Hi [[ session.user.profile.firstName ]]

Accelerate Your Organisation’s Digital Transformation

Application-Aware Visibility
Join us for our interactive webinar to see how application-aware network visibility can accelerate your organization’s digital transformation.

Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

You will learn:

• How to simplify network monitoring with granular insight into application traffic
• How to detect, manage and isolate shadow IT, non-business apps and others
• Why filtering unnecessary traffic is critical to improving tool efficiency

Discover how application-aware network visibility can improve the performance of both your network and IT tools.
Recorded Sep 18 2019 18 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ollie Sheridan, Principal Security Solutions Engineer, CISSP
Presentation preview: Accelerate Your Organisation’s Digital Transformation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Entdecken Sie die Vorteile von echter Visibilität in Ihre Applikationen Recorded: Dec 16 2019 14 mins
    Daniela Fusaro, Senior Solutions Architect
    Metadaten helfen Ihnen, die Sicherheit in Ihrem Unternehmen zu verbessern. Aber wussten Sie auch, dass Applikations-Metadaten Ihnen helfen, Ihre User Experience zu verbessern, problematische Applikationen zu troubleshooten, „Schatten-IT“ aufzudecken und die Sicherheit in Ihrem Unternehmen zu erhöhen ?

    Nehmen Sie an unserem Webinar teil, in dem wir Ihnen zeigen, wie die Gigamon Application Metadata Intelligence Ihnen tiefe Visibilität in die Applikationen bietet, um Performance Bottlenecks und potentielle Netzwerk Security Risiken aufzudecken.

    Sie werden sehen, wie Next-Generation Packet Broker Metadaten mit mehr Information über Traffic Flows anreichern, so dass Sie in der Lage sind, Ihre kritischen Applikationen zu verstehen und so die Kontrolle über diese zu erlangen.
  • Strategic Solutions for Effective Network Security in the Cloud Recorded: Nov 28 2019 49 mins
    Rob Ayoub FireEye, Baseer Balazadeh Gigamon, Tom Adamski AWS
    Everyone must work together to protect the cloud. While cloud providers focus on protecting their services and infrastructure, you must ensure that data flowing into the cloud doesn’t leave an opening for attackers.

    Join experts from FireEye, Gigamon and AWS as they present a webinar on how to:

    •Deploy a security infrastructure that helps you minimize risk by accurately detecting and quickly stopping advanced, targeted and other evasive attacks

    •Achieve greater cloud network visibility by ingesting and capturing traffic data from your cloud infrastructure

    •Apply intelligence to get actionable insights and speed detection and response

    •Fully integrate network forensics to accelerate alert investigation and breach mitigation
  • How to gain FULL Visibility over your Applications Recorded: Nov 19 2019 61 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
    Metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. And now application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organisation.

    Join Gigamon as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows so you’ll discover how to understand the performance and have control of hundreds of critical apps.
  • Should You Care About TLS Decryption? Recorded: Sep 24 2019 59 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
    With the second anniversary of the Equifax breach not so long ago and the fact that we now know much more about what happened due to the August 2018 release of the GAO Report. There was a lot of new information that came out of that report that was not well-understood at the time of the breach…. Did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realise what had happened.

    On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever as today the Ponemon Institute reports that 50% of all malware attacks utilise encryption.

    During this webinar, Ollie Sheridan will talk about:
    - How TLS encryption has become a threat vector
    - Why decryption is essential to security and how to effectively perform detection
    - How to make sure your detection tools are working at their greatest capacity without the latency introduced by decryption
  • Applicaton-Aware Visibility Recorded: Sep 18 2019 8 mins
    Daniela Fusaro, Senior Solutions Architect
    Beschleunigen Sie die digitale Transformation Ihres Unternehmens

    Application-Aware Visibility
    Besuchen Sie unser Webinar, um zu sehen, wie Application-Aware Network Visibility die digitale Transformation Ihres Unternehmens beschleunigen kann.

    Hält Sie das explosive Wachstum und die steigende Komplexität Ihres Netzwerks davon ab, schnelle Resultate liefern zu können? Sie sind damit nicht alleine: Ein Mangel an Sichtbarkeit macht es schwierig, Performance-Probleme einzugrenzen und zu lösen.

    Sie werden sehen:
    • Wie Sie Network Monitoring durch granularen Einblick in Applikationen vereinfachen
    • Wie Sie Schatten-IT entdecken, managen und isolieren
    • Warum das Wegfiltern von unnötigem Traffic Ihre Security Tools effizienter macht

    Entdecken sie, wie Application-Aware Network Visibility die Performance Ihres Netzwerks und Ihrer Tools erhöht.
  • Accelerate Your Organisation’s Digital Transformation Recorded: Sep 18 2019 18 mins
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    Application-Aware Visibility
    Join us for our interactive webinar to see how application-aware network visibility can accelerate your organization’s digital transformation.

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and IT tools.
  • Accélérez la transformation digitale de votre organisation Recorded: Sep 10 2019 10 mins
    Mathieu Pierard, Solutions Architect
    Visibilité centrée sur l'application

    Inscrivez-vous à notre webinar interactif pour comprendre comment la visibilité de votre réseau centrée sur les applications peut accélérer la transformation numérique de votre entreprise.

    La croissance explosive des données et la complexité du réseau vous empêchent-ils d’atteindre vos objectifs ? Vous n'êtes pas seul : le manque de visibilité des applications rend difficile l'identification et la résolution des problèmes de performance.

    Vous comprendrez :

    - Comment simplifier la surveillance du réseau avec une vision granulaire du trafic applicatif
    - Comment détecter, gérer et isoler le shadow IT, les applications non métiers et autres
    - Pourquoi le filtrage du trafic inutile est essentiel pour améliorer l'efficacité de l'outil

    Découvrez comment une visibilité réseau centrée sur les applications peut améliorer les performances de votre réseau et de ses outils.
  • Don't Let Digital Transformation Wreak Havoc on Your Network! Recorded: Jul 4 2019 52 mins
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
  • How to Optimize Network Performance During Infrastructure Transformation Recorded: Jun 25 2019 47 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • Visibilité dans le cloud Public Recorded: Jun 20 2019 21 mins
    Mathieu Pierard, Solutions Architect
    De nombreuses organisations se tournent vers le cloud public pour étendre - et dans certains cas, remplacer - leur infrastructure existante. Bien que l’utilisation du cloud public offre une flexibilité sans précédent en termes de déploiement et d’approvisionnement, les organisations ont toutefois du mal à sécuriser et à surveiller ces environnements, en particulier lorsque le trafic est-ouest est pris en compte. L'accès à ce trafic est la première étape pour sécuriser ces environnements et pour garantir que les ressources sont utilisées de manière efficace pour optimiser leurs performances.

    Inscrivez-vous à notre webinar pour :
    • Découvrir les défis auxquels les organisations sont confrontées lors de l’adoption du cloud public.
    • Comprendre comment les outils peuvent accéder à ce trafic en utilisant les solutions Gigamon, améliorant ainsi la sécurité et les performances.
    • Comprendre comment Gigamon a virtualisé le collecteur de paquets réseau dans ces environnements et l’a lié avec GigaVUE-FM.
  • Visibility in Public Cloud Umgebungen Recorded: Jun 19 2019 14 mins
    Daniela Fusaro, Senior Solutions Architect
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.

    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • Introducing Application Metadata Intelligence Recorded: Jun 18 2019 60 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Chris Green, Head of PR and Comms EMEA, (ISC)²
    For many years the choice for monitoring networks has been focussed on the collection and Analysis of raw packets. With the increasing need for multiple tools and SIEM's to get access to this data, along with requirements from Forensic Response teams, a more streamlined method of understanding the behaviour of traffic and user behaviour is required. Whilst NetFlow version 5 and 9 do provide some visibility, there are challenges such as sample rates and lack of Application Layer inspection that need to be addressed.

    Join us for this webinar to learn more about how you can:

    -Produce rich Metadata from network traffic and dive into the Application Layer
    -Use this rich Metadata for Security, Forensics and Business Intelligence purposes
    -Generate Metadata based on the application rather than the IP & Port
    -Ensure that the Application traffic, regardless of port spoofing, produces the correct Metadata
  • 2019 Cyberthreat Defense Report Key Findings Recorded: Jun 18 2019 58 mins
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Visibility in the Public Cloud Recorded: Jun 12 2019 23 mins
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    Many organisations are looking to the Public Cloud as a means to extend – and in some cases replace – their existing infrastructure. Whilst the use of the Public Cloud offers formerly unheard-of flexibility in terms of deployment and provisioning, it does present organisations with a challenge as to how to Secure and Monitor these environments, particularly when considering east-west traffic. Getting access to this traffic is the first step in securing these environments as well as ensuring that the resources are used in an efficient manner to optimise their performance.

    Join us for this 25min webinar to find out how you can:

    • Learn about the challenges to organisations when adopting the Public Cloud
    • Understand the ways in which tools can access this traffic using Gigamon’s solutions, thereby improving security and performance
    • See how Gigamon has Virtualised the Network Packet Broker into these environments and tied it all together with GigaVUE-FM
  • Application Awareness with the Power to Take Action Recorded: Jun 4 2019 54 mins
    Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech Media
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:

    •Discover applications that you didn’t even know were running on your network
    •Increase overall performance of your network and shared components
    •Spot potential security vulnerabilities before they become a problem

    Attendees will also view a live demonstration of how Gigamon can end headaches in security and network performance.
  • To Whack or Not to Whack — Incident Response and Breach Mitigation Recorded: May 21 2019 44 mins
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • Network Architecture With Security in Mind Recorded: May 13 2019 60 mins
    Matt Bromiley, Instructor and Security Expert, SANS and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    It’s time to face a hard truth: modern enterprise networks can be extremely – sometimes painfully – complex to manage and defend. Increased network speeds to 100Gb, unfettered access to cloud applications and end-to-end encryption are just some of the requirements of today’s employees. When you add in mobile and IoT devices, the complexity grows exponentially, especially when it comes to the security of the networks to which they connect.

    And when we couple expanding networks with security needs, many organizations struggle to protect their users. This leads to conflicts between NetOps and SecOps goals. The networking team is concerned about availability and performance to ensure the business is being conducted whereas the security team needs to ensure the data and the users are safe from bad actors.

    We need a new approach that provides pervasive visibility to data flowing across the physical, virtual and cloud infrastructure to ensure that the right traffic is sent to the right security tools. This approach should also enable SecOps and NetOps to collaborate and improve the security posture of an organization

    Watch this SANS webinar to learn:
    •The common security pain points as networks expand and grow with increasing speeds
    •How today’s users are forcing organizations to consider/include security in their network architecture
    •How a lack of security can impact network availability and performance
    •How to bridge the NetOps and SecOps divide

    We will discuss how pervasive network visibility improves security tool utilization and can shorten detection and response times. We hope this webcast will inspire you to reassess the current state of your network and security infrastructure to enable collaboration between the two teams and improve your security posture. Watch now!
  • Want Better Network Visibility with Less Complexity? Here's How! Recorded: Apr 29 2019 53 mins
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • Network Upgrades Giving You Security Headaches? Recorded: Apr 11 2019 57 mins
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • The Advantages of Filtering Applications Recorded: Mar 19 2019 55 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
    Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.

    Join us for this webinar to learn more about how you can:

    •Ensure that the Application traffic regardless of port spoofing gets to the right tool
    •Improve tool efficiency by discarding irrelevant Application traffic
    •Filter the traffic based on the application rather than the IP & Port
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Accelerate Your Organisation’s Digital Transformation
  • Live at: Sep 18 2019 8:30 am
  • Presented by: Ollie Sheridan, Principal Security Solutions Engineer, CISSP
  • From:
Your email has been sent.
or close