Hi [[ session.user.profile.firstName ]]

Gigamon

  • Date
  • Rating
  • Views
  • Hear from our CISO: How to Use a Risk Registry to Track Risk and Protect Assets
    Hear from our CISO: How to Use a Risk Registry to Track Risk and Protect Assets Simon Gibson, CISO and Security Architect, Gigamon Recorded: Nov 14 2017 48 mins
    Join Gigamon CISO, Simon Gibson, to see how to take a methodical approach to threat detection. This discussion will dive into the causes and effects of 2017’s biggest breaches – and what you can do to prepare for 2018. Discover how to create a unified view to systematically track risk and establish a baseline of acceptable risk.

    Attendees will learn:

    • Why more security tools are not necessarily better.
    • How to maintain confidentiality, integrity and availability of data.
    • How to track and manage acceptable amounts of risk over time.
    • How new projects and shadow IT introduce incremental risk.
    • How to implement intelligent automated models to build customized defenses.
    • Why comprehensive network visibility -- on-premises and in the cloud -- is critical.

    If you want to learn why prescriptive approaches to threat detection won’t work and how to make better use of your existing tools to improve security without sacrificing performance, you won’t want to miss this webinar.
  • SOC Talk: Automation and Visibility for Faster, More Accurate Response
    SOC Talk: Automation and Visibility for Faster, More Accurate Response Simon Gibson, CISO / Security Architect, Jack Hamm, Principal Information Security Engineer, Graham Melville, Sr. Director Recorded: Oct 18 2017 42 mins
    Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
     
    Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
     
    During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis. 

     
    Simon and Jack will demonstrate:

    •How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
    •How to automate tasks to find and block the use of Kaspersky in government organizations.
    •How to streamline dozens of sources to gain insight into security events.
    •How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
    •How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
  • Detect Threats Faster and Advance Your Network Security
    Detect Threats Faster and Advance Your Network Security Greg Mayfield, Sr. Director of Product Marketing at Gigamon Recorded: Sep 27 2017 41 mins
    Current network security architectures are rapidly becoming inefficient. Dangerous malware, data breaches and ransomware often go unseen in enterprise networks, putting the business and their customers at risk. When a data breach occurs, Security Operations teams often struggle to pinpoint and resolve the problem. Lack of sufficient visibility, silo’d, disparate tools combined with manual processes, can weaken your organization's overall security posture.

    Join this interactive webinar to discover a better way to defend your network against cyber threats. Learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.
  • Optimize Incident Response in the Age of Ransomware
    Optimize Incident Response in the Age of Ransomware Tom Clavel, Senior Manager, Security Product at Gigamon Recorded: Sep 26 2017 36 mins
    Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.

    Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.
  • All Killer, No Filler: How Metadata Became a Security Super Power at Gigamon
    All Killer, No Filler: How Metadata Became a Security Super Power at Gigamon Jack Hamm, Principal Information Security Engineer, Gigamon Recorded: Sep 14 2017 32 mins
    Please join us as Gigamon Principal Information Security Engineer, Jack Hamm, reveals why network metadata is all killer, no filler! As enterprises battle to keep pace with online traffic growth by throttling up network speeds, they are beginning to lose the war on cybercrime. Why? Because security tools are limited in how much traffic they can intelligently process, while at the same time are tasked with taking on increasingly sophisticated functions to combat evermore advanced and persistent cyber attacks.
    As a consequence, many existing security applications will be rendered ineffective in the very near future.

    Enter metadata, the new security super power. By providing security tools with summary takes of the packet data traversing networks, metadata can become a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy.

    Attendees will learn:
    - How network security will increasingly rely on building context and intent.
    - Why network-based metadata, followed by programmable packet data streams, will become. the most simple and comprehensive approach to security analytics.
    - How network visibility serves as the single source of truth for information about applications, users and devices.

    If network visibility and security is important to you, you won’t want to miss this webcast!
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.

Embed in website or blog