security posture as the threat landscape becomes more sophisticated and the number of breaches skyrockets. As teams look for new solutions, the challenge remains:
How does an organization secure network traffic once it crosses a firewall and becomes East-West traffic?
Join us to learn how you can build a security posture that combines firewalls with E-W visibility to enable successful detection and response of security issues.
In this webinar, you will:
- Learn the importance of integrating East-West visibility into your security posture
- Discover the tools you need to effectively analyze East-West traffic
- Understand how to create a scalable security posture that combines covers North-South, East-West, and encrypted traffic -
Maximize Existing Security Tools - Address Palo Alto CVE-2024-3400 Vulnerability
Bassam Khan, Vice President of Product Marketing, Gigamon and Stephen Goudreault, Cloud Security Evangelist, Gigamon
In light of the critical CVE-2024-3400 vulnerability disclosed by Palo Alto Networks, it’s clear that traditional security tools need to be leveraged more effectively to detect and mitigate sophisticated threats. This webinar will guide attendees on how to enhance the utility of existing security infrastructures, like NDR, SIEM, Elastic, or even observability tools, to achieve deeper network visibility and security intelligence, ensuring robust defense mechanisms against both known and emerging threats. This is a show-and-tell session where you will see advanced practices for: - Enhanced East-West Traffic Monitoring: Strategies to ensure comprehensive inspection of lateral communication within networks using your current security tools. - Decryption and Compliance: Balancing the decryption of network traffic for security purposes while maintaining strict compliance and privacy standards. - Intelligence Extraction from Network Traffic: Techniques to harness rich metadata from network packets in your SIEM for proactive threat detection. - Post-Breach Threat Detection: Best practices for utilizing network-derived metadata for identifying and responding to post-compromise activities, including practical applications of Indicators of Compromise (IoCs).
-
Getting the Most from your Investment in Microsegmentation
Ian Farquhar, Security CTO; and Martyn Crew, Sr. Director of Product Marketing and Partner Technologies
Microsegmentation, like EDR, NDR, and a myriad of other tools, is an important part of an organization’s defense-in-depth strategy. But, like any one of those tools, microsegmentation is not an answer in itself. Join Gigamon Security CTO, Ian Farquhar, and Technology Partner Senior Director, Martyn Crew, as we discuss how to get the most out of your existing or planned microsegmentation investment.
In this webinar, Ian and Martyn will discuss:
- The pros and cons of microsegmentation
- Where microsegmentation fits within a defense-in-depth security strategy
- How Gigamon can increase the technical effectiveness and ROI of your microsegmentation investment -
Practical Advice for Inline and Out-of-Band Decryption
Srudi Dineshan, Sr. Product Marketing Manager; Ram Mohan, Tech. Marketing Engineer; Martyn Crew, Sr. Dir. Solutions Mktg.
Use of encryption for network traffic continues to rise, for both good and bad. Today over 85% of malware relies on encryption to hide in plain sight. The need to decrypt and inspect traffic is easy to see and is recommended by The NSA. Deploying actual decryption in a cost-effective and scalable way while meeting privacy and compliance requirements might not have been easy. However, it doesn’t need to be difficult or expensive.
Gigamon TLS/SSL Decryption offers a centralized, high-performance solution that improves existing security tools by decrypting traffic once and inspecting it many times. Decrypting traffic exiting the network enables command and control detection, preventing data exfiltration and strengthening the company’s compliance stance. By being able to selectively choose what traffic to decrypt and what not to, it becomes possible to engage the right tools to enhance the security posture effectively.
This webinar is designed to equip security and network architects with knowledge of current decryption trends, known challenges, and recommended solutions by demonstrating real-world use cases.
-
Supercharging Public Sector and Education Technology and Security
Martyn Crew, Sr. Director of Solutions Marketing and Partner Technologies, and Michael Musick, Sr. Manager, Sales Engineering
The digital transformation within the public sector and educational institutions calls for an urgent enhancement of technological capabilities and security measures.
This event will address the unique challenges and opportunities in implementing advanced technologies and robust security systems in public and educational environments. Experts from market-leading vendors will provide insights into the latest tools and strategies for improving service delivery, safeguarding sensitive data, and ensuring compliance with regulatory standards.
Join this webinar to learn more about Gigamon use cases and the latest technology solutions that cater to the unique needs of your sector while optimizing tool efficiency.
-
Visibility into Applications, Workloads and Traffic: Secret Life of Your Network
Martyn Crew, Sr. Director, Product Marketing, and Jim Mandelbaum, Field CTO, Gigamon
Join Martyn Crew, Sr. Director, Product Marketing, and Jim Mandelbaum, Field CTO, Gigamon to explore the Secret Life of Your Network to gain visibility into applications, workloads, and traffic.
You will learn how the Gigamon Deep Observability Pipeline provides the visibility you need to monitor and manage the traffic generated by your applications.
-
Cybersecurity Fundamentals: Building Strong Defenses from Network Observability
Irvin Guerra, Solutions Marketing Manager and Javier Inclan, Senior Technical Product Marketing Manager
As organizations migrate to the cloud, they face a new wave of cybersecurity challenges. Today’s security measures frequently fall short in detecting and responding to threats that move laterally across virtual infrastructure, often using encryption to hide. In this webinar, we will cover how a single cybersecurity program built on network visibility across hybrid cloud environments can lead to effective threat management against today’s attacks.
Join us as we discuss:
- Ransomware attack techniques, focusing on virtual lateral traversal
- Deep packet inspection’s role in identifying and mitigating network threats
- Illuminating blind spots in your hybrid cloud environments to reduce risk posed by lateral movement offensive techniques
- Incident response strategies for rapid containment and remediation of network threats
- Best practices for integrating threat management into your hybrid cloud security architecture
Attendees will gain a deeper understanding of the latest threats using network traffic as an attack vector and walk away with actionable insights to improve their organization's hybrid cloud security posture from comprehensive network visibility.
-
Maximizing Network Threat Detection: Enhancing Security
Matt Berry, Global Field Cyber CTO, WWT; Martyn Crew, Senior Director of Product Marketing and Partner Technologies, Gigamon; Grant Dishman, Director of Channel Sales Engineering, ExtraHop
Unlocking Speed, Precision, and Efficiency in NDR
NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of ExtraHop’s threat detection by ensuring it has access to all network traffic regardless of whether this is data center or cloud traffic. Join WWT, ExtraHop and Gigamon experts as they discuss how ExtraHop and Gigamon combine to provide:
- The fastest, most precise, and efficient network threat detection
- Access to lateral, encrypted and container traffic to eliminate blind spots
- Massively reduced cloud traffic access costs