Hi [[ session.user.profile.firstName ]]

See Inside Containers with the Gigamon Cloud Suite

Container solutions continue to transform application environments and expand their reach in the network. IT teams are asked to be flexible and adaptable as the enterprise adopts new complexities, but also need to remain cautious about the security implications for the network. This replay of an ActualTech Media Ecocast is a must-see for anyone managing ad hoc, complex security deployments with containers. Learn how the Gigamon Cloud Suite helps you achieve visibility into all traffic across your hybrid cloud.
Recorded Jun 29 2021 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Baseer Balazadeh, Senior Technical Marketing Engineer - Cloud, Gigamon
Presentation preview: See Inside Containers with the Gigamon Cloud Suite
  • Channel
  • Channel profile
  • Ransomware Loitering Presents an Opportunity for Network Detection Aug 24 2021 5:00 pm UTC 29 mins
    Bassam Khan, VP of Product and Technical Marketing - Gigamon
    The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.

    Join this webinar to explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
  • [Ep.3] Shining a Light: Helping SOCs Move Away From Working In The Dark Aug 18 2021 3:00 pm UTC 30 mins
    Bassam Khan - VP of Product and Technical Marketing and Jon Oltsik, Senior Analyst at ESG
    There is no denying that there is a SOC visibility gap issue. Although SIEMs and EDRs have increased many SOC/IR team's effectiveness in identifying active infections, visibility gaps remain. It’s challenging for SOCs to gain complete network visibility due to constantly changing hybrid infrastructure, remote and flexible location working and the ever-increasing amount of encrypted traffic. The result is that analysts are left in the dark when trying to identify all adversary activity across the MITRE ATT&CK framework.

    In episode 3 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how SOCs can shine a light on visibility gaps and arm SOC analysts with accurate and rapid information to address threats.

    We invite you to join us for this short 20-min episode to learn:

    - Why 69% of SOC analysts cite lack of visibility into network traffic as the top reason for SOC ineffectiveness
    - Real-world challenges, such as alerts without context and correlating data across multiple tools
    - How to effectively identify cyber-adversaries across any network, device or traffic
    - And more

    Don’t miss all three webinars in the series!
  • Get Visibility and Intelligence into your Virtual Environments Aug 17 2021 5:00 pm UTC 27 mins
    James Mandelbaum, Field CTO & Senior Security Engineer — Gigamon
    In this short session we will discuss the options on how to obtain traffic flows from your virtual environment. We will also do a live deployment of the Gigamon Hawk fabric to send that traffic into the Application Intelligence Engine and show how easy it is to sessionize the data to see every application running on the network. Come see how to optimize your tools and increase the ROI on your existing investment.
  • Securing the Hybrid Cloud: Visibility Best Practices Aug 11 2021 5:00 pm UTC 25 mins
    Bassam Khan, VP of Product and Technical Marketing - Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You'll learn best practices and see how a little planning and design can go a long way.
  • [Ep.2] Helping SOCs Overcome Distraction Aug 11 2021 3:00 pm UTC 30 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    All too often, SOC analysts are burdened by distractions – they are tied to solution proficiency, addressing false positives, and performing detection tuning – rather than focusing on their primary responsibility: identifying and eliminating threats before they can cause damage. How do you eliminate distractions to allow focus on threat management?

    In episode 2 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG are sharing strategies and solutions for how analysts can overcome distractions and improve SOC and IR efficiency and effectiveness.

    We invite you to join us for this short 20-min episode to learn:

    - Why 43% of analysts indicate maintaining, tuning, and providing updates to their security tools is a core responsibility1
    - How SOCs can overcome the distractions to focus on their primary role: threat management
    - Which tools remove the need for near-constant solution management or maintenance
    - And more

    Don’t miss all three webinars in the series!
  • Supporting a Hybrid Data and Analytics Infrastructure to Drive Innovation Aug 10 2021 5:00 pm UTC 28 mins
    Bassam Khan, VP of Product and Technical Marketing – Gigamon
    In the modern era, analytics are everywhere and provide organizations with mission-critical business, operations, and technology metrics providing directional guidance. Tools must be accessible to everyone from hardcore data scientists to citizen developers. Hybrid complexity adds a greatly increased attack surface, more vulnerabilities and more threats from more bad actors than ever before. Full visibility, 24/7 availability and unlimited scale are necessary to drive innovative analytics in the hybrid cloud.

    In this ActualTech Media replay, you will learn about the cloud visibility gap and how the Gigamon Hawk Visibility and Analytics Fabric closes that gap. Join the webinar to see how you can secure your hybrid cloud network and drive innovative analytics.
  • [Ep.1] How SOCS Are Working Alone – And What To Do About It Aug 4 2021 3:00 pm UTC 30 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    It’s no secret that SOC/IR analysts are faced with high-pressure situations and are in an ongoing race against time to protect their organizations. This fight against threats is often done alone by analysts without the help of outside expertise – the pace can ultimately lead to burnout. According to the Ponemon Institute, 60% of SOC team members are considering changing careers or leaving their jobs due to burnout. How do you prevent burnout from happening in your organization?

    In episode 1 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how analysts can get the advisory guidance they need to reduce burnout.

    We invite you to join us for this short 20-min episode to learn:

    - Why SOC burnout is more of an issue than ever before
    - How businesses can improve SOC effectiveness
    - Why and how Guided-SaaS NDR tools give SOCs both practical and tactical response strategies
    - And more

    Don’t miss all three webinars in the series!
  • Profiling and Posturing your IoMT Network Aug 3 2021 5:00 pm UTC 26 mins
    Rob Langley, Network and Security Architect Solutions Engineer - Gigamon
    The world is constantly changing and now more than ever, already pushed-to-the-brink IT departments are being called upon to help their organizations continue their transformation efforts, to reshape the end user computing experience, and to ensure that IT is secure, compliant, and financially sustainable. Legacy approaches to modern problems may still have a place, but as IT leaders and professionals work to ensure that their platforms are suitable for new needs, it's clear that thinking needs to revolve around supporting a new generation of IT and business.

    Enterprise technology vendors are working hard to help their customers bring sanity to the madness through the development of solutions intended to solve critical business problems. Today’s enterprise IT solutions are supercharging the traditional IT organization with next-generation innovations, making what was seemingly impossible, possible.

    Join us for this replay of an ActualTech Media Spring Summit presentation on Profiling and Posturing your IoMT Network. Learn how to gather accurate, reliable and timely information with little to no human intervention using the Gigamon Visibility Analytics Fabric.
  • Ransomware Loitering Presents an Opportunity for Network Detection Aug 3 2021 1:00 am UTC 29 mins
    Bassam Khan, VP of Product and Technical Marketing, Gigamon
    The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.

    Join this webinar to explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
  • Securing the Hybrid Cloud: 5G Networks Recorded: Jul 27 2021 61 mins
    Gordon Beith, Senior Director, Product Marketing — Gigamon
    5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network, security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual on-prem, or public cloud, ensuring comprehensive continuous visibility into the network is crucial to ensuring and maintaining adequate security. Join Gigamon and (ISC)2 for a discussion on understanding how coherent, high-fidelity network data can enable a strong security posture without breaking the bank.
  • Securing the Hybrid Cloud: Optimizing SIEM Recorded: Jul 20 2021 59 mins
    Muhammad Durrani, Technical Marketing Engineer — Gigamon
    SIEM systems are pivotal to IT organization’s security operations. Many companies are adopting a hybrid cloud model, and cloud-based SIEMs are becoming common as a result. Regardless of on-prem or cloud deployments, the challenges around SIEM remain the same, from data overload, lack of contextual information, to high costs. Security best practices in deploying SIEMs also remain unchanged, which include establishment of use cases, data ingestion types and development of parsers for various tool vendors. Gigamon and (ISC)2 will present this webinar that will cover solutions to these challenges such as Gigamon’s Application Metadata Intelligence as well as various smart filtering techniques.
  • 2021 Cyberthreat Defense Report Recorded: Jul 20 2021 55 mins
    Steve Piper – Founder and CEO, CyberEdge Group + Martyn Crew – Sr Dir Industry Solutions, Gigamon
    Hear the latest research and findings from the CyberEdge 2021 Cyberthreat Defense Report and use them to benchmark your organization’s security posture, operating budget, product investments and best practices against those of your peers in this video webinar.

    The Cyberthreat Defense Report is the de facto standard for assessing security posture. It offers key insights from IT security professionals, helping you to ascertain future IT security infrastructure investments.

    Now in its eighth year, the report incorporates perspectives from 1,200 IT professionals across 19 industries and 17 countries. Join the webinar to hear from Steve Piper, CISSP, Founder and CEO of CyberEdge Group as he reviews the most important findings from the research. Watch to the end to hear Martyn Crew, Director Industry Solutions at Gigamon ask Steve for his insight and perspectives on cyberthreat defense.
  • Avoiding or Minimizing Ransomware Impact to the Bottom Line Recorded: Jul 14 2021 61 mins
    John Pescatore, Director of Emerging Security Trends + Benjamin Wright, Lawyer, Technology Law
    In the event of a ransomware attack, security managers must be able to give business-relevant risk recommendations to CEOs and boards of directors. Most of the thought and effort required to do so must take place well before the attack.

    On this webcast, John Pescatore, SANS Director of Emerging Security Trends, and Benjamin Wright, lawyer and SANS Senior Instructor, will discuss key ransomware issues, including:
    - Key security processes to avoid ransomware attacks
    - Issues around ransomware payoffs if an attack succeeds
    - How cyber insurance can play a role in reducing the financial impact of an attack
  • Securing the Hybrid Cloud: Visibility Best Practices Recorded: Jul 13 2021 62 mins
    James Mandelbaum, Field CTO & Senior Security Engineer — Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.
  • SANS 2021 Report: Top Skills Analysts Need to Master Recorded: Jul 7 2021 60 mins
    Ismael Valenzuela, co-author of the cyber defense course SANS SEC530: Defensible Security Architecture and Engineering
    The U.S. Bureau of Labor Statistics reports that the employment of information security analysts is projected to grow 32% from 2018 to 2028, much faster than the average for all occupations. As one of the highest-paid jobs in the field, security analysts must become masters of all trades, becoming “all-around defenders,” highly competent in threat detection, while maintaining excellent analytical and communication skills. But what are the technical and nontechnical skills required to acquire mastery in this role? And how can industry security solutions augment analysts’ capabilities to become more effective?

    In this webcast, SANS author, instructor, and analyst Ismael Valenzuela will answer these questions and discuss the top skills that security analysts need.
  • Shifting IT Strategies to a Cloud-based Infrastructure Recorded: Jun 30 2021 61 mins
    Dave Shackleford, SANS analyst + Bassam Khan, VP of Product and Technical Marketing, Gigamon
    This SANS survey explored the types of services organizations are using, what types of controls and tools provide the most value, and how effective cloud security brokering is for a range of use cases. in this webcast, SANS analyst Dave Shackleford will join sponsor speakers to explore how survey results can inform and improve your cloud security posture.
  • See Inside Containers with the Gigamon Cloud Suite Recorded: Jun 29 2021 30 mins
    Baseer Balazadeh, Senior Technical Marketing Engineer - Cloud, Gigamon
    Container solutions continue to transform application environments and expand their reach in the network. IT teams are asked to be flexible and adaptable as the enterprise adopts new complexities, but also need to remain cautious about the security implications for the network. This replay of an ActualTech Media Ecocast is a must-see for anyone managing ad hoc, complex security deployments with containers. Learn how the Gigamon Cloud Suite helps you achieve visibility into all traffic across your hybrid cloud.
  • Healthcare’s Cybersecurity Solution Market - Where it’s Now Headed and Why? Recorded: Jun 22 2021 47 mins
    Thomas Finn, Dir Biz Dev, Medigate + Martyn Crew, Sr Dir Industry Mktg, Gigamon + Sean Tufts, Dir, Product Security, Optiv
    For a solution market just 3 years in the making, most everything we thought we knew about IoT cybersecurity has changed. Sales pitches once centered on threats, quickly gave way to features, functions, speeds and feeds, and now the conversations are about interoperability, operational efficiency and business value.

    Front-line experts from Gigamon, Optiv and Medigate will shed light on IoT cybersecurity’s rapid coming of age, and will discuss where the IoT solution market is clearly headed. Importantly, webinar attendees will learn about emerging best practices and how they are shaping an enlightened new concept called “Clinical Zero Trust.”
  • Securing the Hybrid Cloud: Visibility Best Practices Recorded: Jun 15 2021 59 mins
    James Mandelbaum, Field CTO & Senior Security Engineer — Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.
  • Sharpening Your Focus: Effective Pivots From ThreatINSIGHT Observations Recorded: Jun 15 2021 56 mins
    Gigamon Technical Success Team
    Expanding on using Gigamon ThreatINSIGHT™ observations to kickstart your investigation and hunting efforts, this session provides a refresher on using observations and demonstrates how to effectively pivot from ThreatINSIGHT observations to discover anomalies and potentially malicious behavior in your environment.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: See Inside Containers with the Gigamon Cloud Suite
  • Live at: Jun 29 2021 5:00 pm
  • Presented by: Baseer Balazadeh, Senior Technical Marketing Engineer - Cloud, Gigamon
  • From:
Your email has been sent.
or close