Hi [[ session.user.profile.firstName ]]

Tool Time: Assessing Your Next Infrastructure and Application Monitoring Tools

In the world of IT, it's all about the application. You do what you do to provide business-critical applications to your clients and those apps are expected to be up and running 24x7x365. In order to prevent problems before they happen and ensure that application issues can be resolved quickly and efficiently if they do - you need solid application and infrastructure monitoring tools.

Adding capacity or compatibility to your infrastructure does not mean you must retire your existing monitoring tools. In this ActualTech Media webinar replay, learn how Gigamon can extend the life of your existing infrastructure and application monitoring tools with inline bypass, Application Intelligence, old port speed support, TLS, and de-dup offloading.
Recorded Apr 13 2021 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Muhammad Durrani, Technical Marketing Engineer at Gigamon
Presentation preview: Tool Time: Assessing Your Next Infrastructure and Application Monitoring Tools
  • Channel
  • Channel profile
  • Upleveling Your Security and Networking Capabilities May 25 2021 5:00 pm UTC 27 mins
    Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
    We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?

    In this webinar, you'll hear about:
    •Critical components of network detection and response (NDR) technologies
    •Why visibility is a cornerstone to any NDR technology
    •How Gigamon ThreatINSIGHT™ gives you visibility into all devices and traffic types
  • Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler May 18 2021 5:00 pm UTC 50 mins
    Rahim Ibrahim, Zscaler Business Development & Tech Alliances Mgr + Stephen Newman, VP, Gigamon Product Marketing
    As temporary workplace policies move mainstream, Enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this webinar, we'll highlight the visibility benefits that our Enterprise customers are receiving as they have supported and implemented various new work from home policies.

    You'll learn about:
    • Security Trends from 2020-2021
    • The ease of deployment and management from industry-leading SaaS-based services
    • How customers use the Gigamon ThreatINSIGHT and Zscaler integration to get better visibility
  • 2020 SANS Enterprise Cloud Incident Response Survey Results May 11 2021 5:00 pm UTC 57 mins
    SANS Survey Author, Chris Dale & Survey Advisor, Matt Bromiley + Expert Panel
    In this webcast, survey author Chris Dale and survey advisor Matt Bromiley will join experts representing the survey sponsors to discuss results from the 2020 SANS Enterprise Cloud Incident Response Survey. This roundtable will also explore best practices for detecting, responding to and remediating incidents in the multi-cloud world.

    Attendees at this webcast will learn about the experiences of survey participants with regard to:
    o What components are being breached
    o Preferred sources of evidence in concluding cloud compromise
    o Most prevalent cloud detection capabilities
    o Containment strategies used to control and limit damages from compromise
    o Ways forward in terms of commitment, improvement and impediments
  • CYSEM-21: Cyber Security and Monitoring for the year 2021 May 4 2021 5:00 pm UTC 37 mins
    George Smith, Senior System Engineer at Gigamon
    Cyber Security and Monitoring for the year 2021, is all about acknowledging that we are in a pandemic of cyberattacks in a world of the ever-increasing attack surface with no one single technological vaccine.

    In this Secure World session replay, we will discuss practical, real-world approaches to providing continuous visibility in your complex attack surface, allowing you to combat the threat landscape, therefore, increasing your confidence in your security posture.
  • Responding to the Pandemic: Information Security and Technology Trends Apr 27 2021 5:00 pm UTC 28 mins
    Christopher Steffen, Research Director at EMA and CISSP, CISA
    The COVID-19 pandemic has transformed nearly every aspect of life: the ways people shop, eat, and conduct business. With these changes come new challenges for business leaders trying to keep their businesses afloat. Business leaders and the vendors that support them are trying to understand how the changes will impact their enterprises.

    Leading IT research firm Enterprise Management Associates (EMA) recently completed research into the impacts that the pandemic will have on information security:
    - How business approach and prioritize security
    - Trends in spending and technologies
    - How vendors are adjusting their offerings to handle these evolving markets and threats

    Join Christopher Steffen, research director at EMA and CISSP, CISA, as he reviews the results of this research report: “Best Practices for the Enterprise: Information Security and Technology Trends Responding to the Pandemic.”
  • Guide to Your Public Cloud Journey: 10 Mistakes to Avoid Recorded: Apr 15 2021 46 mins
    Rich Mogull – Analyst & CEO, Securosis
    Enterprises are moving to the cloud faster and furiouser than ever before. As with any complex project, it’s all too easy to get caught up in the tech of the day and lose sight of the journey. In this strategic session for network operations and security professionals, industry analyst Rich Mogull will pull together over a decade’s experience to identify the top opportunities and avoid the top mistakes when moving to the cloud.

    This session includes:
    • An overview of cloud adoption patterns
    • The characteristics of the patterns, and the top opportunities and mistakes
    • How to leverage the concept of the “Minimum Viable Network” to dramatically improve your lift-and-shift and hybrid cloud deployments
  • Tool Time: Assessing Your Next Infrastructure and Application Monitoring Tools Recorded: Apr 13 2021 26 mins
    Muhammad Durrani, Technical Marketing Engineer at Gigamon
    In the world of IT, it's all about the application. You do what you do to provide business-critical applications to your clients and those apps are expected to be up and running 24x7x365. In order to prevent problems before they happen and ensure that application issues can be resolved quickly and efficiently if they do - you need solid application and infrastructure monitoring tools.

    Adding capacity or compatibility to your infrastructure does not mean you must retire your existing monitoring tools. In this ActualTech Media webinar replay, learn how Gigamon can extend the life of your existing infrastructure and application monitoring tools with inline bypass, Application Intelligence, old port speed support, TLS, and de-dup offloading.
  • What is NDR? Recorded: Apr 8 2021 53 mins
    Andy Hutchison, Senior Sales Engineer, Gigamon + Jeremy Pierson, Security Engineer, CompuNet
    Looking for an introduction to Network Detection and Response (NDR)? This conversation will help you sort through the three-letter-acronym buzzword alphabet soup. Join the webinar to learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.

    In this webinar you will learn:
    -What is Network Detection and Response?
    -How can NDR provide answers quickly?
    -Why is NDR important to identify unknown threats?
    -Where does NDR fit in with other security tools?
  • Why NDR? Why decrypt traffic? How a 13th century friar helps cybersecurity today Recorded: Apr 6 2021 29 mins
    Bassam Khan, VP of Product and Technical Marketing at Gigamon
    The Scientific Method transformed the process of scientific discovery. It gave us an empirical framework to arrive at the truth through hypothesis, experimentation, data collection, analysis and conclusion, as opposed making discoveries the old fashioned way; hunches, revelations, dogma and common sense. In the same manner, reliable and complete data, tools to analyze and query the data and a framework to investigate is key to today’s cybersecurity.

    At this session we will cover:
    - Role of visibility in the MITRE ATT&CK framework
    - NSA’s guideline on: Why to decrypt, why not decrypt, what to do if you do decrypt
    - NDR deployment options
    - Close with a quick overview of Gigamon ThreatINSIGHT
  • Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler Recorded: Mar 31 2021 50 mins
    Rahim Ibrahim, Zscaler Business Development & Tech Alliances Mgr + Stephen Newman, VP, Gigamon Product Marketing
    As temporary workplace policies move mainstream, Enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this webinar, we'll highlight the visibility benefits that our Enterprise customers are receiving as they have supported and implemented various new work from home policies.

    You'll learn about:
    • Security Trends from 2020-2021
    • The ease of deployment and management from industry-leading SaaS-based services
    • How customers use the Gigamon ThreatINSIGHT and Zscaler integration to get better visibility
  • Strategies to Overcome 5G Challenges Recorded: Mar 30 2021 33 mins
    Gordon Beith – Senior Director, Product Marketing, Gigamon
    If you’d like to get a high-level overview of the various 5G network architecture modes and the deployment scenarios supported by Gigamon, this technical webinar is for you. See the configuration process for 5G with consideration for existing 4G visibility already in place.
  • Upleveling Your Security and Networking Capabilities Recorded: Mar 23 2021 33 mins
    Martyn Crew, Director, Industry Solutions at Gigamon
    Data breaches are happening every day and are highlighted on the evening news. That's NOT the kind of notoriety that your company needs! In today's world, every organization has concerns about their data and network security, but the real question is - what steps should you take to protect yourself?

    Challenges in up-levelling security and network capabilities in a hybrid world brings even greater complexity for organizations. The hybrid cloud means you need high quality, consistent data to maintain control and up-level your capabilities.

    Join this webinar to:
    · Learn how to improve your company's security posture and improve your network management
    · Find out the benefits of the Gigamon solution for network and hybrid cloud visibility
  • Understanding TLS Decryption: Deploy Your Solution Recorded: Mar 18 2021 42 mins
    Greg Maples, Consulting Security Architect at Gigamon
    The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.

    You’ll learn everything you need to know about implementation, including:
    • Planning
    • Validation
    • Integration
  • Insights From The CyberEdge COVID-19 Impact Report Recorded: Mar 16 2021 56 mins
    Steve Piper – Founder & CEO, CyberEdge Group + Martyn Crew – Dir Industry Solutions, Gigamon
    Join us for a conversation with Steve Piper, Founder & CEO of CyberEdge Group. Steve will share insights from the Group's latest research report: The Impact of COVID-19 on Enterprise IT Security Teams.

    Hear what the research says about:
    * the impact of the work-from-home movement
    * pandemic-related IT challenges
    * the health of security budgets
    * staffing issues, training, and more
  • The Imminent Impact of TLS 1.3 on Network Security Controls Recorded: Mar 9 2021 56 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Understanding TLS Decryption: Design Your Solution Recorded: Mar 4 2021 58 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.

    You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including:
    • Requirements
    • Architectures
    • Best practices
  • Ensuring Trust and Security in Enterprise IT and the Cloud Recorded: Feb 23 2021 26 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    Your job – and we doubt you have any choice but to accept it! – is to leverage every tool in your arsenal to keep bad guys and even human error from dooming your data. Modern security is defense in depth and you need a myriad of tools to keep incidents at bay. Such tools may include privileged password protection, centralized and managed authentication with SSO, rock solid data protection for all of your cloud apps, interconnectivity with security baked in, and much, much more.
    - See how today's most innovative cloud security, storage, networking, data protection, and management solutions complete your security puzzle
    - Learn why privileged password management needs to be a key component in your information security strategy
  • Understanding TLS Decryption: Getting It Right Recorded: Feb 18 2021 58 mins
    Ollie Sheridan, Principal Sales Engineer at Gigamon
    This Tech Talk webinar on understanding how to get decryption right is the first in a three-part series on TLS Decryption.

    With increased malware threats using encryption, winning the battle against malware threats requires getting decryption right.
    In this technical webinar, Gigamon experts explain how to use TLS Decryption to thwart attacks by eliminating blind spots and reducing the attack surface.

    Tune in to learn how to attain North-South and East-West traffic visibility, including:
    • Drivers
    • Challenges
    • Approaches
  • The Imminent Impact of TLS 1.3 on Network Security Controls Recorded: Feb 9 2021 57 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Case Study: Australian National University | Virtual Roundtable Recorded: Feb 2 2021 56 mins
    Suthagar Seevaratnam | ANU CISO
    After finding themselves in a data breach in late 2018, the renowned Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and the level of sophistication behind the hack.

    A 2020 global intelligence threat report by NTT, found the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

    This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

    Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they've made post-incident and what they see as their next steps to improve cybersecurity resiliency in today’s ever-evolving threat landscape.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Tool Time: Assessing Your Next Infrastructure and Application Monitoring Tools
  • Live at: Apr 13 2021 5:00 pm
  • Presented by: Muhammad Durrani, Technical Marketing Engineer at Gigamon
  • From:
Your email has been sent.
or close