Hi [[ session.user.profile.firstName ]]

Profiling and Posturing your IoMT Network

The world is constantly changing and now more than ever, already pushed-to-the-brink IT departments are being called upon to help their organizations continue their transformation efforts, to reshape the end user computing experience, and to ensure that IT is secure, compliant, and financially sustainable. Legacy approaches to modern problems may still have a place, but as IT leaders and professionals work to ensure that their platforms are suitable for new needs, it's clear that thinking needs to revolve around supporting a new generation of IT and business.

Enterprise technology vendors are working hard to help their customers bring sanity to the madness through the development of solutions intended to solve critical business problems. Today’s enterprise IT solutions are supercharging the traditional IT organization with next-generation innovations, making what was seemingly impossible, possible.

Join us for this replay of an ActualTech Media Spring Summit presentation on Profiling and Posturing your IoMT Network. Learn how to gather accurate, reliable and timely information with little to no human intervention using the Gigamon Visibility Analytics Fabric.
Recorded Aug 3 2021 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob Langley, Network and Security Architect Solutions Engineer - Gigamon
Presentation preview: Profiling and Posturing your IoMT Network
  • Channel
  • Channel profile
  • Understanding TLS Decryption: Deploy Your Solution Nov 9 2021 5:00 pm UTC 42 mins
    Greg Maples, Consulting Security Architect at Gigamon
    The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.

    You’ll learn everything you need to know about implementation, including:
    • Planning
    • Validation
    • Integration
  • Understanding TLS Decryption: Design Your Solution Nov 2 2021 4:00 pm UTC 58 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.

    You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including:
    • Requirements
    • Architectures
    • Best practices
  • Understanding TLS Decryption: Getting It Right Oct 26 2021 4:00 pm UTC 58 mins
    Ollie Sheridan, Principal Sales Engineer at Gigamon
    This Tech Talk webinar on understanding how to get decryption right is the first in a three-part series on TLS Decryption.

    With increased malware threats using encryption, winning the battle against malware threats requires getting decryption right.
    In this technical webinar, Gigamon experts explain how to use TLS Decryption to thwart attacks by eliminating blind spots and reducing the attack surface.

    Tune in to learn how to attain North-South and East-West traffic visibility, including:
    • Drivers
    • Challenges
    • Approaches
  • See, Secure and Optimize your VMware-based Cloud Oct 19 2021 5:00 pm UTC 62 mins
    John Gudmundson, Senior Product Marketing Manager - Gigamon
    Moving to hybrid cloud environments needn’t be labor intensive or overly complex. Attend to learn how VMware-based clouds with Gigamon next-generation visibility solutions enables application-level identification and filtering, with advanced metadata generation in a fully automated and virtualized NSX‑T environment. Organizations can reduce error-prone manual processes, enhance security tool effectiveness and maximize user experiences — including those scenarios involving vMotion and dynamic service insertion. You’ll also see two live demonstrations!
  • Hybrid-cloud survey results, and the value of network visibility Oct 12 2021 5:00 pm UTC 39 mins
    Roy Illsley, Chief Analyst - OMDIA + Bassam Khan, VP of Product Marketing - Gigamon
    Today’s changing dynamic of business impacts both the business model and IT platform. With workloads moving to the cloud and new cloud-first apps being deployed at ever-increasing rates, IT operations and monitoring are being impacted and need to act quickly.

    In this webinar the following questions will be addressed:
    - What technologies are being adopted across IT organizations, both at the core and the edge?
    - How is IT increasingly leaning on observability to solve hybrid- and multi-cloud monitoring challenges?
    - How does the “network perspective” fill a crucial gap in visibility for hybrid infrastructure monitoring?
  • Improving Management and Protection of Cloud and Virtual Deployments Oct 5 2021 5:00 pm UTC 28 mins
    Gordon Beith, Sr. Director of Product Marketing - Gigamon
    Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments are being augmented by new technologies, including containers, software-defined storage, networking, and other capabilities. Operations are looking for ways to optimize all aspects of their virtual environment.

    In this webinar, we will discuss:
    - Lessons about network traffic visibility in physical, on-prem networks
    - How cloud or virtualization changes visibility
    - Removing blind spots, reducing complexity, and minimizing costs
  • Ensuring Trust and Security in Enterprise IT and the Cloud Sep 28 2021 5:00 pm UTC 27 mins
    Bassam Khan, VP of Product and Technical Marketing Engineering at Gigamon
    Your job – and we doubt you have any choice but to accept it! – is to leverage every tool in your arsenal to keep bad guys and even human error from dooming your data. Modern security is defense in depth and you need myriad tools to keep incidents at bay. Such tools may include privileged password protection, centralized and managed authentication with SSO, rock solid data protection for all of your cloud apps, interconnectivity with security baked in, and much, much more.
    - See how today's most innovative cloud security, storage, networking, data protection, and management solutions complete your security puzzle
    - Learn why privileged password management needs to be a key component in your information security strategy
  • [Ep.3] Shining a Light: Helping SOCs Move Away From Working In The Dark Sep 23 2021 3:00 pm UTC 18 mins
    Bassam Khan - VP of Product and Technical Marketing and Jon Oltsik, Senior Analyst at ESG
    There is no denying that there is a SOC visibility gap issue. Although SIEMs and EDRs have increased many SOC/IR team's effectiveness in identifying active infections, visibility gaps remain. It’s challenging for SOCs to gain complete network visibility due to constantly changing hybrid infrastructure, remote and flexible location working and the ever-increasing amount of encrypted traffic. The result is that analysts are left in the dark when trying to identify all adversary activity across the MITRE ATT&CK framework.

    In episode 3 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how SOCs can shine a light on visibility gaps and arm SOC analysts with accurate and rapid information to address threats.

    We invite you to join us for this short 20-min episode to learn:

    - Why 69% of SOC analysts cite lack of visibility into network traffic as the top reason for SOC ineffectiveness
    - Real-world challenges, such as alerts without context and correlating data across multiple tools
    - How to effectively identify cyber-adversaries across any network, device or traffic
    - And more

    Don’t miss all three webinars in the series!
  • The Imminent Impact of TLS 1.3 on Network Security Controls Recorded: Sep 21 2021 57 mins
    David Holmes, Sr Analyst, Forrester & Rami Rammaha, Sr Product Marketing Manager, Gigamon
    Hear guest speaker David Holmes talk about his recent Forrester research paper: “Maintaining Visibility in the TLS 1.3 Era.” Holmes will share how three internet protocols will soon be modified to enhance consumer and citizen privacy while having a detrimental effect when used in an enterprise.

    The coming changes, TLS 1.3, DNS-over-HTTPS and encrypted SNI, will mask or remove the metadata that both snoopers rely on (for nefarious tracking) and IT rely on (to protect the organization’s users). Holmes will share how quickly these changes are coming, and which security monitoring tools will be affected first.

    You’ll learn:
    • What changes are coming and how they impact network visibility
    • Which tools are at risk of going dark in the new world
    • How long architects have to turn the lights back on
    • How IT security can mitigate the impact of what’s coming
    • Where DNS security is headed

    Speakers:
    David Holmes, Senior Analyst, Forrester
    Rami Rammaha, Senior Product Marketing Manager, Gigamon
  • Cloud Visibility, Monitoring and Security Recorded: Sep 21 2021 50 mins
    Gigamon Cloud Team
    Hybrid cloud environments are complex — and harder to secure.

    In this third webinar of a three-part series, Gigamon experts share insights on how to monitor and secure your new hybrid cloud network and datacenter.
    Plus, they offer insights on the importance of cloud visibility and how to achieve it across your network.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Strategy
    * Cloud Migration and Deployment

    + The first 25 attendees will receive a $50 Amazon gift card!
  • [Podcast] Ep. 3: Evolving Zero Trust Recorded: Sep 19 2021 25 mins
    Michael Valladao, Sr SE for Gigamon + Dr Chase Cunningham, CSO for Ericom Software
    We are so excited to have Zero Trust technical expert Chase Cunningham as our guest in this episode. Mike and Chase discuss a variety of topics around the origins of Zero Trust, important considerations around crafting your Zero Trust strategy, how the US Government has begin to invest in ZT and even a bit about Chase's children's books that teach our next generation about tech.

    CHAPTERS:
    0:50 —The Origins of Zero Trust and How it's Implemented
    6:56 —Zero Trust is Cloud Heavy
    8:43 —Paying attention to east/west traffic threats
    10:02 —Worst Practices in the Cloud
    12:08 —Moving from Cloud to Hybrid
    12:52 —Evangelizing ZT
    14:53 —Soft Skills for Implementing Zero Trust
    16:44 —Zero Trust and the Government
    20:55 —Children's books and teaching kids about ZT and IT
  • [Podcast] Ep. 2: Lessons Learned from Cloud Native Recorded: Sep 19 2021 31 mins
    Michael Valladao, Sr SE for Gigamon + Ben Stineman, VP Infrastructure & Security at Vinli Inc.
    In our second Episode, Mike is joined by Ben Stineman, Vice President of Infrastructure and Security at Vinli Incorporated.

    Ben will explain what it takes to start from scratch or migrate to Cloud Native. As a networking expert, he shares his personal experience at Vinli along with helpful tips you need to understand the ins-and-outs of Cloud Native.

    CHAPTERS:
    1:20 —How to become Cloud Native and the Twelve-Factor App
    4:53 —Cloud vs Bare Metal Study
    13:31 —Managing GDPR in the Cloud
    16:58 —Ben's journey to Cloud Native
    18:30 —Networking is still Networking
    22:22 —Lessons Learned from Cloud Native
    25:28 —Security for Cloud-Native
    27:38 —Ben flies drones in the Cloud(s)
  • [Podcast] Ep. 1: Visibility Strategies for Hybrid Cloud Environments Recorded: Sep 19 2021 29 mins
    Michael Valladao, Sr SE for Gigamon + Ethan Banks, Co-founder of Packet Pushers Interactive
    In our first episode, Mike is joined by Ethan Banks networking expert, podcaster, blogger, and co-founder of Packet Pushers Interactive.

    First, they will discuss what Hybrid Cloud means and then jump into a lively conversation about important considerations for cloud adoption, who's responsible for security, adopting new tech and processes, organizational changes, gotchas, and much more.

    CHAPTERS:
    0:39 —Defining Hybrid Cloud
    2:29 —Cloud happens when IT is doing other things!
    4:30 —Who is responsible for Cloud security?
    6:24 —The importance of Cloud visibility
    10:04 —Network switches and TAPs in the Cloud
    18:26 —Deploying Agents in the Cloud
  • [Ep.2] Helping SOCs Overcome Distraction Recorded: Sep 16 2021 15 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    All too often, SOC analysts are burdened by distractions – they are tied to solution proficiency, addressing false positives, and performing detection tuning – rather than focusing on their primary responsibility: identifying and eliminating threats before they can cause damage. How do you eliminate distractions to allow focus on threat management?

    In episode 2 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG are sharing strategies and solutions for how analysts can overcome distractions and improve SOC and IR efficiency and effectiveness.

    We invite you to join us for this short 20-min episode to learn:

    - Why 43% of analysts indicate maintaining, tuning, and providing updates to their security tools is a core responsibility1
    - How SOCs can overcome the distractions to focus on their primary role: threat management
    - Which tools remove the need for near-constant solution management or maintenance
    - And more

    Don’t miss all three webinars in the series!
  • Enhancing Your Public, Private, and Hybrid Cloud Security Posture Recorded: Sep 14 2021 24 mins
    Fayyaz Rajpari, Senior Director Product Management at Gigamon
    As the cloud becomes foggier and even edge environments begin to resemble traditional cloud, it becomes increasingly difficult to maintain a posture that reduces your organization's risk. As data is strewn to various geographic locales, the role of security also becomes one of compliance. How can you best protect your company's critical data that is spread across hybrid clouds? How can you gain visibility into the traffic flow? And how can you achieve compliance in distributed environments?

    Attend this event to gain answers to these questions and learn about an innovative hybrid cloud security solution that makes your IT environment more efficient, scalable, and secure.
  • [Ep.1] How SOCS Are Working Alone – And What To Do About It Recorded: Sep 9 2021 16 mins
    Bassam Khan - VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG
    It’s no secret that SOC/IR analysts are faced with high-pressure situations and are in an ongoing race against time to protect their organizations. This fight against threats is often done alone by analysts without the help of outside expertise – the pace can ultimately lead to burnout. According to the Ponemon Institute, 60% of SOC team members are considering changing careers or leaving their jobs due to burnout. How do you prevent burnout from happening in your organization?

    In episode 1 of Gigamon’s ‘How SOCs are Working Alone, Distracted and In The Dark - And What To Do About It’ series, Bassam Khan, VP of Product and Technical Marketing at Gigamon and Jon Oltsik, Senior Analyst at ESG discuss how analysts can get the advisory guidance they need to reduce burnout.

    We invite you to join us for this short 20-min episode to learn:

    - Why SOC burnout is more of an issue than ever before
    - How businesses can improve SOC effectiveness
    - Why and how Guided-SaaS NDR tools give SOCs both practical and tactical response strategies
    - And more

    Don’t miss all three webinars in the series!
  • Cloud Migration and Deployment Recorded: Sep 8 2021 43 mins
    Gigamon Cloud Team
    What is involved with shifting to the cloud?

    In the second webinar of a three-part series on cloud migration, Gigamon experts dig a little deeper to discuss the ins-and-outs of cloud integration and cloud automation. They also provide strategies and best practices for executing a successful move to the cloud.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Strategy
    * Cloud Visibility, Monitoring and Security

    + The first 25 attendees will receive a $50 Amazon gift card!
  • See Inside Containers with the Gigamon Cloud Suite Recorded: Sep 7 2021 30 mins
    Baseer Balazadeh, Senior Technical Marketing Engineer - Cloud, Gigamon
    Container solutions continue to transform application environments and expand their reach in the network. IT teams are asked to be flexible and adaptable as the enterprise adopts new complexities, but also need to remain cautious about the security implications for the network. This replay of an ActualTech Media Ecocast is a must-see for anyone managing ad hoc, complex security deployments with containers. Learn how the Gigamon Cloud Suite helps you achieve visibility into all traffic across your hybrid cloud.
  • Wrangling the Cloud: Avoiding Missteps and Improving Application Environments Recorded: Aug 31 2021 24 mins
    Jim Mandelbaum, Field CTO - Gigamon
    Public and private clouds dominate the application support landscape. As applications are strewn all over the cloud, it can become easy to make a mistake that can doom application performance and availability. During this Wrangling the Cloud event, you'll discover how the Gigamon Hawk solution helps tame the Wild West of the cloud into submission to ensure consistent and predictable outcomes for your critical applications. Join the webinar to learn how to close the cloud visibility gap and secure your application environment.
  • Ransomware Loitering Presents an Opportunity for Network Detection Recorded: Aug 24 2021 29 mins
    Bassam Khan, VP of Product and Technical Marketing - Gigamon
    The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.

    Join this webinar to explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Profiling and Posturing your IoMT Network
  • Live at: Aug 3 2021 5:00 pm
  • Presented by: Rob Langley, Network and Security Architect Solutions Engineer - Gigamon
  • From:
Your email has been sent.
or close