Your Cloud Workloads Are Fully Secure, Right?

Logo
Presented by

Bassam Khan, VP of Product and Technical Marketing Engineering - Gigamon

About this talk

You have all the cloud monitoring and security tools in place. Would you agree that it’s still difficult to: - Have complete visibility and eliminate blind spots, like hybrid cloud application activities and container communications, and discover and monitor unmanaged hosts/apps and IoT? - Provide comprehensive security, such as detect and respond to network-based threats, enumerate hosts on the hybrid cloud network, and support shared responsibility and Zero Trust frameworks, particularly as it relates to network traffic? - Detect unwanted activities, such as shadow IT, crypto-mining, and P2P and torrent traffic? - Comply with network-related compliance and SLOs, such as extending on-premises policies, controls, reports, and practice knowledge to cloud apps? Obviously, no security posture is 100% attack-proof. However, bringing the “network perspective” to hybrid-cloud workloads makes it easier to address the challenges above, and more. At this session we will dive into several use cases and we will demo the yet untapped advantage the network perspective brings to cyber defense.

Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (197)
Subscribers (14676)
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.