Hi [[ session.user.profile.firstName ]]

Upleveling Your Security and Networking Capabilities

We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?

In this webinar, you'll hear about:
•Critical components of network detection and response (NDR) technologies
•Why visibility is a cornerstone to any NDR technology
•How Gigamon ThreatINSIGHT™ gives you visibility into all devices and traffic types
Live online May 25 5:00 pm UTC
or after on demand 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
Presentation preview: Upleveling Your Security and Networking Capabilities
  • Channel
  • Channel profile
  • Securing the Hybrid Cloud: Visibility Best Practices Jun 15 2021 5:00 pm UTC 1 min
    James Mandelbaum, Senior Security Engineer, Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.
  • Ransomware Loitering Presents an Opportunity for Network Detection Jun 8 2021 5:00 pm UTC 29 mins
    Bassam Khan, VP of Product and Technical Marketing at Gigamon
    The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.

    Join this webinar to explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
  • 2021 Cyberthreat Defense Report Jun 2 2021 5:00 pm UTC 64 mins
    Steve Piper – Founder and CEO, CyberEdge Group + Martyn Crew – Sr Dir Industry Solutions, Gigamon
    Hear the latest research and findings from the CyberEdge 2021 Cyberthreat Defense Report and use them to benchmark your organization’s security posture, operating budget, product investments and best practices against those of your peers in this video webinar.

    The Cyberthreat Defense Report is the de facto standard for assessing security posture. It offers key insights from IT security professionals, helping you to ascertain future IT security infrastructure investments.

    Now in its eighth year, the report incorporates perspectives from 1,200 IT professionals across 19 industries and 17 countries. Join the webinar to hear from Steve Piper, CISSP, Founder and CEO of CyberEdge Group as he reviews the most important findings from the research. Watch to the end to hear Martyn Crew, Director Industry Solutions at Gigamon ask Steve for his insight and perspectives on cyberthreat defense.
  • Report: NetOps and SecOps Guide to Public Cloud Journeys Jun 1 2021 5:00 pm UTC 46 mins
    Rich Mogull – Analyst & CEO, Securosis
    Enterprises are moving to the cloud faster and furiouser than ever before. As with any complex project, it’s all too easy to get caught up in the tech of the day and lose sight of the journey. In this strategic session for network operations and security professionals, industry analyst Rich Mogull will pull together over a decade’s experience to identify the top opportunities and avoid the top mistakes when moving to the cloud.

    This session includes:
    • An overview of cloud adoption patterns
    • The characteristics of the patterns, and the top opportunities and mistakes
    • How to leverage the concept of the “Minimum Viable Network” to dramatically improve your lift-and-shift and hybrid cloud deployments
  • Upleveling Your Security and Networking Capabilities May 25 2021 5:00 pm UTC 27 mins
    Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
    We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?

    In this webinar, you'll hear about:
    •Critical components of network detection and response (NDR) technologies
    •Why visibility is a cornerstone to any NDR technology
    •How Gigamon ThreatINSIGHT™ gives you visibility into all devices and traffic types
  • Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler May 18 2021 5:00 pm UTC 50 mins
    Rahim Ibrahim, Zscaler Business Development & Tech Alliances Mgr + Stephen Newman, VP, Gigamon Product Marketing
    As temporary workplace policies move mainstream, Enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this webinar, we'll highlight the visibility benefits that our Enterprise customers are receiving as they have supported and implemented various new work from home policies.

    You'll learn about:
    • Security Trends from 2020-2021
    • The ease of deployment and management from industry-leading SaaS-based services
    • How customers use the Gigamon ThreatINSIGHT and Zscaler integration to get better visibility
  • 2020 SANS Enterprise Cloud Incident Response Survey Results Recorded: May 11 2021 57 mins
    SANS Survey Author, Chris Dale & Survey Advisor, Matt Bromiley + Expert Panel
    In this webcast, survey author Chris Dale and survey advisor Matt Bromiley will join experts representing the survey sponsors to discuss results from the 2020 SANS Enterprise Cloud Incident Response Survey. This roundtable will also explore best practices for detecting, responding to and remediating incidents in the multi-cloud world.

    Attendees at this webcast will learn about the experiences of survey participants with regard to:
    o What components are being breached
    o Preferred sources of evidence in concluding cloud compromise
    o Most prevalent cloud detection capabilities
    o Containment strategies used to control and limit damages from compromise
    o Ways forward in terms of commitment, improvement and impediments
  • CYSEM-21: Cyber Security and Monitoring for the year 2021 Recorded: May 4 2021 37 mins
    George Smith, Senior System Engineer at Gigamon
    Cyber Security and Monitoring for the year 2021, is all about acknowledging that we are in a pandemic of cyberattacks in a world of the ever-increasing attack surface with no one single technological vaccine.

    In this Secure World session replay, we will discuss practical, real-world approaches to providing continuous visibility in your complex attack surface, allowing you to combat the threat landscape, therefore, increasing your confidence in your security posture.
  • Responding to the Pandemic: Information Security and Technology Trends Recorded: Apr 27 2021 28 mins
    Christopher Steffen, Research Director at EMA and CISSP, CISA
    The COVID-19 pandemic has transformed nearly every aspect of life: the ways people shop, eat, and conduct business. With these changes come new challenges for business leaders trying to keep their businesses afloat. Business leaders and the vendors that support them are trying to understand how the changes will impact their enterprises.

    Leading IT research firm Enterprise Management Associates (EMA) recently completed research into the impacts that the pandemic will have on information security:
    - How business approach and prioritize security
    - Trends in spending and technologies
    - How vendors are adjusting their offerings to handle these evolving markets and threats

    Join Christopher Steffen, research director at EMA and CISSP, CISA, as he reviews the results of this research report: “Best Practices for the Enterprise: Information Security and Technology Trends Responding to the Pandemic.”
  • Guide to Your Public Cloud Journey: 10 Mistakes to Avoid Recorded: Apr 15 2021 46 mins
    Rich Mogull – Analyst & CEO, Securosis
    Enterprises are moving to the cloud faster and furiouser than ever before. As with any complex project, it’s all too easy to get caught up in the tech of the day and lose sight of the journey. In this strategic session for network operations and security professionals, industry analyst Rich Mogull will pull together over a decade’s experience to identify the top opportunities and avoid the top mistakes when moving to the cloud.

    This session includes:
    • An overview of cloud adoption patterns
    • The characteristics of the patterns, and the top opportunities and mistakes
    • How to leverage the concept of the “Minimum Viable Network” to dramatically improve your lift-and-shift and hybrid cloud deployments
  • Tool Time: Assessing Your Next Infrastructure and Application Monitoring Tools Recorded: Apr 13 2021 26 mins
    Muhammad Durrani, Technical Marketing Engineer at Gigamon
    In the world of IT, it's all about the application. You do what you do to provide business-critical applications to your clients and those apps are expected to be up and running 24x7x365. In order to prevent problems before they happen and ensure that application issues can be resolved quickly and efficiently if they do - you need solid application and infrastructure monitoring tools.

    Adding capacity or compatibility to your infrastructure does not mean you must retire your existing monitoring tools. In this ActualTech Media webinar replay, learn how Gigamon can extend the life of your existing infrastructure and application monitoring tools with inline bypass, Application Intelligence, old port speed support, TLS, and de-dup offloading.
  • What is NDR? Recorded: Apr 8 2021 53 mins
    Andy Hutchison, Senior Sales Engineer, Gigamon + Jeremy Pierson, Security Engineer, CompuNet
    Looking for an introduction to Network Detection and Response (NDR)? This conversation will help you sort through the three-letter-acronym buzzword alphabet soup. Join the webinar to learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.

    In this webinar you will learn:
    -What is Network Detection and Response?
    -How can NDR provide answers quickly?
    -Why is NDR important to identify unknown threats?
    -Where does NDR fit in with other security tools?
  • Why NDR? Why decrypt traffic? How a 13th century friar helps cybersecurity today Recorded: Apr 6 2021 29 mins
    Bassam Khan, VP of Product and Technical Marketing at Gigamon
    The Scientific Method transformed the process of scientific discovery. It gave us an empirical framework to arrive at the truth through hypothesis, experimentation, data collection, analysis and conclusion, as opposed making discoveries the old fashioned way; hunches, revelations, dogma and common sense. In the same manner, reliable and complete data, tools to analyze and query the data and a framework to investigate is key to today’s cybersecurity.

    At this session we will cover:
    - Role of visibility in the MITRE ATT&CK framework
    - NSA’s guideline on: Why to decrypt, why not decrypt, what to do if you do decrypt
    - NDR deployment options
    - Close with a quick overview of Gigamon ThreatINSIGHT
  • Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler Recorded: Mar 31 2021 50 mins
    Rahim Ibrahim, Zscaler Business Development & Tech Alliances Mgr + Stephen Newman, VP, Gigamon Product Marketing
    As temporary workplace policies move mainstream, Enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this webinar, we'll highlight the visibility benefits that our Enterprise customers are receiving as they have supported and implemented various new work from home policies.

    You'll learn about:
    • Security Trends from 2020-2021
    • The ease of deployment and management from industry-leading SaaS-based services
    • How customers use the Gigamon ThreatINSIGHT and Zscaler integration to get better visibility
  • Strategies to Overcome 5G Challenges Recorded: Mar 30 2021 33 mins
    Gordon Beith – Senior Director, Product Marketing, Gigamon
    If you’d like to get a high-level overview of the various 5G network architecture modes and the deployment scenarios supported by Gigamon, this technical webinar is for you. See the configuration process for 5G with consideration for existing 4G visibility already in place.
  • Upleveling Your Security and Networking Capabilities Recorded: Mar 23 2021 33 mins
    Martyn Crew, Director, Industry Solutions at Gigamon
    Data breaches are happening every day and are highlighted on the evening news. That's NOT the kind of notoriety that your company needs! In today's world, every organization has concerns about their data and network security, but the real question is - what steps should you take to protect yourself?

    Challenges in up-levelling security and network capabilities in a hybrid world brings even greater complexity for organizations. The hybrid cloud means you need high quality, consistent data to maintain control and up-level your capabilities.

    Join this webinar to:
    · Learn how to improve your company's security posture and improve your network management
    · Find out the benefits of the Gigamon solution for network and hybrid cloud visibility
  • Understanding TLS Decryption: Deploy Your Solution Recorded: Mar 18 2021 42 mins
    Greg Maples, Consulting Security Architect at Gigamon
    The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.

    You’ll learn everything you need to know about implementation, including:
    • Planning
    • Validation
    • Integration
  • Insights From The CyberEdge COVID-19 Impact Report Recorded: Mar 16 2021 56 mins
    Steve Piper – Founder & CEO, CyberEdge Group + Martyn Crew – Dir Industry Solutions, Gigamon
    Join us for a conversation with Steve Piper, Founder & CEO of CyberEdge Group. Steve will share insights from the Group's latest research report: The Impact of COVID-19 on Enterprise IT Security Teams.

    Hear what the research says about:
    * the impact of the work-from-home movement
    * pandemic-related IT challenges
    * the health of security budgets
    * staffing issues, training, and more
  • The Imminent Impact of TLS 1.3 on Network Security Controls Recorded: Mar 9 2021 56 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Understanding TLS Decryption: Design Your Solution Recorded: Mar 4 2021 58 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.

    You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including:
    • Requirements
    • Architectures
    • Best practices
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Upleveling Your Security and Networking Capabilities
  • Live at: May 25 2021 5:00 pm
  • Presented by: Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
  • From:
Your email has been sent.
or close