Hi [[ session.user.profile.firstName ]]

Get the Most Out of App-Aware Network Visibility

Got apps? Most companies run hundreds. Application experience can make or break a digital enterprise. That’s why true application-level visibility is a must-have in today’s network operations. While achieving it with legacy solutions is difficult, the benefits of becoming app-aware are more than worth it.

What the heck is application-aware networking? It’s a cool new way to boost network performance and get the most out of your tools. You can now instantly see all applications running in your network, and manage traffic flow not by packets, but by applications.

Join EMA Research Director, Shamus McGillicuddy, and Gigamon VP, Product and Technical Marketing, Bassam Khan, for this interactive webinar where they will discuss key topics including:

•Protect your operations from oversubscription
•Interrogate and identify unknown apps
•Protect critical applications from bandwidth hogs

Best of all, you’ll see a live demo of how Gigamon, an application-aware network packet broker, delivers true application visibility to your organization.

Register now to see it in action!
Recorded Jul 18 2019 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shamus McGillicuddy, Research Director, EMA & Bassam Khan, VP Product & Technical Marketing Engineer, Gigamon
Presentation preview: Get the Most Out of App-Aware Network Visibility
  • Channel
  • Channel profile
  • Is Work From Home the New Normal for Federal Agencies? Recorded: May 28 2020 15 mins
    Dennis Reilly – Public Sector VP + Martyn Crew – Director, Industry Solutions, Gigamon
    What have we learned from the transition to work-from-home and how can government agencies operate going forward? Will this be the new normal and which new guidelines and best practices will we bring with us? Hear Dennis Reilly, Vice President Public Sector Sales for Gigamon, answer these questions and more. 
    We’ll discuss:  
    * Challenges of a work-from-home environment specific to government organizations
    * How Gigamon can help workers transition back into the office 

    * Why COVID-19 may ultimately be a force for good in government IT 
  • Zero Trust: What You Need to Know to Secure Your Data and Networks Recorded: May 14 2020 61 mins
    Dave Shackleford – SANS Sr Instructor + Ricardo Font – Sr Product Marketing Manager, Gigamon
    Hear from SANS Institute and Gigamon experts on why, when teams are suddenly doing more with less, adopting a Zero Trust architecture is the first step to staying secure as threats continue to evolve.

    You’ll learn:
    •About the effective implementation of Zero Trust and its foundational controls
    •Zero Trust best practices and concepts of deployment, detection and response
    •Why Gigamon ThreatINSIGHT is key to successfully adopting Zero Trust

    Presented by:
    Dave Shackleford, SANS Senior Instructor
    Ricardo Font, Senior Product Marketing Manager at Gigamon
  • Building the Foundation for Secure Patient Care-Centered Technologies Recorded: May 4 2020 45 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

    Watch now to learn:
    • How to balance delivering innovations in patient care with data security
    • Why adopting Zero Trust as the foundation for healthcare security is important
    • The security and operational challenges of handling encrypted data
  • What it’s Really Like When Your IT Vendor is Acquired or Their Products EOL Recorded: Apr 17 2020 22 mins
    Martyn Crew, Ian Farquhar, Jim Mandelbaum and Mike Valladao – Gigamon
    Three seasoned experts share what they’ve learned through real-life experiences dealing with the uncertainty sparked by a vendor you use being acquired or their product going end-of-sale.

    We’ve all experienced that twinge of concern when we hear that a critical piece of our architecture has been end-of-life’d. Or when the vendor for a product upon which we heavily depend has been acquired. What do I have to worry about? After all, I don't know what I don't know. What can I expect? Who can help me?

    Fortunately, our panel of experts have conquered these exact challenges and have over 100-years of real-world advice to share. Join us as Martyn Crew, Gigamon’s Director of Industry Solutions, hosts a video panel discussion with fellow Gigamon experts: Ian Farquhar, Jim Mandelson and Mike Valladao.

    What you’ll learn:
    • What are your options in an acquisition or end-of-life situation?
    • How does this really impact you operationally?
    • Best-practices for evaluating replacement options
  • Approaches to Network Monitoring and Management Recorded: Apr 16 2020 12 mins
    Doug Barth – CEO & Founder, Gatepoint Research + Jim Mandelbaum – SE, Gigamon
    Learn what your peers are doing and why you should care. Data from an independent survey of over 300 IT managers and directors reveals what their top network monitoring and management priorities are, the obstacles they face, the tools they use and more.

    Doug Barth (Principal/Founder of Gatepoint Research) shares the results of the survey, while Jim Mandelbaum (Gigamon Senior Security Engineer) explains what it means and why you should care.
  • Securing Healthcare with Limited Time and Resources Recorded: Apr 14 2020 24 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Very few healthcare InfoSec teams have the time and resources to deal with the formidable security challenges they face. The pressure to do more with less is constant. In this webinar, you'll learn how to improve your security posture by:

    • Optimizing tool and team efficiency by filtering out irrelevant traffic
    • Using AI to accelerate cybersecurity threat detection and response
    • Achieving full network traffic visibility while maintaining PII confidentiality
  • Take Control with Application Visibility in Nutanix Private Clouds Recorded: Apr 9 2020 52 mins
    John Gudmundson — Sr. Product Marketing Manager, Gigamon + Mike Wronski – Technical Director of Product Marketing, Nutanix
    Private Clouds are on the ascent. To ensure comprehensive security with superior performance, you need full packet and application visibility. These environments are also very dynamic and complex, so automation is critical to success.

    Today, to acquire and forward traffic, you likely manually deploy hardware network TAPs or tediously install processing-intensive agents for each tool on each compute node. There’s a better way.

    Learn how next-gen Network Packet Brokers collaborate with cloud orchestration tools in hyperconverged infrastructures (HCI) to automatically provision agentless VMs to obtain all traffic. Next, app flows are identified and optimally processed and distributed to the proper tools. Network efficiency rises, user experience is enhanced and over 50% of traffic can be eliminated — thereby improving tool effectiveness with less scaling.

    Watch the webinar to learn how to:
    • Overcome private cloud challenges with HCI
    • Obtain comprehensive app-layer visibility throughout the cloud
    • Leverage advantages of next-gen network packet brokers
    • Ensure infrastructure automation with orchestration tool integration
    • BONUS: watch a live demonstration to see it in action
  • Zero Trust in Practice Recorded: Apr 9 2020 59 mins
    John Pironti – President, IT Architects + Bassam Khan – VP of Product and Technical Marketing, Gigamon
    Credential theft, lateral movement and other cyber-attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero trust model — trust nothing, verify everything — is the proposed answer to this problem. But it’s easier said than done in real enterprise.

    In this webinar, John Pironti of IT Architects and Gigamon’s Bassam Khan share:
    • what zero trust looks like in practice
    • how to overcome challenges along the way
    •. what security benefits you’ll realize right away
    •. how your organization can take the first steps toward implementing a zero trust model
  • NetOps 2.0: Application Intelligence in a Time of Change and Uncertainty Recorded: Mar 20 2020 20 mins
    Bassam Khan – VP of Product and Technical Marketing Engineering
    Overnight millions are suddenly working from home, putting IT teams under tremendous pressure to maintain security and performance in spite of an increased load. But there are effective ways to respond.

    In this webinar, we’ll review these new challenges and how NetOps 2.0 gives you the agility to adapt and win.

    Learn how to:
    • Run fast as million start working from home
    • Defend against an increased attack surface
    • Overcome economic uncertainty and tighter budgets
    • Ensure network infrastructure will support continued changes
    • Adapt to an overall increase in load
  • Application Awareness for Network Visibility Recorded: Feb 18 2020 35 mins
    Andy Hutchinson – Sales Engineer, Gigamon
    Let’s face it: in the 21st century whatever network buzzwords we have in our I.T. enterprise are really focused on application delivery. How does the network enable the business, and more specifically the applications that the business needs to run. So why focus network visibility exclusively on packets, when it is the applications that are important to our users and our customers?

    With Gigamon Application Intelligence, you can visualize the applications running across your network and make decisions for your environment based on applications, not just packets. Register for this webinar to learn how, within your existing infrastructure you can:

    · Achieve full visibility to applications on your network and the resources they consume
    · Filter out low-risk traffic, for improved detection performance
    · Understand how application metadata can benefit network security and performance measurements
  • Do You Really Know What's Running On Your Network? Recorded: Feb 7 2020 25 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    Everyone thinks they know what applications and data are on their network, but is that really the case?

    Join us for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you’ll learn invaluable information from Gigamon expert, Martyn Crew.

    What you'll learn:
    - How to identify and visualize what’s on your network
    - Beyond seeing what’s on your network, understand what it’s doing
    - How to use this knowledge to deliver optimal network availability, performance and user satisfaction

    Be sure to join and win in the visibility game. You’ll hear how to save time, increase overall tool efficiency and maximize your infrastructure investment.

    See how Gigamon delivers network visibility and analytics for digital apps and services enabling your organization to run fast, stay secure and innovate.
  • SANS 2020 Cybersecurity Spending Survey – Panel Discussion Recorded: Feb 4 2020 57 mins
    Gordon Beith – Senior Director, Product Marketing, Gigamon
    This webcast more closely examines the results of the SANS 2020 Cybersecurity Spending Survey. A panel of sponsor representatives, led by survey author Barbara Filkins and survey advisor John Pescatore, will explore themes that emerged during the survey.

    Hear Barbara Filkins and John Pescatore give an analysis of survey results and reveal strategies that organizations can use to justify security spending.


    Gordon Beith is responsible for overseeing product marketing activities for service providers at Gigamon. His extensive career includes over 30 years of work in telecommunications product management, marketing, hardware and software development, and related next-generation services areas. Gordon also co-authored the book on IMS testing and monitoring, entitled “Ensuring a Quality IMS Experience,” published in 2007, and has one patent to his name.

    As vice president and chief evangelist, Bob Gilbert is in charge of go-to-market strategy at Netskope, a market-leading cloud security company. He has held leadership roles in product management and marketing at various technology companies, including Riverbed, where he was a member of the pioneering product team that launched Riverbed from a small start-up to a market leader. Bob was first introduced to the world of cybersecurity as a teenager in the 1980s when he hosted a BBS and had to develop his own terminal software to prevent hackers from infiltrating the site that he hosted from his parent’s home.

    John Smith is a principal engineer at ExtraHop. John has over two decades of experience as a senior architect in IT organizations, and is a regular speaker at technology events including BriForum, RSAC and Citrix Synergy, among others.
  • Modernizing and Securing Financial Services Technology Environments Recorded: Feb 3 2020 33 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    Financial services firms have unique needs that other industries don't face. Strict security policies, strong compliance requirements, and extensive and data retention demands are a few examples.

    Top those needs off with complex, distributed, and dynamic applications and most IT professionals who work in the financial industry are in dire need of more efficient, secure, and intelligent solutions than their peers in other industries. But where do you turn to find such solutions? Martyn Crew, Gigamon’s Director, Industry Solutions, has the answer.

    Watch the EcoCast to learn about the unique IT challenges in the financial services industry and discover an innovative solution to solve your greatest IT challenges.
  • Do You Really Know What's Running on Your Network? Recorded: Dec 2 2019 59 mins
    Martyn Crew, Director, Product Marketing Management, Gigamon and Dave Davis, ActualTech Media
    Everyone thinks they know what applications and data are on their network, but is that really the case?

    Join us for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you’ll learn invaluable information from our industry-leading Gigamon expert:

    - How to identify and visualize what’s on your network
    - Beyond seeing what’s on your network, understand what it’s doing
    - How to use this knowledge to deliver optimal network availability, performance and user

    Be sure to join and win in the visibility game. You’ll hear how to save time, increase overall tool efficiency and maximize your infrastructure investment.

    See how Gigamon delivers network visibility and analytics for digital apps and services enabling your organization to run fast, stay secure and innovate.
  • Dynamic Network Security Strategies Recorded: Nov 21 2019 40 mins
    Ricardo Font, Product Marketing Manager, Gigamon ThreatINSIGHT
    The need for dynamic network security has never been greater; however, the inability to pinpoint what is real within a myriad of alerts, coupled to the lack of resources required to continually defend against today's onslaught of attacks, degrades overall security and places organizations at risk.

    In this webinar, we will discuss strategies pertaining to the implementation of dynamic network security, specifically:
    - The Approach: Strategies used by leading organizations
    - Detection and Response: Analytics, visibility and key needs
    - Closing the loop: Measuring success

    Attend this webinar and you will be able to identify:
    - What is needed for implementing scalable dynamic network security
    - NDR, EDR and Logging: the best practices for each
    - How to measure improvements: MTTD and MTTR metrics
  • Encrypted Things - Network Detection and Response in an Encrypted World Recorded: Nov 13 2019 43 mins
    Justin Kohler, Sr Director, Customer Success and Sales Engineering, Gigamon Insight
    There has been tremendous growth in the percentage of network traffic that is encrypted over the last decade. With this comes many challenges for incident responders. Decrypting the traffic is often hard, if not impossible. The rise in encrypted traffic has undoubtedly increased privacy for users but we know that threat actors take advantage of it as well. As network defenders our visibility is impacted, and traditional network monitoring detection will not always work.

    In this talk we will discuss the problem of encrypted traffic as it pertains to network detection and response, educate you on new developments in SSL/TLS, and demonstrate how you can still hunt for and detect badness in encrypted traffic. This talk will be relevant to junior analysts all the way up to senior analysts at mature SOCs.
  • Unleash the Power of True Application Visibility - (ISC)2 Recorded: Oct 3 2019 52 mins
    John Gudmundson – Senior Product Marketing Manager, Gigamon
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization?

    Join Gigamon as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows so you’ll discover how to understand the performance and have control of hundreds of critical apps.
  • Strategic Solutions for Effective Network Security in the Cloud Recorded: Sep 26 2019 50 mins
    Rob Ayoub FireEye, Baseer Balazadeh Gigamon, Tom Adamski AWS
    Everyone must work together to protect the cloud. While cloud providers focus on protecting their services and infrastructure, you must ensure that data flowing into the cloud doesn’t leave an opening for attackers.

    Join us on September 26 at 10 a.m. PT/1 p.m. ET, as experts from FireEye, Gigamon and AWS present a webinar on how to:

    •Deploy a security infrastructure that helps you minimize risk by accurately detecting and quickly stopping advanced, targeted and other evasive attacks

    •Achieve greater cloud network visibility by ingesting and capturing traffic data from your cloud infrastructure

    •Apply intelligence to get actionable insights and speed detection and response

    •Fully integrate network forensics to accelerate alert investigation and breach mitigation
  • Incident Response: Make the First 24 Hours Count Recorded: Sep 24 2019 54 mins
    Ricardo Font, Product Marketing Manager, Gigamon Insight & Joe Goldberg, Cloud Practice Manager, CCSI
    Incident response teams are often hampered by an inability to see what is happening on their network, rendering them unable to confidently detect threats or respond quickly and effectively.
    So how can the top law firms accelerate threat detection and response? Join Ricardo Font, Product Marketing Manager for Gigamon Insight, and Matt Pascucci, Cybersecurity Practice Manager for CCSI, as we dive into metadata’s critical role in incident detection and response strategies. Attendees will learn:
    •What the key incident response needs are and how to meet them
    •How to dig deeper into key indicators of compromise using packet captures (PCAP)
    •How metadata can focus incident response efforts through data correlation and enrichment
    Find out how packets can either help or hinder response, all depending on how you use them – register today!
  • Getting to Yes: How to Justify your Network Packet Broker Purchase Recorded: Aug 21 2019 57 mins
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Get the Most Out of App-Aware Network Visibility
  • Live at: Jul 18 2019 5:00 pm
  • Presented by: Shamus McGillicuddy, Research Director, EMA & Bassam Khan, VP Product & Technical Marketing Engineer, Gigamon
  • From:
Your email has been sent.
or close