5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network, security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual on-prem, or public cloud, ensuring comprehensive continuous visibility into the network is crucial to ensuring and maintaining adequate security. Join Gigamon and (ISC)2 for a discussion on understanding how coherent, high-fidelity network data can enable a strong security posture without breaking the bank.
RecordedJul 27 202161 mins
Your place is confirmed, we'll send you email reminders
Container solutions continue to transform application environments and expand their reach in the network. IT teams are asked to be flexible and adaptable as the enterprise adopts new complexities, but also need to remain cautious about the security implications for the network. This replay of an ActualTech Media Ecocast is a must-see for anyone managing ad hoc, complex security deployments with containers. Learn how the Gigamon Cloud Suite helps you achieve visibility into all traffic across your hybrid cloud.
Bassam Khan, VP of Product and Technical Marketing Engineering - Gigamon
With an ever-increasing number of cloud combinations, from private to public to hybrid to multi, it's no wonder that IT pros and decision makers constantly seek out new guidance around how to formulate a coherent cloud strategy. With so many cloud solutions available, the challenge for IT organization is how to find the right cloud solution to solve the particular challenges that they are facing in their data center.
Join this short webinar to quickly and efficiently learn about an on-premise and hybrid cloud solution and how you can transform availability, scalability, efficiency, and data protection in your data center.
Greg Maples, Consulting Security Architect at Gigamon
The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.
You’ll learn everything you need to know about implementation, including:
Robert Rodriguez, Founder of SINET, Nick Shevelyov, Author & CISO of Silicon Valley Bank, and other Industry leaders
Join our distinguished panel of Cybersecurity executives as they discuss why ransomware, extortion, and other attacks are becoming more prevalent and how you can prepare to get ahead of the curve.
The panel, moderated by Robert Rodriguez, Founder of SINET, will bring together industry leaders — including Nick Shevelyov, CISO of Silicon Valley Bank and best-selling author of Cyber War…and Peace — to share insights and best practices that make will help you be better prepared for ransomware attacks. Stay to the end to get your burning questions answered.
What you’ll learn:
• Security best practices to stay secure and get complete network visibility
• How to prepare for ransomware and cybersecurity attacks
• The tools, models, and processes that successful companies implement
EXCLUSIVE OFFER: 100 lucky registrants will receive a complimentary copy of Nick’s highly acclaimed book, Cyber War…and Peace, after the event.
Bassam Khan, VP of Product Marketing - Gigamon + Larry Hammond, Sr Sales Engineer - Gigamon
The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.
Join this webinar to explore how ransomware loitering allows security analysts to use network visibility, detection, and response to discover malicious activity between initial compromise and encryption. Our experts will cover:
• How threat actors rely on your network, and how you can use network visibility to your advantage
• The importance of inspecting encrypted traffic, the challenges of doing so, and the NSA's guidelines on addressing those challenges
• How a new and innovative approach to network detection and response is transforming the SOC (Security Operations Center)
Ian Farquhar, Consulting Sales Engineer at Gigamon
This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.
You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including:
• Best practices
Mathias Fuchs and Josh Lemon, SANS Sr. Instructors
In the past year, businesses have been continually under pressure to increase efficiency and keep costs down in the lead-up to recovering while economic conditions are still evolving. This webcast explores the results of the SANS 2021 Threat Hunting Survey, which examined how businesses' cybersecurity defense teams are handling these changes and how organizations can defend against yet-to-be-discovered network threats.
Ollie Sheridan, Principal Sales Engineer at Gigamon
This Tech Talk webinar on understanding how to get decryption right is the first in a three-part series on TLS Decryption.
With increased malware threats using encryption, winning the battle against malware threats requires getting decryption right.
In this technical webinar, Gigamon experts explain how to use TLS Decryption to thwart attacks by eliminating blind spots and reducing the attack surface.
Tune in to learn how to attain North-South and East-West traffic visibility, including:
John Gudmundson, Senior Product Marketing Manager - Gigamon
Moving to hybrid cloud environments needn’t be labor intensive or overly complex. Attend to learn how VMware-based clouds with Gigamon next-generation visibility solutions enables application-level identification and filtering, with advanced metadata generation in a fully automated and virtualized NSX‑T environment. Organizations can reduce error-prone manual processes, enhance security tool effectiveness and maximize user experiences — including those scenarios involving vMotion and dynamic service insertion. You’ll also see two live demonstrations!
Roy Illsley, Chief Analyst - OMDIA + Bassam Khan, VP of Product Marketing - Gigamon
Today’s changing dynamic of business impacts both the business model and IT platform. With workloads moving to the cloud and new cloud-first apps being deployed at ever-increasing rates, IT operations and monitoring are being impacted and need to act quickly.
In this webinar the following questions will be addressed:
- What technologies are being adopted across IT organizations, both at the core and the edge?
- How is IT increasingly leaning on observability to solve hybrid- and multi-cloud monitoring challenges?
- How does the “network perspective” fill a crucial gap in visibility for hybrid infrastructure monitoring?
Gordon Beith, Sr. Director of Product Marketing - Gigamon
Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments are being augmented by new technologies, including containers, software-defined storage, networking, and other capabilities. Operations are looking for ways to optimize all aspects of their virtual environment.
In this webinar, we will discuss:
- Lessons about network traffic visibility in physical, on-prem networks
- How cloud or virtualization changes visibility
- Removing blind spots, reducing complexity, and minimizing costs
Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
Your job – and we doubt you have any choice but to accept it! – is to leverage every tool in your arsenal to keep bad guys and even human error from dooming your data. Modern security is defense in depth and you need myriad tools to keep incidents at bay. Such tools may include privileged password protection, centralized and managed authentication with SSO, rock solid data protection for all of your cloud apps, interconnectivity with security baked in, and much, much more.
- See how today's most innovative cloud security, storage, networking, data protection, and management solutions complete your security puzzle
- Learn why privileged password management needs to be a key component in your information security strategy
Bassam Khan - VP of Product and Technical Marketing and Jon Oltsik, Senior Analyst at ESG
There is no denying that there is a SOC visibility gap issue. Although SIEMs and EDRs have increased many SOC/IR team's effectiveness in identifying active infections, visibility gaps remain. It’s challenging for SOCs to gain complete network visibility due to constantly changing hybrid infrastructure, remote and flexible location working and the ever-increasing amount of encrypted traffic. The result is that analysts are left in the dark when trying to identify all adversary activity across the MITRE ATT&CK framework.
In episode 3 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how SOCs can shine a light on visibility gaps and arm SOC analysts with accurate and rapid information to address threats.
We invite you to join us for this short 20-min episode to learn:
- Why 69% of SOC analysts cite lack of visibility into network traffic as the top reason for SOC ineffectiveness
- Real-world challenges, such as alerts without context and correlating data across multiple tools
- How to effectively identify cyber-adversaries across any network, device or traffic
- And more
David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.
The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.
• What changes are coming and how they impact network visibility
• Which tools are at risk of going dark in the new world
• How long architects have to turn the lights back on
• How IT security can mitigate the impact of what’s coming
• Where DNS security is headed
Hybrid cloud environments are complex — and harder to secure.
In this third webinar of a three-part series, Gigamon experts share insights on how to monitor and secure your new hybrid cloud network and datacenter.
Plus, they offer insights on the importance of cloud visibility and how to achieve it across your network.
* Baseer Balazadeh, Senior Technical Marketing Engineer
* Jim Mandelbaum, Field CTO
* Guy White, Consulting Sales Engineer
* LaFon Hamilton, Sales Engineer
Sign up for the 2 other webinars of the series:
* Cloud Strategy
* Cloud Migration and Deployment
+ The first 25 attendees will receive a $50 Amazon gift card!
Michael Valladao, Sr SE for Gigamon + Dr Chase Cunningham, CSO for Ericom Software
We are so excited to have Zero Trust technical expert Chase Cunningham as our guest in this episode. Mike and Chase discuss a variety of topics around the origins of Zero Trust, important considerations around crafting your Zero Trust strategy, how the US Government has begin to invest in ZT and even a bit about Chase's children's books that teach our next generation about tech.
0:50 —The Origins of Zero Trust and How it's Implemented
6:56 —Zero Trust is Cloud Heavy
8:43 —Paying attention to east/west traffic threats
10:02 —Worst Practices in the Cloud
12:08 —Moving from Cloud to Hybrid
12:52 —Evangelizing ZT
14:53 —Soft Skills for Implementing Zero Trust
16:44 —Zero Trust and the Government
20:55 —Children's books and teaching kids about ZT and IT
Michael Valladao, Sr SE for Gigamon + Ben Stineman, VP Infrastructure & Security at Vinli Inc.
In our second Episode, Mike is joined by Ben Stineman, Vice President of Infrastructure and Security at Vinli Incorporated.
Ben will explain what it takes to start from scratch or migrate to Cloud Native. As a networking expert, he shares his personal experience at Vinli along with helpful tips you need to understand the ins-and-outs of Cloud Native.
1:20 —How to become Cloud Native and the Twelve-Factor App
4:53 —Cloud vs Bare Metal Study
13:31 —Managing GDPR in the Cloud
16:58 —Ben's journey to Cloud Native
18:30 —Networking is still Networking
22:22 —Lessons Learned from Cloud Native
25:28 —Security for Cloud-Native
27:38 —Ben flies drones in the Cloud(s)
Michael Valladao, Sr SE for Gigamon + Ethan Banks, Co-founder of Packet Pushers Interactive
In our first episode, Mike is joined by Ethan Banks networking expert, podcaster, blogger, and co-founder of Packet Pushers Interactive.
First, they will discuss what Hybrid Cloud means and then jump into a lively conversation about important considerations for cloud adoption, who's responsible for security, adopting new tech and processes, organizational changes, gotchas, and much more.
0:39 —Defining Hybrid Cloud
2:29 —Cloud happens when IT is doing other things!
4:30 —Who is responsible for Cloud security?
6:24 —The importance of Cloud visibility
10:04 —Network switches and TAPs in the Cloud
18:26 —Deploying Agents in the Cloud
Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
All too often, SOC analysts are burdened by distractions – they are tied to solution proficiency, addressing false positives, and performing detection tuning – rather than focusing on their primary responsibility: identifying and eliminating threats before they can cause damage. How do you eliminate distractions to allow focus on threat management?
In episode 2 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG are sharing strategies and solutions for how analysts can overcome distractions and improve SOC and IR efficiency and effectiveness.
We invite you to join us for this short 20-min episode to learn:
- Why 43% of analysts indicate maintaining, tuning, and providing updates to their security tools is a core responsibility1
- How SOCs can overcome the distractions to focus on their primary role: threat management
- Which tools remove the need for near-constant solution management or maintenance
- And more
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.