Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Briefings Part 2 - Threat Detection in TLS: The Good, Bad & Ugly
    Briefings Part 2 - Threat Detection in TLS: The Good, Bad & Ugly Ian Farquhar, Global Security Strategist, Gigamon; Brandon Dunlap, Brightfly (Moderator) Recorded: May 31 2018 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected. Making this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. Join Gigamon and (ISC)2 on May 31, 2018 at 1PM Eastern where we’ll discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.
  • Briefings Part 1: Using Inline Security Tools to Achieve Your Security Goals
    Briefings Part 1: Using Inline Security Tools to Achieve Your Security Goals Patrick Riley, Principle Product Manager, Gigamon; Brandon Dunlap, Moderator Recorded: Apr 26 2018 60 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)2 on April 26, 2018 at 1:00PM Eastern for Part One of a Security Briefings series where we will examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Métadonnées: Droit à l’essentiel
    Métadonnées: Droit à l’essentiel Pascal Beurel, Ingénieur principal, Opérations de sécurité de Gigamon Recorded: Apr 25 2018 27 mins
    Veuillez nous rejoindre afin que l'expert sécurité de Gigamon, Pascal Beurel, vous révèle la raison pour laquelle les métadonnées réseau constituent un outil ultime ! Alors que les entreprises s'efforcent de suivre le rythme de la croissance du trafic en augmentant la vitesse des réseaux, elles sont en voie de perdre le combat face au cybercrime. Pourquoi ? La raison en est que les outils sont limités quant au volume de trafic qu'ils peuvent traiter de façon intelligente, tout en étant en charge de fonctions de plus en plus sophistiquées pour combattre des cyber-attaques toujours plus avancées et persistantes.

    En conséquence, de nombreuses applications de sécurité s'avèreront inefficaces dans un avenir proche.

    Entrez dans le monde des métadonnées, le nouveau super-pouvoir en matière de sécurité. En fournissant aux outils de sécurité des aperçus synthétiques des données circulant à travers les réseaux, ils peuvent devenir un outil puissant pour les entreprises cherchant à séparer les signaux utiles du bruit, à réduire le délai de détection des menaces, tout en améliorant l'efficacité générale de la sécurité.

    Les participants apprendront :
    - Comment la sécurité réseau s'appuie de façon croissante sur le contexte et l'intention.
    - La raison pour laquelle les métadonnées réseau deviendront l'approche la plus simple et la plus compréhensible pour les analyses de sécurité.
    - Comment la visibilité réseau sert de source unique d'informations concernant les applications, les utilisateurs et les terminaux.

    Si la visibilité réseau et la sécurité sont importantes pour vous, vous ne voudrez pas manquer ce webcast !
  • 2018 Cyberthreat Defense Report
    2018 Cyberthreat Defense Report Mark Bouchard, Co-Founder and COO, CyberEdge Group and Graham Melville, Sr. Director Security Solutions Marketing, Gigamon Recorded: Apr 12 2018 60 mins
    New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.

    Attendees will learn how to:

    - Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
    - Reduce incident response and remediation time with automation.
    - Find products that use automation to minimize their dependency on skilled security personnel.

    Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
  • SOC Squad: Select and Deploy New Security Tools Faster
    SOC Squad: Select and Deploy New Security Tools Faster Simon Gibson, CISO and Security Architect, Gigamon and Graham Melville, Sr. Director, Security Solutions, Gigamon Recorded: Apr 5 2018 44 mins
    If you are struggling to keep up with selecting, testing and deploying new security tools, you won’t want to miss this webinar.

    You’ll learn how to:

    - Address the unique challenges of securing your unique network.
    - Implement smart network segmentation and intelligent tool routing.
    - Facilitate testing and deploying tools through a security delivery platform.
    - Handle the challenges of setting up realistic tests.

    Learn how the GigaSECURE security delivery platform strengthens new security tool testing and streamlines deployment.
  • Architecting Security for the Future: NetOps and SecOps
    Architecting Security for the Future: NetOps and SecOps Dan Conde of ESG and Graham Melville of Gigamon Recorded: Mar 1 2018 54 mins
    Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of their competitors.

    In this session you will learn:
    - The issues and challenges facing your industry colleagues
    - How to simplify your security architecture without throwing out security tools or flattening the network
    - How to improve network performance and reduce outages while maintaining security
    - How to spend less yet get more from your network security tools

    If you or your organization wants to be, or are, a security leader in your industry, you won’t want to miss this webinar.
  • Hear from our CISO: How to Use a Risk Registry to Track Risk and Protect Assets
    Hear from our CISO: How to Use a Risk Registry to Track Risk and Protect Assets Simon Gibson, CISO and Security Architect, Gigamon Recorded: Nov 14 2017 48 mins
    Join Gigamon CISO, Simon Gibson, to see how to take a methodical approach to threat detection. This discussion will dive into the causes and effects of 2017’s biggest breaches – and what you can do to prepare for 2018. Discover how to create a unified view to systematically track risk and establish a baseline of acceptable risk.

    Attendees will learn:

    • Why more security tools are not necessarily better.
    • How to maintain confidentiality, integrity and availability of data.
    • How to track and manage acceptable amounts of risk over time.
    • How new projects and shadow IT introduce incremental risk.
    • How to implement intelligent automated models to build customized defenses.
    • Why comprehensive network visibility -- on-premises and in the cloud -- is critical.

    If you want to learn why prescriptive approaches to threat detection won’t work and how to make better use of your existing tools to improve security without sacrificing performance, you won’t want to miss this webinar.
  • SOC Talk: Automation and Visibility for Faster, More Accurate Response
    SOC Talk: Automation and Visibility for Faster, More Accurate Response Simon Gibson, CISO / Security Architect, Jack Hamm, Principal Information Security Engineer, Graham Melville, Sr. Director Recorded: Oct 18 2017 42 mins
    Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
    Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
    During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis. 

    Simon and Jack will demonstrate:

    •How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
    •How to automate tasks to find and block the use of Kaspersky in government organizations.
    •How to streamline dozens of sources to gain insight into security events.
    •How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
    •How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
  • Detect Threats Faster and Advance Your Network Security
    Detect Threats Faster and Advance Your Network Security Greg Mayfield, Sr. Director of Product Marketing at Gigamon Recorded: Sep 27 2017 41 mins
    Current network security architectures are rapidly becoming inefficient. Dangerous malware, data breaches and ransomware often go unseen in enterprise networks, putting the business and their customers at risk. When a data breach occurs, Security Operations teams often struggle to pinpoint and resolve the problem. Lack of sufficient visibility, silo’d, disparate tools combined with manual processes, can weaken your organization's overall security posture.

    Join this interactive webinar to discover a better way to defend your network against cyber threats. Learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.
  • Optimize Incident Response in the Age of Ransomware
    Optimize Incident Response in the Age of Ransomware Tom Clavel, Senior Manager, Security Product at Gigamon Recorded: Sep 26 2017 36 mins
    Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.

    Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.

Embed in website or blog