Hi [[ session.user.profile.firstName ]]

Profiling and Posturing your IoMT Network

The world is constantly changing and now more than ever, already pushed-to-the-brink IT departments are being called upon to help their organizations continue their transformation efforts, to reshape the end user computing experience, and to ensure that IT is secure, compliant, and financially sustainable. Legacy approaches to modern problems may still have a place, but as IT leaders and professionals work to ensure that their platforms are suitable for new needs, it's clear that thinking needs to revolve around supporting a new generation of IT and business.

Enterprise technology vendors are working hard to help their customers bring sanity to the madness through the development of solutions intended to solve critical business problems. Today’s enterprise IT solutions are supercharging the traditional IT organization with next-generation innovations, making what was seemingly impossible, possible.

Join us for this replay of an ActualTech Media Spring Summit presentation on Profiling and Posturing your IoMT Network. Learn how to gather accurate, reliable and timely information with little to no human intervention using the Gigamon Visibility Analytics Fabric.
Recorded Aug 3 2021 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob Langley, Network and Security Architect Solutions Engineer - Gigamon
Presentation preview: Profiling and Posturing your IoMT Network
  • Channel
  • Channel profile
  • See, Secure and Optimize your VMware-based Cloud Oct 19 2021 5:00 pm UTC 62 mins
    John Gudmundson, Senior Product Marketing Manager - Gigamon
    Moving to hybrid cloud environments needn’t be labor intensive or overly complex. Attend to learn how VMware-based clouds with Gigamon next-generation visibility solutions enables application-level identification and filtering, with advanced metadata generation in a fully automated and virtualized NSX‑T environment. Organizations can reduce error-prone manual processes, enhance security tool effectiveness and maximize user experiences — including those scenarios involving vMotion and dynamic service insertion. You’ll also see two live demonstrations!
  • Hybrid-cloud survey results, and the value of network visibility Oct 12 2021 5:00 pm UTC 39 mins
    Roy Illsley, Chief Analyst - OMDIA + Bassam Khan, VP of Product Marketing - Gigamon
    Today’s changing dynamic of business impacts both the business model and IT platform. With workloads moving to the cloud and new cloud-first apps being deployed at ever-increasing rates, IT operations and monitoring are being impacted and need to act quickly.

    In this webinar the following questions will be addressed:
    - What technologies are being adopted across IT organizations, both at the core and the edge?
    - How is IT increasingly leaning on observability to solve hybrid- and multi-cloud monitoring challenges?
    - How does the “network perspective” fill a crucial gap in visibility for hybrid infrastructure monitoring?
  • Improving Management and Protection of Cloud and Virtual Deployments Oct 5 2021 5:00 pm UTC 28 mins
    Gordon Beith, Sr. Director of Product Marketing - Gigamon
    Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments are being augmented by new technologies, including containers, software-defined storage, networking, and other capabilities. Operations are looking for ways to optimize all aspects of their virtual environment.

    In this webinar, we will discuss:
    - Lessons about network traffic visibility in physical, on-prem networks
    - How cloud or virtualization changes visibility
    - Removing blind spots, reducing complexity, and minimizing costs
  • Ensuring Trust and Security in Enterprise IT and the Cloud Sep 28 2021 5:00 pm UTC 27 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    Your job – and we doubt you have any choice but to accept it! – is to leverage every tool in your arsenal to keep bad guys and even human error from dooming your data. Modern security is defense in depth and you need myriad tools to keep incidents at bay. Such tools may include privileged password protection, centralized and managed authentication with SSO, rock solid data protection for all of your cloud apps, interconnectivity with security baked in, and much, much more.
    - See how today's most innovative cloud security, storage, networking, data protection, and management solutions complete your security puzzle
    - Learn why privileged password management needs to be a key component in your information security strategy
  • [Ep.3] Shining a Light: Helping SOCs Move Away From Working In The Dark Sep 23 2021 3:00 pm UTC 18 mins
    Bassam Khan - VP of Product and Technical Marketing and Jon Oltsik, Senior Analyst at ESG
    There is no denying that there is a SOC visibility gap issue. Although SIEMs and EDRs have increased many SOC/IR team's effectiveness in identifying active infections, visibility gaps remain. It’s challenging for SOCs to gain complete network visibility due to constantly changing hybrid infrastructure, remote and flexible location working and the ever-increasing amount of encrypted traffic. The result is that analysts are left in the dark when trying to identify all adversary activity across the MITRE ATT&CK framework.

    In episode 3 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how SOCs can shine a light on visibility gaps and arm SOC analysts with accurate and rapid information to address threats.

    We invite you to join us for this short 20-min episode to learn:

    - Why 69% of SOC analysts cite lack of visibility into network traffic as the top reason for SOC ineffectiveness
    - Real-world challenges, such as alerts without context and correlating data across multiple tools
    - How to effectively identify cyber-adversaries across any network, device or traffic
    - And more

    Don’t miss all three webinars in the series!
  • The Imminent Impact of TLS 1.3 on Network Security Controls Sep 21 2021 5:00 pm UTC 57 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Cloud Visibility, Monitoring and Security Sep 21 2021 4:00 pm UTC 50 mins
    Gigamon Cloud Team
    Hybrid cloud environments are complex — and harder to secure.

    In this third webinar of a three-part series, Gigamon experts share insights on how to monitor and secure your new hybrid cloud network and datacenter.
    Plus, they offer insights on the importance of cloud visibility and how to achieve it across your network.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Strategy
    * Cloud Migration and Deployment

    + The first 25 attendees will receive a $50 Amazon gift card!
  • [Ep.2] Helping SOCs Overcome Distraction Recorded: Sep 16 2021 15 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    All too often, SOC analysts are burdened by distractions – they are tied to solution proficiency, addressing false positives, and performing detection tuning – rather than focusing on their primary responsibility: identifying and eliminating threats before they can cause damage. How do you eliminate distractions to allow focus on threat management?

    In episode 2 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG are sharing strategies and solutions for how analysts can overcome distractions and improve SOC and IR efficiency and effectiveness.

    We invite you to join us for this short 20-min episode to learn:

    - Why 43% of analysts indicate maintaining, tuning, and providing updates to their security tools is a core responsibility1
    - How SOCs can overcome the distractions to focus on their primary role: threat management
    - Which tools remove the need for near-constant solution management or maintenance
    - And more

    Don’t miss all three webinars in the series!
  • Enhancing Your Public, Private, and Hybrid Cloud Security Posture Recorded: Sep 14 2021 24 mins
    Fayyaz Rajpari, Senior Director Product Management at Gigamon
    As the cloud becomes foggier and even edge environments begin to resemble traditional cloud, it becomes increasingly difficult to maintain a posture that reduces your organization's risk. As data is strewn to various geographic locales, the role of security also becomes one of compliance. How can you best protect your company's critical data that is spread across hybrid clouds? How can you gain visibility into the traffic flow? And how can you achieve compliance in distributed environments?

    Attend this event to gain answers to these questions and learn about an innovative hybrid cloud security solution that makes your IT environment more efficient, scalable, and secure.
  • [Ep.1] How SOCS Are Working Alone – And What To Do About It Recorded: Sep 9 2021 16 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    It’s no secret that SOC/IR analysts are faced with high-pressure situations and are in an ongoing race against time to protect their organizations. This fight against threats is often done alone by analysts without the help of outside expertise – the pace can ultimately lead to burnout. According to the Ponemon Institute, 60% of SOC team members are considering changing careers or leaving their jobs due to burnout. How do you prevent burnout from happening in your organization?

    In episode 1 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how analysts can get the advisory guidance they need to reduce burnout.

    We invite you to join us for this short 20-min episode to learn:

    - Why SOC burnout is more of an issue than ever before
    - How businesses can improve SOC effectiveness
    - Why and how Guided-SaaS NDR tools give SOCs both practical and tactical response strategies
    - And more

    Don’t miss all three webinars in the series!
  • Cloud Migration and Deployment Recorded: Sep 8 2021 43 mins
    Gigamon Cloud Team
    What is involved with shifting to the cloud?

    In the second webinar of a three-part series on cloud migration, Gigamon experts dig a little deeper to discuss the ins-and-outs of cloud integration and cloud automation. They also provide strategies and best practices for executing a successful move to the cloud.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Strategy
    * Cloud Visibility, Monitoring and Security

    + The first 25 attendees will receive a $50 Amazon gift card!
  • See Inside Containers with the Gigamon Cloud Suite Recorded: Sep 7 2021 30 mins
    Baseer Balazadeh, Senior Technical Marketing Engineer - Cloud, Gigamon
    Container solutions continue to transform application environments and expand their reach in the network. IT teams are asked to be flexible and adaptable as the enterprise adopts new complexities, but also need to remain cautious about the security implications for the network. This replay of an ActualTech Media Ecocast is a must-see for anyone managing ad hoc, complex security deployments with containers. Learn how the Gigamon Cloud Suite helps you achieve visibility into all traffic across your hybrid cloud.
  • Wrangling the Cloud: Avoiding Missteps and Improving Application Environments Recorded: Aug 31 2021 24 mins
    Jim Mandelbaum, Field CTO - Gigamon
    Public and private clouds dominate the application support landscape. As applications are strewn all over the cloud, it can become easy to make a mistake that can doom application performance and availability. During this Wrangling the Cloud event, you'll discover how the Gigamon Hawk solution helps tame the Wild West of the cloud into submission to ensure consistent and predictable outcomes for your critical applications. Join the webinar to learn how to close the cloud visibility gap and secure your application environment.
  • Ransomware Loitering Presents an Opportunity for Network Detection Recorded: Aug 24 2021 29 mins
    Bassam Khan, VP of Product and Technical Marketing - Gigamon
    The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.

    Join this webinar to explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
  • Cloud Strategy Recorded: Aug 24 2021 41 mins
    Gigamon Cloud Team
    Confused or overwhelmed by cloud migration?

    In the first of this three-part webinar series, Gigamon experts break down what cloud migration actually means.
    You’ll gain insights on when and why you should migrate to the cloud, how to choose a cloud provider, and key considerations to keep in mind as you develop a cloud strategy.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Migration and Deployment
    * Cloud Visibility, Monitoring and Security
  • [Ep.3] Shining a Light: Helping SOCs Move Away From Working In The Dark Recorded: Aug 18 2021 18 mins
    Bassam Khan - VP of Product and Technical Marketing and Jon Oltsik, Senior Analyst at ESG
    There is no denying that there is a SOC visibility gap issue. Although SIEMs and EDRs have increased many SOC/IR team's effectiveness in identifying active infections, visibility gaps remain. It’s challenging for SOCs to gain complete network visibility due to constantly changing hybrid infrastructure, remote and flexible location working and the ever-increasing amount of encrypted traffic. The result is that analysts are left in the dark when trying to identify all adversary activity across the MITRE ATT&CK framework.

    In episode 3 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how SOCs can shine a light on visibility gaps and arm SOC analysts with accurate and rapid information to address threats.

    We invite you to join us for this short 20-min episode to learn:

    - Why 69% of SOC analysts cite lack of visibility into network traffic as the top reason for SOC ineffectiveness
    - Real-world challenges, such as alerts without context and correlating data across multiple tools
    - How to effectively identify cyber-adversaries across any network, device or traffic
    - And more

    Don’t miss all three webinars in the series!
  • Get Visibility and Intelligence into your Virtual Environments Recorded: Aug 17 2021 27 mins
    James Mandelbaum, Field CTO & Senior Security Engineer — Gigamon
    In this short session we will discuss the options on how to obtain traffic flows from your virtual environment. We will also do a live deployment of the Gigamon Hawk fabric to send that traffic into the Application Intelligence Engine and show how easy it is to sessionize the data to see every application running on the network. Come see how to optimize your tools and increase the ROI on your existing investment.
  • Securing the Hybrid Cloud: Visibility Best Practices Recorded: Aug 11 2021 25 mins
    Bassam Khan, VP of Product and Technical Marketing - Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You'll learn best practices and see how a little planning and design can go a long way.
  • [Ep.2] Helping SOCs Overcome Distraction Recorded: Aug 11 2021 15 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    All too often, SOC analysts are burdened by distractions – they are tied to solution proficiency, addressing false positives, and performing detection tuning – rather than focusing on their primary responsibility: identifying and eliminating threats before they can cause damage. How do you eliminate distractions to allow focus on threat management?

    In episode 2 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG are sharing strategies and solutions for how analysts can overcome distractions and improve SOC and IR efficiency and effectiveness.

    We invite you to join us for this short 20-min episode to learn:

    - Why 43% of analysts indicate maintaining, tuning, and providing updates to their security tools is a core responsibility1
    - How SOCs can overcome the distractions to focus on their primary role: threat management
    - Which tools remove the need for near-constant solution management or maintenance
    - And more

    Don’t miss all three webinars in the series! Continue to watch, [Ep.3] Shining a Light: Helping SOCs Move Away From Working in the Dark: https://www.brighttalk.com/webcast/15843/500022
  • Supporting a Hybrid Data and Analytics Infrastructure to Drive Innovation Recorded: Aug 10 2021 28 mins
    Bassam Khan, VP of Product and Technical Marketing – Gigamon
    In the modern era, analytics are everywhere and provide organizations with mission-critical business, operations, and technology metrics providing directional guidance. Tools must be accessible to everyone from hardcore data scientists to citizen developers. Hybrid complexity adds a greatly increased attack surface, more vulnerabilities and more threats from more bad actors than ever before. Full visibility, 24/7 availability and unlimited scale are necessary to drive innovative analytics in the hybrid cloud.

    In this ActualTech Media replay, you will learn about the cloud visibility gap and how the Gigamon Hawk Visibility and Analytics Fabric closes that gap. Join the webinar to see how you can secure your hybrid cloud network and drive innovative analytics.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Profiling and Posturing your IoMT Network
  • Live at: Aug 3 2021 5:00 pm
  • Presented by: Rob Langley, Network and Security Architect Solutions Engineer - Gigamon
  • From:
Your email has been sent.
or close