Hi [[ session.user.profile.firstName ]]

Building the Foundation for Secure Patient Care-Centered Technologies

Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

Watch now to learn:
• How to balance delivering innovations in patient care with data security
• Why adopting Zero Trust as the foundation for healthcare security is important
• The security and operational challenges of handling encrypted data
Recorded May 4 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Martyn Crew – Director of Solutions Marketing, Gigamon
Presentation preview: Building the Foundation for Secure Patient Care-Centered Technologies
  • Channel
  • Channel profile
  • Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler Mar 31 2021 4:00 pm UTC 60 mins
    Rahim Ibrahim, Zscaler Business Development & Tech Alliances Mgr + Stephen Newman, Gigamon Product Mktg Mgr
    As temporary workplace policies move mainstream, Enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this webinar, we'll highlight the visibility benefits that our Enterprise customers are receiving as they have supported and implemented various new work from home policies.

    You'll learn about:
    • Security Trends from 2020-2021
    • The ease of deployment and management from industry-leading SaaS-based services
    • How customers use the Gigamon ThreatINSIGHT and Zscaler integration to get better visibility
  • Strategies to Overcome 5G Challenges Mar 30 2021 5:00 pm UTC 33 mins
    Gordon Beith – Senior Director, Product Marketing, Gigamon
    If you’d like to get a high-level overview of the various 5G network architecture modes and the deployment scenarios supported by Gigamon, this technical webinar is for you. See the configuration process for 5G with consideration for existing 4G visibility already in place.
  • Upleveling Your Security and Networking Capabilities Mar 23 2021 5:00 pm UTC 33 mins
    Martyn Crew, Director, Industry Solutions at Gigamon
    Data breaches are happening every day and are highlighted on the evening news. That's NOT the kind of notoriety that your company needs! In today's world, every organization has concerns about their data and network security, but the real question is - what steps should you take to protect yourself?

    Challenges in up-levelling security and network capabilities in a hybrid world brings even greater complexity for organizations. The hybrid cloud means you need high quality, consistent data to maintain control and up-level your capabilities.

    Join this webinar to:
    · Learn how to improve your company's security posture and improve your network management
    · Find out the benefits of the Gigamon solution for network and hybrid cloud visibility
  • Understanding TLS Decryption: Deploy Your Solution Mar 18 2021 4:00 pm UTC 60 mins
    Greg Maples, Consulting Security Architect at Gigamon
    The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.

    You’ll learn everything you need to know about implementation, including:
    • Planning
    • Validation
    • Integration
  • Insights From The CyberEdge COVID-19 Impact Report Mar 16 2021 5:00 pm UTC 56 mins
    Steve Piper – Founder & CEO, CyberEdge Group + Martyn Crew – Dir Industry Solutions, Gigamon
    Join us for a conversation with Steve Piper, Founder & CEO of CyberEdge Group. Steve will share insights from the Group's latest research report: The Impact of COVID-19 on Enterprise IT Security Teams.

    Hear what the research says about:
    * the impact of the work-from-home movement
    * pandemic-related IT challenges
    * the health of security budgets
    * staffing issues, training, and more
  • The Imminent Impact of TLS 1.3 on Network Security Controls Mar 9 2021 6:00 pm UTC 56 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Understanding TLS Decryption: Design Your Solution Mar 4 2021 5:00 pm UTC 60 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.

    You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including:
    • Requirements
    • Architectures
    • Best practices
  • Ensuring Trust and Security in Enterprise IT and the Cloud Recorded: Feb 23 2021 26 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    Your job – and we doubt you have any choice but to accept it! – is to leverage every tool in your arsenal to keep bad guys and even human error from dooming your data. Modern security is defense in depth and you need a myriad of tools to keep incidents at bay. Such tools may include privileged password protection, centralized and managed authentication with SSO, rock solid data protection for all of your cloud apps, interconnectivity with security baked in, and much, much more.
    - See how today's most innovative cloud security, storage, networking, data protection, and management solutions complete your security puzzle
    - Learn why privileged password management needs to be a key component in your information security strategy
  • Understanding TLS Decryption: Getting It Right Recorded: Feb 18 2021 58 mins
    Ollie Sheridan, Principal Sales Engineer at Gigamon
    This Tech Talk webinar on understanding how to get decryption right is the first in a three-part series on TLS Decryption.

    With increased malware threats using encryption, winning the battle against malware threats requires getting decryption right.
    In this technical webinar, Gigamon experts explain how to use TLS Decryption to thwart attacks by eliminating blind spots and reducing the attack surface.

    Tune in to learn how to attain North-South and East-West traffic visibility, including:
    • Drivers
    • Challenges
    • Approaches
  • The Imminent Impact of TLS 1.3 on Network Security Controls Recorded: Feb 9 2021 57 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Case Study: Australian National University | Virtual Roundtable Recorded: Feb 2 2021 56 mins
    Suthagar Seevaratnam | ANU CISO
    After finding themselves in a data breach in late 2018, the renowned Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and the level of sophistication behind the hack.

    A 2020 global intelligence threat report by NTT, found the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

    This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

    Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they've made post-incident and what they see as their next steps to improve cybersecurity resiliency in today’s ever-evolving threat landscape.
  • Insights From The CyberEdge COVID-19 Impact Report Recorded: Jan 12 2021 57 mins
    Steve Piper – Founder and CEO of CyberEdge Group + Martyn Crew – Dir Industry Solutions, Gigamon
    Join us for a conversation with Steve Piper, Founder & CEO of CyberEdge Group. Steve will share insights from the Group's latest research report: The Impact of COVID-19 on Enterprise IT Security Teams.

    Hear what the research says about:
    * the impact of the work-from-home movement
    * pandemic-related IT challenges
    * the health of security budgets
    * staffing issues, training, and more
  • 2020 SANS Enterprise Cloud Incident Response Survey Results Recorded: Jan 7 2021 58 mins
    SANS Survey Author, Chris Dale & Survey Advisor, Matt Bromiley + Expert Panel
    Our 2020 Enterprise Cloud Incident Response Survey investigated the data sources and services that organizations are leveraging to detect, respond to and remediate incidents in the multi-cloud world. The survey focused less on which cloud service organizations are using, and more on what data sources they are taking advantage of, what services they find useful, and what methods are working in their programs.

    Attendees at this webcast will learn about the experiences of survey participants with regard to:
    * What components are being breached
    * Preferred sources of evidence in concluding cloud compromise
    * Most prevalent cloud detection capabilities
    * Containment strategies used to control and limit damages from compromise
    * Ways forward in terms of commitment, improvement and impediments
  • 5 Reasons You Don't Need New Budget to Buy Gigamon Recorded: Jan 5 2021 21 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    It’s not easy to get approval to invest in the solutions you need, especially in these uncertain times. We can help. Gigamon solutions enable you to save money in your tools budget so you can re-use that money to drive high impact digital transformation initiatives.

    Watch now and learn how to:
    • Reduce duplicate traffic on your network by 50%
    • Filter out low risk, irrelevant traffic and focus on high-risk traffic

    • Minimize the number of new tools you’ll need as your data volumes increase
    • Use existing tools on upgraded, faster networks
  • CISO's Perspective: Adapt and Secure Recorded: Dec 29 2020 39 mins
    Mike Huckaby, VP, Worldwide Sales Engineering at Gigamon
    2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt.

    Join this exclusive panel for unique insight into:
    · How to respond when your business faces historic transformation
    · Challenges posed by new threats, endpoint security challenges and expanded reliance on the cloud
    · How to strategize and budget for ongoing challenges in 2021
  • Network Visibility in Today’s Complex World Recorded: Dec 22 2020 58 mins
    Jim Mandelbaum, Senior Security Engineer at Gigamon
    Having visibility into your network, what’s on it and how it’s preforming, is critical to any sized organization. The use of network monitoring tools like SPAN and TAP can certainly help, as can Network Aggregation and Packet Brokers.

    Join Gigamon and (ISC)² as we dive into visibility topics such as:
    · Data de-duplication
    · Slicing
    · Masking
    · TLS decryption
    · Inline and out-of-band tools
    · Virtual and cloud environments
  • Architecting for the Agentless Recorded: Dec 15 2020 60 mins
    Andy Hutchison, Senior Sales Engineer at Gigamon
    Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has increased, the market has responded with a wide variety of technologies. These technologies are classified as “agentless” and you need to prepare for a future project that comprises such technologies.

    The requirements to enable these technologies is not new. However, organizations implement these on an “ad hoc” basis with little thought to scale or future considerations.

    Understand a strategic approach to agentless products and the need for network visibility:
    - Avoid challenges
    - Data contention
    - Scalability

    Join us to learn how you can architect your organization’s environment for future needs!
  • Exploring Innovations in Networking Recorded: Dec 15 2020 32 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    In case you haven’t noticed, the enterprise network is changing and changing fast. Traditional physical routers, switches and firewalls are quickly being replaced by their software-defined counterparts. Networks are moving to the cloud and spanning the world.
    How is the enterprise going to not only leverage the latest network innovations but also try to keep pace?
    How will you manage, monitor, and troubleshoot the ever-more-complex network of the future?
    What are the latest solutions available to help make the job easier?
    Join us for this ActualTech Media replay to get those questions answered and more.

    In this webinar, you will:
    - Learn key trends that are reshaping the networking landscape
    - Discover how you can gain complete network visibility to improve security, ensure performance and prevent problems before they happen
  • Upleveling Your Security and Networking Capabilities Recorded: Dec 8 2020 27 mins
    Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
    We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?

    In this webinar, you'll hear about:
    • Critical components of network detection and response (NDR) technologies
    • Why visibility is a cornerstone to any NDR technology
    • How Gigamon ThreatINSIGHT™ gives you visibility into all devices and traffic types
  • What Zero Trust Networking means for Network Visibility Recorded: Dec 1 2020 59 mins
    Ollie Sheridan, Principal Sales Engineer, Security, Gigamon
    There is much talk in the Industry with regards to Zero Trust Networking (ZTN) - but what does it involve and what does this mean for Network Visibility? In this Webinar we will explore the reason for ZTN, some of the current ideas surrounding the implementations of ZTN and where Network Visibility plays a key role in securing such environments. With one of the key concepts of ZTN being the encryption and authentication of data in motion, we will also discuss the need for Metadata and why this can be an advantage over traditional methods of monitoring.

    Join Gigamon and (ISC)2 for an examination of:
    · Understanding the ZTN trust model at a high level
    · Which ZTN components are most critical and why
    · Why the perimeter is changing and why the need for segmentation goes beyond physical devices
    · The crucial role of metadata in understanding applications on the network
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Building the Foundation for Secure Patient Care-Centered Technologies
  • Live at: May 4 2020 8:15 pm
  • Presented by: Martyn Crew – Director of Solutions Marketing, Gigamon
  • From:
Your email has been sent.
or close