Hi [[ session.user.profile.firstName ]]

Security at Network Speeds

Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. A network packet broker is supposed to eliminate complexity and save costs, not add to them!

Organizations need to:
• Deliver just the right data to the right tools.
• Drive consolidation across their security stack.
• Manage a common platform across physical, virtual and public cloud environments.

Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.

Attend this webinar to learn how to:
• Maximize tool performance and ROI by applying advanced traffic intelligence.
• Rapidly detect and respond to new threats while eliminating security tool sprawl.
• Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

Join Gigamon and (ISC)² to learn how to increase efficiency of your security stack.
Recorded Nov 13 2018 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ian Farquhar, Principal Sales Engineer, Gigamon
Presentation preview: Security at Network Speeds
  • Channel
  • Channel profile
  • Finance Webinar Jul 9 2019 5:00 pm UTC 60 mins
    John LeHane, Senior Product Marketing Manager Gigamon
    Finance Webinar
  • 2019 Cyberthreat Defense Report Jun 28 2019 5:00 pm UTC 58 mins
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Federal Webinar Jun 26 2019 5:00 pm UTC 60 mins
    John LeHane, Senior Product Marketing Gigamon
    Federal Webinar
  • To Whack or Not to Whack — Incident Response and Breach Mitigation Jun 21 2019 5:00 pm UTC 44 mins
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • Healthcare Webinar Jun 18 2019 3:00 pm UTC 60 mins
    John LeHane, Senior Product Marketing Gigamon
    Healthcare webinar
  • Live Demo: Configure NetFlow/IPFIX. Gain Insights. Take Action. Jun 13 2019 5:00 pm UTC 44 mins
    Andy Hutchison, Sales Engineer Gigamon
    Lack of visibility into network traffic, coupled with an inability to ingest large amounts of packet data, leads to network blind spots. The good news is that NetFlow IPFIX metadata generation allows for richer metadata than standard NetFlow, with more flexibility when sending to a tool such as a SIEM.

    Register for this live demo webinar to:

    - Understand NetFlow concepts, and how they apply to security and other use cases.
    - See how Gigamon helps strengthen your existing infrastructure and tools.
    - Learn factors to consider when planning to use network metadata.

    Attendees will learn how to gain insight into metadata without an extensive investment in new tools.
  • Network Upgrades Giving You Security Headaches? Jun 11 2019 5:00 pm UTC 57 mins
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • Driving Digital Transformation with Application Intelligence Jun 6 2019 10:00 pm UTC 19 mins
    John LeHane, Product Marketing Gigamon
    Accelerate Your Organization’s Digital Transformation

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Fuel Visibility and Automation in Today’s Hybrid Cloud Environments Jun 5 2019 5:00 pm UTC 60 mins
    Brandon Butler, Sr. Research Analyst, IDC & Baseer Balazadeh, Sr. Technical Marketing Engineer - Cloud, Gigamon
    Today’s networks are changing with the rise of third-party platforms, including cloud, mobile, social, big data and IoT, causing organizations to implement new tools. What are you doing to keep up with the adoption of modern networks and the challenges they pose from an operational perspective?

    Join our webinar to hear the experts from IDC and Gigamon discuss how to:
    • Extract relevant data across multiple domains to provide insights all the way to the application layer through visibility and monitoring platforms
    • Gain centralized control, faster access to new features and functionality and rapid, dynamic scaling with cloud-based network management systems
    • Improve automated management platforms by integrating insights and analysis from multiple tools
    • Fuel pervasive visibility -- including TLS decryption -- and efficient and secure use of emerging technologies and faster network speeds

    Join us as we address the importance of high-fidelity visibility and monitoring as critical enablers for automation and security. We’ll also look at how the rise of advanced management platforms that integrate visibility, automation and assurance will create intent-based networks.
  • Don’t Let Digital Transformation Wreak Havoc on Your Network! Jun 4 2019 5:00 pm UTC 52 mins
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon
    Yes, digital apps are hyper-agile, but they’re also incredibly complex making it difficult to get visibility into traffic. But without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you’ll learn how to build an efficient network architecture to provide an engaging digital experience by:

    •Using tools efficiently by optimizing traffic and preventing packet duplication
    •Enhancing security by collecting and distributing NetFlow metadata to tools
    •Identifying, categorizing and visualizing more than 3,000 applications automatically

    See how pioneering technology Gigamon Application Intelligence helps increase visibility, improve security and, ultimately, exceed user expectations.
  • How to Optimize Network Performance During Infrastructure Transformation May 31 2019 5:00 pm UTC 47 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • 2019 Cyberthreat Defense Report May 30 2019 5:00 pm UTC 58 mins
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Gain Control of Complex Applications Central to Your Digital Transformation May 29 2019 5:00 pm UTC 60 mins
    John Gudmundson, Sr. Product Marketing Manager Gigamon
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • Driving Digital Transformation with Application Intelligence Recorded: May 2 2019 19 mins
    John LeHane, Product Marketing Gigamon
    Accelerate Your Organization’s Digital Transformation

    Join us for our interactive webinar to see how application-aware network visibility can accelerate your organization’s digital transformation.

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Application Awareness with the Power to Take Action Recorded: May 1 2019 54 mins
    Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech Media
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:

    •Discover applications that you didn’t even know were running on your network
    •Increase overall performance of your network and shared components
    •Spot potential security vulnerabilities before they become a problem

    Attendees will also view a live demonstration of how Gigamon can end headaches in security and network performance.
  • Driving Digital Transformation with Application Intelligence Recorded: May 1 2019 20 mins
    John LeHane, Product Marketing Gigamon
    Accelerate Your Organization’s Digital Transformation

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Don’t Let Digital Transformation Wreak Havoc on Your Network! Recorded: Apr 30 2019 53 mins
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon
    Yes, digital apps are hyper-agile, but they’re also incredibly complex making it difficult to get visibility into traffic. But without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you’ll learn how to build an efficient network architecture to provide an engaging digital experience by:

    •Using tools efficiently by optimizing traffic and preventing packet duplication
    •Enhancing security by collecting and distributing NetFlow metadata to tools
    •Identifying, categorizing and visualizing more than 3,000 applications automatically

    See how pioneering technology Gigamon Application Intelligence helps increase visibility, improve security and, ultimately, exceed user expectations.
  • 2019 Cyberthreat Defense Report Recorded: Apr 23 2019 59 mins
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Live Demo: Configure NetFlow/IPFIX. Gain Insights. Take Action. Recorded: Apr 16 2019 44 mins
    Andy Hutchison, Sales Engineer Gigamon
    Lack of visibility into network traffic, coupled with an inability to ingest large amounts of packet data, leads to network blind spots. The good news is that NetFlow IPFIX metadata generation allows for richer metadata than standard NetFlow, with more flexibility when sending to a tool such as a SIEM.

    Register for this live demo webinar to:

    - Understand NetFlow concepts, and how they apply to security and other use cases.
    - See how Gigamon helps strengthen your existing infrastructure and tools.
    - Learn factors to consider when planning to use network metadata.

    Attendees will learn how to gain insight into metadata without an extensive investment in new tools.
  • Accelerating Enhanced Threat Identification and Incident Investigation Recorded: Mar 21 2019 60 mins
    David Monahan, Enterprise Management Associates; Stephen Hinck, Gigamon Insight, Steve Porcello, Gigamon Insigh
    Only 28 percent of organizations have alerting systems with enough context to provide highly accurate incident classification, thus requiring manual verification and reclassification of 95 percent of most organizations’ incidents. In addition, 48 percent of organizations had a security incident that caused moderate to severe business impact. Delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.

    Enterprise Management Associates (EMA) released its 2019 “Top 3 Decision-Makers’ Guide to Security Analytics.” In this webinar David Monahan, Managing Research Director for Security and Risk Management at EMA, Stephen Hinck, Product Manager for Gigamon Insight, and Steve Porcello, Sales Engineer for Gigamon Insight, will discuss the key use cases “Identifying Advanced Threats” and “Enhancing Incident Investigations,” and will also demonstrate how security teams can obtain greater context for decision-making in order to solve these real-world problems faster using Gigamon Insight.

    Join leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon to learn more about:
    •The methodology behind the report
    •What to watch for in selecting a security analytics solution
    •How to identify threats faster, thus reducing dwell time
    •How threat actors exploit Internet presence within the context of business and security management tools, issues, and practices
    •How access to a broad array of network data reduces the attack surface
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security at Network Speeds
  • Live at: Nov 13 2018 6:00 am
  • Presented by: Ian Farquhar, Principal Sales Engineer, Gigamon
  • From:
Your email has been sent.
or close