Hi [[ session.user.profile.firstName ]]

Architecting for the Agentless

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has increased, the market has responded with a wide variety of technologies. These technologies are classified as “agentless” and you need to prepare for a future project that comprises such technologies.

The requirements to enable these technologies is not new. However, organizations implement these on an “ad hoc” basis with little thought to scale or future considerations.

Understand a strategic approach to agentless products and the need for network visibility:
- Avoid challenges
- Data contention
- Scalability

Join us to learn how you can architect your organization’s environment for future needs!
Recorded Dec 15 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andy Hutchison, Senior Sales Engineer at Gigamon
Presentation preview: Architecting for the Agentless
  • Channel
  • Channel profile
  • The Imminent Impact of TLS 1.3 on Network Security Controls Feb 9 2021 6:00 pm UTC 60 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Case Study: Australian National University | Virtual Roundtable Feb 2 2021 6:00 pm UTC 56 mins
    Suthagar Seevaratnam | ANU CISO
    After finding themselves in a data breach in late 2018, the renowned Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and the level of sophistication behind the hack.

    A 2020 global intelligence threat report by NTT, found the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

    This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

    Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they've made post-incident and what they see as their next steps to improve cybersecurity resiliency in today’s ever-evolving threat landscape.
  • Insights From The CyberEdge COVID-19 Impact Report Recorded: Jan 12 2021 57 mins
    Steve Piper – Founder and CEO of CyberEdge Group + Martyn Crew – Dir Industry Solutions, Gigamon
    Join us for a conversation with Steve Piper, Founder & CEO of CyberEdge Group. Steve will share insights from the Group's latest research report: The Impact of COVID-19 on Enterprise IT Security Teams.

    Hear what the research says about:
    * the impact of the work-from-home movement
    * pandemic-related IT challenges
    * the health of security budgets
    * staffing issues, training, and more
  • 5 Reasons You Don't Need New Budget to Buy Gigamon Recorded: Jan 5 2021 21 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    It’s not easy to get approval to invest in the solutions you need, especially in these uncertain times. We can help. Gigamon solutions enable you to save money in your tools budget so you can re-use that money to drive high impact digital transformation initiatives.

    Watch now and learn how to:
    • Reduce duplicate traffic on your network by 50%
    • Filter out low risk, irrelevant traffic and focus on high-risk traffic

    • Minimize the number of new tools you’ll need as your data volumes increase
    • Use existing tools on upgraded, faster networks
  • CISO's Perspective: Adapt and Secure Recorded: Dec 29 2020 39 mins
    Mike Huckaby, VP, Worldwide Sales Engineering at Gigamon
    2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt.

    Join this exclusive panel for unique insight into:
    · How to respond when your business faces historic transformation
    · Challenges posed by new threats, endpoint security challenges and expanded reliance on the cloud
    · How to strategize and budget for ongoing challenges in 2021
  • Network Visibility in Today’s Complex World Recorded: Dec 22 2020 58 mins
    Jim Mandelbaum, Senior Security Engineer at Gigamon
    Having visibility into your network, what’s on it and how it’s preforming, is critical to any sized organization. The use of network monitoring tools like SPAN and TAP can certainly help, as can Network Aggregation and Packet Brokers.

    Join Gigamon and (ISC)² as we dive into visibility topics such as:
    · Data de-duplication
    · Slicing
    · Masking
    · TLS decryption
    · Inline and out-of-band tools
    · Virtual and cloud environments
  • Architecting for the Agentless Recorded: Dec 15 2020 60 mins
    Andy Hutchison, Senior Sales Engineer at Gigamon
    Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has increased, the market has responded with a wide variety of technologies. These technologies are classified as “agentless” and you need to prepare for a future project that comprises such technologies.

    The requirements to enable these technologies is not new. However, organizations implement these on an “ad hoc” basis with little thought to scale or future considerations.

    Understand a strategic approach to agentless products and the need for network visibility:
    - Avoid challenges
    - Data contention
    - Scalability

    Join us to learn how you can architect your organization’s environment for future needs!
  • Exploring Innovations in Networking Recorded: Dec 15 2020 32 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    In case you haven’t noticed, the enterprise network is changing and changing fast. Traditional physical routers, switches and firewalls are quickly being replaced by their software-defined counterparts. Networks are moving to the cloud and spanning the world.
    How is the enterprise going to not only leverage the latest network innovations but also try to keep pace?
    How will you manage, monitor, and troubleshoot the ever-more-complex network of the future?
    What are the latest solutions available to help make the job easier?
    Join us for this ActualTech Media replay to get those questions answered and more.

    In this webinar, you will:
    - Learn key trends that are reshaping the networking landscape
    - Discover how you can gain complete network visibility to improve security, ensure performance and prevent problems before they happen
  • Upleveling Your Security and Networking Capabilities Recorded: Dec 8 2020 27 mins
    Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
    We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?

    In this webinar, you'll hear about:
    • Critical components of network detection and response (NDR) technologies
    • Why visibility is a cornerstone to any NDR technology
    • How Gigamon ThreatINSIGHT™ gives you visibility into all devices and traffic types
  • What Zero Trust Networking means for Network Visibility Recorded: Dec 1 2020 59 mins
    Ollie Sheridan, Principal Sales Engineer, Security, Gigamon
    There is much talk in the Industry with regards to Zero Trust Networking (ZTN) - but what does it involve and what does this mean for Network Visibility? In this Webinar we will explore the reason for ZTN, some of the current ideas surrounding the implementations of ZTN and where Network Visibility plays a key role in securing such environments. With one of the key concepts of ZTN being the encryption and authentication of data in motion, we will also discuss the need for Metadata and why this can be an advantage over traditional methods of monitoring.

    Join Gigamon and (ISC)2 for an examination of:
    · Understanding the ZTN trust model at a high level
    · Which ZTN components are most critical and why
    · Why the perimeter is changing and why the need for segmentation goes beyond physical devices
    · The crucial role of metadata in understanding applications on the network
  • Ransomware Prevention Report: How to Address a Pervasive and Unrelenting Threat Recorded: Nov 23 2020 64 mins
    Justin Henderson, Certified SANS Instructor
    Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities and now it’s even targeting itself toward halting critical ICS/SCADA operations. This webcast will explain why and how ransomware is spreading, introduce standards and provide guidance for detecting and recovering from ransomware, based on US-CERT and NIST resources.

    Attendees will learn how to:

    * Adapt their architectures to enable more effective ransomware detection and response
    * Secure their systems against phishing, USB, web drive-bys and other attack vectors
    * Reduce vulnerabilities through appropriate policies and user training
    * Use baselining, monitoring, logging and analysis to detect ransomware
    * Engage reporting, forensics and secure storage in the battle against ransomware
    * Address RIPlace ransomware and its abuse of the Rename operation

    The webcast will also provide special considerations that ICS/SCADA organizations need to address.


    SPEAKER BIO: Justin Henderson is a certified SANS instructor who authored the SEC555 SIEM with Tactical Analytics course and co-authored SEC455 SIEM Design and Implementation and SEC530 Defensible Security Architecture and Engineering. He is a member of the SANS Cyber Guardian Blue Team who is passionate about making defense fun and engaging. Justin specializes in threat hunting via SIEM, network security monitoring and ad hoc scripting.
  • Is Work From Home the New Normal for Federal Agencies? Recorded: Nov 19 2020 14 mins
    Dennis Reilly – Public Sector VP + Martyn Crew – Director, Industry Solutions, Gigamon
    What have we learned from the transition to work-from-home and how can government agencies operate going forward? Will this be the new normal and which new guidelines and best practices will we bring with us? Hear Dennis Reilly, Vice President Public Sector Sales for Gigamon, answer these questions and more. 
     
    We’ll discuss:  
    * Challenges of a work-from-home environment specific to government organizations
    * How Gigamon can help workers transition back into the office 

    * Why COVID-19 may ultimately be a force for good in government IT
  • Here Be Dragons: The Double-Edged Sword That Is TLS Recorded: Nov 17 2020 60 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    TLS is becoming ubiquitous, but it’s a double-edged sword. On the one side, organizations can mitigate risk vectors using this protocol. On the flipside is the misuse of TLS by threat actors trying to hide their activities and prevent your security monitoring infrastructure from detecting their activities. How do you benefit from TLS, but avoid the risks? Is decrypting everything the right approach? And if so, where? What about non-decrypting approaches to threat detection, like JA3? TLS 1.3 was a significant change, what do I need to know about it? Join Gigamon and (ISC)2 to get answers to these questions and more.

    Watch this replay webinar to learn the answer to this question, plus:
    · Whether or not decrypting everything the right approach
    · How non-decrypting approaches to threat detection, such as JA3, compare
    · What you need to know about TLS 1.3
  • Zero Trust: Keeping Secure in a Transitional World Recorded: Nov 10 2020 58 mins
    Ricardo Font – Product Marketing Manager, Gigamon
    Over the last decade, many publicly reported breaches have caused organizations to re-think and re-architect their internal network, eschewing older conventions and replacing them with frameworks that continually ensure that the implicit trust granted to users, devices and applications, is reduced. However, these new frameworks, generally categorized as Zero Trust frameworks, are often misunderstood, and their implementation, delayed. Join Gigamon and (ISC)² as we examine Zero Trust architectures.

    You’ll learn:
    · Common conventions of Zero Trust
    · Necessary network changes that support Zero Trust architecture
    · Best practices and implementation strategies
    · Caveats and gotchas
  • Encrypted Things – Finding Threats in an Obscure World Recorded: Nov 3 2020 57 mins
    Ricardo Font – Product Marketing Manager, Gigamon
    With the release of TLS 1.3 and the continued rise of external and internal encrypted traffic use, security teams are faced with the dilemma of finding threats within traffic streams that are increasingly obscured. Though many organizations decrypt and inspect traffic due to both security and regulatory concerns, there are many that are effectively blind to threats that are communicating via encrypted channels. However, the news is not all grim; join (ISC)² and Gigamon as we dive into discovery methodologies that can be used to detect threats within encrypted traffic without the need for decryption.

    You’ll learn:
    - Threat detection methodologies
    - Encryption-agnostic detection techniques
    - Detailed breakdown of what encrypted traffic can reveal
    - Best practices
  • Getting the Most Out of Your SIEM Using Application Metadata Recorded: Nov 2 2020 37 mins
    Muhammad Durrrani – Technical Marketing Engineer, Gigamon
    Get more from your SIEM and reduce expenses at the same time. Watch now to hear Gigamon Technical Marketing Engineer, Muhammad Durrani discuss today’s common SIEM challenges, our Gigamon Application Intelligence for Splunk, built-in security and performance use cases, options for custom use cases and a live demo.

    Speaker: Muhammad Durrani, Gigamon Technical Marketing Engineer
    Recorded: Gigamon Customer Bootcamp | October 2020

    Learn more about SIEM optimization: Gigamon.com/siem
  • Transport Layer Security (TLS) 1.3: A New Private World Recorded: Oct 27 2020 60 mins
    Ricardo Font – Product Marketing Manager, Gigamon
    TLS 1.3 brings major changes to internet encryption in the name of privacy and security. Without properly understanding these changes, however, IT professionals will be caught unable to detect security threats hidden in TLS 1.3 encrypted traffic.

    Watch the Gigamon (ISC)2 Security Briefing where we will share:
    • Revealing statistics associated with encrypted traffic
    • Important new capabilities and advantages of TLS 1.3
    • Implementation caveats, gotchas and best practices for deployment

    Presenter: Ricardo Font, Product Marketing Manager, Gigamon ThreatINSIGHT™
  • 5 Reasons You Don't Need New Budget to Buy Gigamon Recorded: Oct 22 2020 38 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    It’s not always easy to get approval to invest in the solutions you need, especially in these uncertain times. Let us help. Gigamon solutions enable you to save money in your tools budget so you can re-use that money to drive high impact digital transformation initiatives.

    Attend the live webinar to learn how to:
    • Reduce duplicate traffic on your network by 50%
    • Filter out low risk, irrelevant traffic and focus on high-risk traffic

    • Minimize the number of new tools you’ll need as your data volumes increase
    • Use existing tools on upgraded, faster networks
  • Gigamon Product & Solutions Overview Recorded: Oct 13 2020 24 mins
    Ananda Rajagopal - VP of Products, Gigamon
    Interested in network visibility and threat protection? Get an in-depth look into the current Gigamon innovation and product roadmap.

    You'll learn how Gigamon Visibility and Analytics Fabric enables you to access, aggregate, transform, and analyze your network traffic across your physical, virtual or cloud infrastructure.

    You'll also learn how ThreatINSIGHT, Gigamon high-velocity cloud native network detection and response (NDR) provides unequaled visibility across your attack surface, high fidelity threat detection, and rapid and informed response.

    Speaker: Ananda Rajagopal - VP of Products, Gigamon
    Recorded: Gigamon Customer Bootcamp | October 2020
  • Illuminate Applications to Secure Workloads and Optimize UX Recorded: Oct 12 2020 59 mins
    Cameron Smith, Director of Product Management at Gigamon
    Multi-cloud deployments are the hot new trend and VMware with NSX-T is leading the charge. You need your application visibility solution to follow. Find out how fully integrated Gigamon next-gen network visibility capabilities allow you to identify and filter apps to your security and performance monitoring tools, maximize their effectiveness, and minimize scaling.

    Key topics include:
    •Obtain comprehensive application-layer visibility into multi-clouds
    •Gain insights into NSX-T and NSX-Service insertion
    •Understand the advantages of next-generation network visibility solutions

    Presented by:
    Cameron Smith, Director of Product Management at Gigamon
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Architecting for the Agentless
  • Live at: Dec 15 2020 8:00 pm
  • Presented by: Andy Hutchison, Senior Sales Engineer at Gigamon
  • From:
Your email has been sent.
or close