Featured
“Wow” Your App Owners with Application Insights Derived from Deep Packet Inspection
Bassam Khan, VP of Product & Technical Marketing Engineering Gigamon, and Yazhini Rajesh, Technical Marketing Engineer
DevOps must deliver business agility and high application performance together with strong application security. How can security and infrastructure teams work with DevOps to ensure network intelligence-derived security is incorporated directly into the software development process – without compromising speed or quality? In this session we will walk you through a free-to-try, self-contained AWS-based Gigamon tool that demonstrates how network-derived intelligence can help application owners identify and prevent misconfigurations, compliance violations, and vulnerabilities.
All episodes
-
IDC Research: Observability and Security — Two Sides to the Same Coin
Stephen Elliot, Group Vice President, IDC Research
Join IDC analyst Stephen Elliot, Group Vice President, I&O, Cloud Operations, and DevOps for this keynote session where he will share the latest trends around the intersection of observability, security, and the expanding role of network telemetry in securing and managing modern hybrid cloud infrastructure. Stephen will discuss the value of leveraging shared data across teams to optimize tooling, streamline analysis, and foster tighter collaboration, sharing best practices along the way for optimizing business outcomes.
-
Safeguarding Hybrid Cloud Networks for Leading Organizations: Business and Technology Updates
Shane Buckley, President and Chief Executive Officer, and Michael Dickman, Chief Product Officer
Join our opening keynote to hear the latest business and market updates from President and CEO Shane Buckley, followed by an update from Chief Product Officer Michael Dickman on the latest technology innovations to the Gigamon Deep Observability Pipeline, including a peak into the future roadmap. This session will also include the presentation of our 2024 Giga HERO customer awards, recognizing select customers for their ability to better secure and manage their hybrid cloud infrastructure with Gigamon.
-
Customer Panel Discussion: Closing the Cybersecurity Gap, Moderated by Gigamon CSO
Chaim Mazal, Chief Security Officer with Corpay, Jacobs Engineering, and Pacific Dental
Join us for an insightful panel discussion on Closing the Cybersecurity Preparedness Gap with Deep Observability, featuring Gigamon customers. This session will delve into the security challenges facing CISOs today, moderated by Gigamon Chief Security Officer Chaim Mazal. Customers will share real-world experiences, strategies, and solutions they have implemented to better secure and manage their hybrid cloud infrastructure. Gain valuable insights on strengthening your organization's hybrid cloud security posture.
-
Gain Cloud Visibility and Lower TCO by up to 80 Percent
Dave Arkley, CFO and Ryan Mahoney, Product Marketing Director
The public cloud has been a game-changer for many organizations. In contrast to traditional on-premises architectures, it enables applications to be deployed with flexibility and agility. The downside is that public cloud costs can be high and, in some cases, exorbitant when it comes to adding management capabilities like ensuring visibility. Join Gigamon CFO, Dave Arkley, and resident cost-expert Ryan Mahoney, as they detail how Gigamon helps you to gain the pervasive cloud visibility you need while lowering your total cost of ownership by up to 80 percent.
-
Enhancing Hybrid Cloud Visibility and Security with Nutanix and Gigamon
Jirah Cox, Field CTO, Nutanix
A hybrid cloud infrastructure provides significant benefits in terms of operational agility, efficiency and scalability. However, the management and security of hybrid and multi-cloud environments can be a serious challenge. Join this session to learn how the Gigamon Deep Observability Pipeline and Nutanix’ hyper-converged infrastructure optimizes use of resources to deliver end-to-end visibility; real-time operational insights; fast, precise threat detection, and robust security in even the most sophisticated hybrid and multi-cloud environments.
-
State of the Cybersecurity Industry: How to Address the Preparedness Gap
Chaim Mazal, Chief Security Officer
Despite global information security spending projected at $215B in 2024, today’s organizations are losing ground against cyber criminals. In our annual survey of more than 1,000 security and IT leaders worldwide, we explored cybersecurity challenges and top priorities to secure and manage increasingly complex hybrid cloud infrastructure. Our survey found 1 in 3 organizations were unable to detect a data breach in the last 12 months using existing tools. Why? Join our CSO Chaim Mazal for this keynote session as he shares survey highlights, insights on the state of cybersecurity, and how organizations must adapt to close the preparedness gap.
-
Harness the Power of Network Data with Splunk and Gigamon
Stephen Goudreault, Cloud Security Evangelist, Gigamon and Brady Moyer, Global ISV/Alliance Lead, Splunk
Discover how network-derived intelligence with enhanced metadata empowers you to lower security risk by proactively identifying threats, streamline PCI compliance, accelerate your Zero Trust objectives, and lower costs. In this session, you’ll learn how to unlock the full potential of your network data to gain unparalleled visibility into your hybrid cloud infrastructure and empower your InfoSec and SecOps teams to make informed decisions.
-
Optimizing Data Observability: Harnessing the Power of Cribl and Gigamon
Kam Amir, Director Technology Alliances, Cribl
Explore the synergy between Cribl and Gigamon in enhancing data observability, network performance and security. In today’s data driven landscape, organizations face the challenge of managing vast amounts of data while ensuring performance, security and compliance. This session will show how Cribl’s innovative data routing and transformation capabilities, combined with network intelligence from the Gigamon Deep Observability Pipeline, enable organizations to gain deeper insights that streamline operations, and power informed decisions.
-
Applying Precryption™ Technology to See What's Lurking in Encrypted Cloud Traffic
Brian O’Sullivan, Director Product Management, and Jim Mandelbaum, Field Chief Technology Officer
Even with encryption, ransomware and other threats can find their way into your environment. While encryption is foundational for security and privacy, adversaries can take advantage of encrypted channels to hide activities within virtual workloads and to traverse laterally across the hybrid cloud infrastructure. Gigamon Precryption™ technology is the gamechanger that gives SecOps teams plaintext visibility into encrypted traffic and lateral movements – without the complexity or overhead of traditional decryption. This session will go through how Precryption technology reveals hidden threats plus the latest enhancements to this innovative technology.
-
Closing the Data-in-Motion Compliance Gap
Martyn Crew, Senior Director of Solutions Marketing and Partner Technologies and Muhammad Durrani, Technical Marketing Architect
Meeting compliance standards for data privacy and security is mission critical. Whether you’re in healthcare, retail, financial services, or in the public sector, data privacy regulations require that all data-in-motion and data-at-rest for cloud applications adhere to strict security standards. However, ensuring compliance for applications running on public clouds has proven extremely challenging... until now. In this session, we will discuss and demonstrate how organizations apply Gigamon Application Metadata Intelligence to meet and maintain regulatory compliance.
-
Deep Observability for Kubernetes Lateral Traffic
Surbhi Paul, Director, Product Marketing, and Ed Taylor, Senior Product Manager
According to the 2024 Gigamon Hybrid Cloud Security Report, fewer than half of over 1,000 global IT and security leaders surveyed claim to have lateral East-West visibility across their hybrid cloud infrastructure, which includes container-to-container communications. Threat actors know this and are actively exploiting this oversight, as evidenced by recent high-profile attacks which employed lateral movement to evade detection. In this session, we will cover how you can gain simple and scalable deep observability into container environments, at both packet and metadata levels. You’ll also learn best practices based on recent customer deployment use cases on how to acquire traffic from any container along with accessing and aggregating container traffic from multiple cloud platforms.
-
How to Slash Cloud Monitoring Costs
Ryan Mahoney, Product Marketing Director
Cloud platforms like AWS, Azure, and GCP are modern marvels with immense scalability and flexibility. These benefits can also come with sticker shock when your cloud environment is not optimized. For example, complex tapping and mirroring architectures often lead to unnecessarily high billing costs, especially for packet-based security tools like Cloud Network Detection & Response. In this session, we’ll examine alternative designs and solutions to the default monitoring options from public cloud platforms that can save you a bundle in infrastructure costs.
-
To Tap or Not to Tap and When is an Agent Not an Agent
Brian O’Sullivan, Director Product Management
From an operational perspective, using an agentless solution such as mirroring for virtual traffic access seems ideal. Nothing to install, easier to manage, less expensive etc. In fact, the opposite is true. Agent-based traffic access solutions are easier to configure, yield higher performance, and usually cost less than their agentless counterparts. In this session, we’ll expose the myths and misconceptions about using an agent for traffic access. We’ll also discuss why agents for traffic access are different than traditional tool agents and explain why they might be the best option for your network.
-
What Today’s Security Stack Can... and Can’t Do
Stephen Goudreault, Cloud Security Evangelist and Irvin Guerra, Product Marketing Manager
Every security organization owns a suite of solutions composed of tools covering endpoints, applications, cloud, and network hardware. While these tools deliver the functionality promised, threats are still getting through – so we know more work needs to be done. Folks, it’s 2024 and we still don’t know what’s running on our network! Join us as we walk through: how you can identify critical gaps in your organization’s security posture, the components of a “modern” security posture and finally, how to use network-derived intelligence and telemetry to consolidate tool functions across multiple areas (cloud, observability, security, network) into a single cohesive and proactive security posture.
-
“Wow” Your App Owners with Application Insights Derived from Deep Packet Inspection
Bassam Khan, VP of Product & Technical Marketing Engineering Gigamon, and Yazhini Rajesh, Technical Marketing Engineer
DevOps must deliver business agility and high application performance together with strong application security. How can security and infrastructure teams work with DevOps to ensure network intelligence-derived security is incorporated directly into the software development process – without compromising speed or quality? In this session we will walk you through a free-to-try, self-contained AWS-based Gigamon tool that demonstrates how network-derived intelligence can help application owners identify and prevent misconfigurations, compliance violations, and vulnerabilities.
-
End the “Blame Games” with High-Precision App Troubleshooting
Irvin Guerra, Solutions Marketing Manager, and Muhammad Durrani, Technical Marketing Engineer
Not knowing whether a performance bottleneck is caused by the network or the application itself often leads to a “blame game” among application, network, and cloud teams. This finger pointing can delay resolution and also stifle collaboration. Join us to learn how Gigamon can help you to more quickly and precisely pinpoint the root cause of performance bottlenecks and finally end the “blame game”.
-
Decryption Lessons Learned: The Most Efficient Deployment Models
Martyn Crew, Senior Director of Solutions Marketing and Partner Technologies and Ram Mohan, Technical Marketing Engineer
The need to inspect encrypted traffic is critical given the prevalence of encrypted malware lurking in our midst. But with over 90 percent of enterprise data being encrypted, managing this traffic and determining when and where to decrypt it remains a significant challenge for many organizations. Gigamon provides a range of decryption solutions and in this session, we’ll explore the pros and cons of the most common deployment scenarios and help you to learn how to decide which model is most efficient and effective for your organization.
-
The “Assumption of Compromise”: Government Agency Best Practices
Ian Farquhar, Security CTO and Stephen Goudreault, Cloud Security Evangelist
It’s not a matter of “if” but “when” organizations are breached. That’s the premise that Federal agencies operate under and it’s one that would be prudent to follow. With an Assumption of Compromise, it’s assumed that threat actors are currently living off the land (LTOL) using applications and protocols already available in workloads. Why LTOL and similar attacks can go unnoticed is because of a critical gap in traditional logging that is often overlooked. Learn why relying on logs from a firewall or router as the single source of truth is not enough. In this session, we will take a broad look at logging from the perspective of government threat hunting, and how it can be greatly enhanced with network-derived intelligence to make it far more resilient and harder for bad actors to defeat.
-
Five Capabilities of GigaVUE-OS and GigaVUE-FM You May Not Know
Srudi Dineshan, Sr. Product Marketing Manager and Patrick Riley, Director, Product Management
GigaVUE-OS and GigaVUE-FM offer a rich set of features and capabilities - so many that users can be overwhelmed. In this session, we’ll highlight five high-value features that you may not know about but that could dramatically improve the return on your investment, optimize your workflows, make your tools more efficient, and help keep your networks healthy and secure.
-
Learn What’s Possible with Enriched Mobile Subscriber Analytics
Ryan Mahoney, Product Marketing Director and Rob Atkinson, Senior Pre-Sales Consulting Engineer
Imagine the possibilities when service providers can easily access valuable insight about their mobile subscriber base. Information such as what devices and OTT applications subscribers are using as well as when and where they use the mobile network. Marketing, advertising, infrastructure planning, customer service, and product development can all benefit from better subscriber insight, but traditional approaches to collect this data have been costly and complex. In this session, we will cover the latest Gigamon solution innovation that cost-effectively delivers enriched mobile subscriber metadata directly to data lakes and analytics engines, enabling service providers to realize the full potential of subscriber data.