Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cloud Threat Report: IAM the first line of defense Nathaniel Quist, Principal Researcher, Unit 42; Jay Chen, Principal Researcher Unit 42; Brandon Dunlap, Moderator The ongoing transition to cloud platforms has meant that more sensitive data is stored in the cloud, making it more tempting for adversaries to exploi... 4 weeks ago | 57 mins What NetOps Can Learn from DevOPs—the Benefits of a Cloud-Native Approach Glenn Sullivan, Principal Product Manager, Infoblox With conventional network architectures, any meaningful change adds to cost and management complexity, including the need to establish maintenance win... 2 months ago | 43 mins What NetOps Can Learn from DevOPs—the Benefits of a Cloud-Native Approach Glenn Sullivan, Principal Product Manager, Infoblox With conventional network architectures, any meaningful change adds to cost and management complexity, including the need to establish maintenance win... 2 months ago | 43 mins What NetOps Can Learn from DevOPs—the Benefits of a Cloud-Native Approach Glenn Sullivan, Principal Product Manager, Infoblox With conventional network architectures, any meaningful change adds to cost and management complexity, including the need to establish maintenance win... 2 months ago | 43 mins ThreatINSIGHT - Eliminating Adversaries’ Dwell Time Advantage Gigamon ThreatINSIGHT Team For the past decade, we’ve all seen reports that show adversary dwell time exceeding well beyond acceptable ranges (280 days, as reported by IBM). Thi... 1 month ago | 57 mins Ensuring visibility in Nutanix clouds to solve security & performance challenges John Gudmundson, Senior Product Marketing Manager, Gigamon | Sean Lingham, Enterprise Cloud Solution Architect, Nutanix Gigamon Tech Convos: 3-Part Series; Cloud Edition - Ensuring visibility in Nutanix clouds to solve security and performance challenges Just like ever... 8 months ago | 57 mins Cloud Network Metadata: A Guide to Using Metadata for Monitoring and Security Bassam Khan, VP of Product and Technical Marketing, Gigamon / Muhammad Durrani, Technical Marketing Manager, Gigamon Networks communications carries a wealth of information from physical, virtual and cloud platforms. For app monitoring and security, network metadata ... 1 year ago | 26 mins See, Secure and Optimise your VMware-based Cloud John Gudmundson, Senior Product Marketing Manager - Gigamon Moving to hybrid cloud environments needn’t be labor intensive or overly complex. Attend to learn how VMware-based clouds with Gigamon next-generation... 6 months ago | 62 mins Cybersecurity Judo: Using the Adversary’s Strength Against Them Chris Borales, Sr. Product Marketing Manager - Gigamon Originally aired as an iSMG webcast. Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re gettin... 2 months ago | 44 mins A NetOps View of What it Means to Be Cloud-Native Glenn Sullivan, Principal Product Manager Going Cloud-Native goes beyond hosting some workloads in the cloud. Adopting a Cloud-Native framework requires a shift in mindset for the ways in whi... 8 months ago | 49 mins Load more