Hi [[ session.user.profile.firstName ]]

GigaBITE 19, Size Does Matter

Service providers are facing an unpredicted demand on their network infrastructure to provide more bandwidth, better user experiences, better KPIs and no extra cost to their customers. This will become more challenging as we move towards 5G and beyond. As a result of this demand, they have seen probing costs go through the roof. The rising amount of over the top applications such as video, IoT and mobile devices that need to be connected; will only exacerbate this problem.

Implementing a good visibility solution can significantly reduce an operator's probing costs, get more value for their buck with existing probes, and protect their investment.

Join us for this webinar to learn more about how to: 
• Select the right visibility platform for the job
•.Dimensioning considerations when selecting your platform
•.Implementing different traffic reduction techniques for greater tool efficiency
Recorded Oct 13 2020 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robert Atkinson, Senior Sales Engineer
Presentation preview: GigaBITE 19, Size Does Matter

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing Financial Services in the Age of Digital Transformation Recorded: Oct 14 2020 23 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    The old cliché "you can't protect against what you can't see" holds as true for cybersecurity as for physical security. Financial Services organisations have been at the forefront of digital transformation and have realised that, without the right planning and tools, security can become a casualty in this process.

    View this webinar and join the discussion involving these issues and ways that Financial Services organisations can protect themselves and their customers in the digital transformation process.
  • Case Study: Australian National University | 2020 Virtual Roundtable Recorded: Oct 2 2020 57 mins
    Suthagar Seevaratnam | ANU CISO
    After finding themselves in a data breach in late 2018, the renowned Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and the level of sophistication behind the hack.

    A 2020 global intelligence threat report by NTT, found the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

    This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

    Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they've made post-incident and what they see as their next steps to improve cybersecurity resiliency in today’s ever-evolving threat landscape.
  • Network Resilience for a Remote Workforce Recorded: Sep 30 2020 43 mins
    Romaine Fouchereau, IDC Research Manager, Frank Rubio, Gigamon & Joe Bombagi, Riverbed
    How the convergence of network and security tools can help your organisation to securely deliver business continuity without sacrificing user experience

    2020 saw one of the biggest shifts in the way organisations work and operate, as most of their workforce working from home has now become the new normal. This is putting new strains on the network, but also creating more issues for the IT and security teams as the workforce still need to access applications and data securely.

    Join this webinar as speakers from IDC, Riverbed and Gigamon discuss how IT and security leaders can keep delivering network resilience and performance, security and a solid user experience for their organisation.

    You will learn:
    •What the trends are in Europe from IDC's latest research
    •What organisations can do to handle new business priorities
    •How to handle secure remote access at scale
    •How to maintain network visibility
    •Which tools can be used to keep the network secure
    •How to optimise bandwidth usage and performance
  • How to Stay Relevant in a Fast Changing Infrastructure Recorded: Sep 1 2020 72 mins
    Martyn Crew, Gigamon + Greg Jablonsky, CTO at Bonadio Group + Sean Mack, CIO & CISO at Wiley
    In times of great transition or crisis, it’s leaders we turn to. Today is no different. Watch this webinar with Argyle to learn what IT leaders are doing to regain control over their network and what you can do going forward.

    Learn how IT leaders must work to:
    • Prevent network bottlenecks in a work-from-home environment
    • Address the specific security risks of personal device usage
    • Collaborate to maintain visibility, security and performance

    Speakers / Panelists:
    Martyn Crew, Director of Solutions Marketing at Gigamon
    Greg Jablonsky, Chief Technology Officer at the Bonadio Group
    Sean Mack, Chief Information Officer and CISO at Wiley
  • Turn Network Data Into a High-Octane Fuel That Powers Security Recorded: Aug 25 2020 55 mins
    Eric Hanselman, Chief Analyst at 451 Research + Shehzad Merchant, CTO at Gigamon
    Join Eric Hanselman, Chief Analyst at 451 Research, and Shehzad Merchant, CTO at Gigamon, as they discuss the latest ideas and best practices to extract meaningful data to secure your infrastructure.

    The webinar will cover:
    • Inherent challenges of new architectures
    • Why the future is increasingly moving toward hybrid IT environments
    • What makes network data “high-octane?”
    • How best to leverage your network as a context-rich source of truth

    You’ll learn where this data exists, how it can be accessed and how to refine it into powerful security analytics. In today’s unprecedented enterprise landscape this isn’t just smart, it’s an imperative.
  • Securing the Next Normal of Financial Services Workplaces Recorded: Aug 18 2020 20 mins
    Shehzad Merchant, CTO + Martyn Crew, Director Solutions Marketing, Gigamon
    Wondering how to secure a fluid workforce and which tools to use? Want to understand what the greatest new areas of risk are for Financial Services? Watch this video Q&A to get answers.

    In addition to sharing insights into what the Next Normal will look like, how to maintain business continuity and crucial factors organizations might be overlooking, Shehzad Merchant, Chief Technology Officer at Gigamon, will answer questions like these:
    • How to manage a fluid workplace that dynamically shifts between on- and off-prem work
    • Which tools and technologies to use to secure your workforce
    • How to help DevOps scale apps dynamically without scaling up the attack surface

    Presented by:
    Shehzad Merchant, Chief Technology Officer at Gigamon
    Martyn Crew, Director of Solutions Marketing at Gigamon
  • Network Management Is Critical, Even When Employees Are Working From Home Recorded: Aug 11 2020 42 mins
    Michael Osterman, Principal Analyst at Osterman Research + Bassam Khan, VP of Product & Tech Marketing, Gigamon
    For anyone tasked with managing an organization’s network, this webinar with Osterman Research offers insights into critical issues network managers need to address to gain visibility and secure their network traffic. Current events have only made this harder.

    You’ll learn:
    • How organizations are adapting to the new work-from-home phenomenon
    • The critical issues you need to address to gain visibility into your network operations to optimize and secure network traffic
    • How to address drastic changes to network usage and adapt as quickly as possible

    Presented by:
    Michael Osterman, Principal Analyst at Osterman Research
    Bassam Khan, Vice President of Product and Tech Marketing at Gigamon
  • Network Visibility in a Kubernetes Environment Recorded: Jul 14 2020 63 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA); Brandon Dunlap, Moderator
    IT, cloud and security architects are responsible for addressing the following questions before they can successfully deploy applications in containers with Kubernetes-based orchestration and ensure the resultant traffic is optimally processed and distributed:

    · How can I get visibility into inter-container traffic as containers are ephemeral and constantly in-motion?
    · Can I ensure scalable visibility as deployed apps grow and can span hundreds of microservices each?

    · What if the underlying network architecture changes with a different virtual switch methodology?

    · Is there a way to automate the configured policies across thousands of containers in real-time?

    Not addressing these considerations slows down the transition to container-based applications, limits the use of datacenter automation and leaves the organization vulnerable to potential security breaches, with potential impact to reputation and brand. Join Gigamon and (ISC)2 on July 14, 2020 at 1:00PM BST for answers to these and other questions as we dive into containers and network visibility.
  • Une visibilité adaptée à vos besoins Recorded: Jun 18 2020 20 mins
    Jérôme Beclin - nCipher - Sales Engineer & Mathieu Pierard - Gigamon - Sales Engineer
    Cette webinar démontre l'importance d'avoir une visibilité complète du trafic et de s'assurer que vos outils peuvent garder un œil vigilant sur l'ensemble de votre réseau en utilisant la technologie de Gigamon et nCipher.
  • När Nätverken Möter Den Nya Morgondagen!4 Full synlighet och access Recorded: Jun 11 2020 29 mins
    Robert Klasson Gigamon SE Nordic and Baltic andJohn Svensson Gigamon Sales Director Nordic and Baltic
    Full synlighet och access i era Virtuella och Cloudbaserade nät.

    När fler organisationer flyttar sin data till offentliga molnplattformar upptäcker många att med nya möjligheter kommer nya utmaningar. Hur övervakar och säkrar du vital nätverkstrafik och data när det finns i en offentlig molninfrastruktur?

    Gigamon ger ditt NetOps och InfoSec-team full kontroll. GigaVUE Cloud Suite-lösningar eliminerar ”blindspots” även i containermiljö och i ”multicloud”. Genom att samla in, transformera och distribuera optimerad molntrafik till rätt verktyg.

    Lägre molnleverantörskostnader och ökad verktygseffektivitet genom minskad trafikbelastning.
    Enklare distributioner med automatiserad skalning och stöd för AWS och Azure native spegling av trafik.
    Enhetlig hantering av multimoln- eller hybridmiljöer med Gigamon Fabric Manager.

    Gigamon stöder också andra offentliga molnplattformar, inklusive Google Cloud, Oracle Cloud, IBM och mer. Vår Cloud Suite för alla moln möjliggör distribution av våra virtuella TAP: ar (G-vTAP-modul) och virtuella synbarhetsnoder (GigaVUE V-serien) i hela molnet på varje plattform du vill övervaka. Du kan hantera processen med robusta tredjepartsautomatiseringsverktyg som Ansible, Chef eller Puppet.
    GigaVUE Fabric Manager upptäcker automatiskt plattformar och tillhandahåller G-vTAP-enheterna oavsett var de bor och varnar automatiseringsverktygen för att skala V-seriens noder efter behov
  • När Nätverken Möter Den Nya Morgondagen!3 Förbättra Kund och Användarupplevelse! Recorded: Jun 4 2020 28 mins
    Robert Klasson Gigamon SE Nordic and Baltic, John Svensson Gigamon Sales Director Nordic and Baltic
    Enligt en undersökning från ESG är 78% beredda att avsluta en tjänst som de upplever som osäker eller har dålig prestanda, medans 86% är villiga att betala mer för en tjänst som de upplever som säker och fungerande.

    Klädesmärket Under Armour har 120 miljoner användare.
    Under Armour behövde fullständig synlighet av prestanda och säkerheten för deras digitala tillämpningar. Denna tillförlitlighet var nyckeln till att leverera deras kunders förväntningar på användarupplevelse och förtroende. Enligten ESG-rapport fick de genom att använda Gigamon en 75 procent större synlighet för all nätverkstrafik. ”Att ha full synlighet och säkerhet för våra digitala applikationer är nyckeln till att möta förväntningarna på användarupplevelsen och det förtroende som våra kunder kräver. ”
    Enligt ESG rapporten skulle 78% av de svarande sluta samarbeta med ett märke online om de upplevt att de inte kan säkerställa att information hanteras säkert eller att det skett ett brott.
    86% av de svarande konsumenterna är villiga att betala mer för en säker och uppgraderad upplevelse.

    Applikation och användaruplevelse!
    Mer än någonsin är det uppenbart att digitala applikationer är kritiska för organisationer och behovet av att se till att de levererar bästa möjliga kund- och användarupplevelse har aldrig varit viktigare.
    För att uppnå detta är det viktigt att använda verktyg som inte bara övervakar och visualiserar applikationsanvändning och användarupplevelse, utan också vidta åtgärder baserat på prestanda och beteende för dessa applikationer.
  • Modernizing and Securing State, Local and Education IT Recorded: Jun 1 2020 37 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    Here’s the situation: the Public Sector is experiencing disruption on an unprecedented scale. Watch now to learn how to regain control, secure your network and optimize performance and tools to save on costs.

    You’ll learn:
    * How to increase security across data centers and cloud environments
    * Ways to improve the speed of online service delivery
    * How to respond faster to constant threats to an increased attack surface
  • När Nätverket Möter Den Nya Morgondagen! 2, Centraliserad Dekryptering Recorded: May 28 2020 19 mins
    Robert Klasson Gigamon SE Nordic and Baltic, John Svensson Gigamon Sales Director Nordic and Baltic
    Får dina säkerhetslösningar rätt data? Minska falska larm med 70%
    Har du access till ditt nät? Får befintliga säkerhetslösning all data.
    Centraliserad Dekryptering
    Enskilda verktyg och säkerhetslösningar används idag för att dekryptera krypterad trafik, att använda en centraliserad lösning istället för att dekryptera och inspektera krypterad trafik är ofta den mest effektiva lösningen.

    Centralisering av dekryptering gör att trafik kan dekrypteras och inspekteras en gång innan den delas över flera verktyg.
    Möjligheten att undersöka krypterad trafik till och från applikationer kan vara viktig för att se om applikation och datatillgång är legitim eller olaglig. Eftersom applikationskapaciteten ökas dynamiskt, applikationer återkallas snabbt och nya applikationer implementeras.

    Använd metadata för att öka effektiviteten av era SIEM verktyg
    Företag och organisationer använder lösningar som Splunk eller andra SIEM för aktiv säkerhetsövervakning och matar både system- och applikationsmetadata till dessa, det kan vara ett kraftfullt sätt att säkerställa funktionen samtidigt som nya applikationer och kapacitet kommer online.

    Organisationer bör sträva efter att säkerställa det är exakt och relevant metadata som skickas till dessa verktyg för att maximera resultatet samtidigt som du minimerar mängden data som skickas till dem. Detta är särskilt viktigt med SIEM verktyg där faktureringsmodellen är baserad på volymen data som bearbetas eller lagras.
    ”Threat detektion och Respons”
    Med attackytor och sårbarheter som ökar till följd av övergången till WFH, med snabbt expanderad VPN-arkitektur är det absolut nödvändigt att organisationer har kraftfulla verktyg för att upptäcka och svara på dessa nya hot.
    Till exempel ger pekverktyg på ingress/egress-länkar och bakom VPN-koncentratorer en riktad strategi för att minska potentiella risker.
  • När Nätverken Möter Den Nya Morgondagen! 1 Recorded: May 26 2020 17 mins
    Robert Klasson Gigamon SE Nordic and Baltic andJohn Svensson Gigamon Sales Director Nordic and Baltic
    Gör mer med befintlig utrustning, verktygsoptimering kan spar upp till 50%
    Klarar befintlig utrustning 10G, 40G, 100G, Hur undviker ni att uppgradera säkerhets och analysutrustning i onödan.
    De flesta organisationer har gjort betydande investeringar i nätverket och säkerhetsverktygen som de använder för att hantera och skydda sina nätverk.

    När trafiken skiftar från LAN till WAN är det viktigt att dataflödet till dessa verktyg inte orsakar överbelastning av sökerhetslösningar och andra verktyg, orsakar områden där ni inte har full synlighet eller skapar andra problem beroende på den ökade trafikmängden.
    För att maximera effektiviteten av en organisations verktyg och säkerhetsutrustning är det viktigt att nätverkstrafik från fysisk, virtuell och moln miljöerna är optimerade innan de levereras till dessa lösningar.
    Om inte riskerar man att överbelasta dessa och att få göra manuell handpåläggning i annars automatiserade processer för att undvika problem
    ”Case study”
    Den amerikanska Myndigheten HHS (Health and Human Services) uppgraderade sitt nätverk till 10 GBps, men många av deras säkerhetsverktyg hade 1 Gbps nätverks interface.
    Med Gigamon kunde de behålla de äldre verktygen som kunde kunna arbeta med trafik från det snabbare 10Gb nätverket.
    Enligt ESG-studie tillhandahåller de en en besparing på 40–50 procent för att de kunnat dimensionera sin hårdvara och sina säkerhetsverktyg
  • TLS1.3: Two Years On Recorded: May 19 2020 62 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA) Gigamon; Brandon Dunlap, Moderator
    After being released in August 2018, what does TLS1.3 look like today and how many organisations are using it? There are many claims that TLS1.3 is the one-stop-shop solution to all encryption requirements; but is that the case? Join Gigamon and (ISC)2 on May 19, 2020 at 1:00PM BST for a discussion about organisations using TLS1.3, why they are using it and why in some situations it’s not a suitable fit for encryption requirements. We'll also explore what this means for visibility in terms of decryption and for the generation of Metadata, such as IPFIX (Internet Protocol Flow Information Export) and CEF (Common Event Format). We’ll also examine:

    - Understand how many people are using TLS1.3 and why

    - See what makes TLS1.3 different to TLS1.2 and why TLS1.3 not always the best choice

    - Understand what is required to decrypt TLS1.3 in order to present decrypted traffic to Security Countermeasures

    - How Metadata fits into TLS1.3
  • Zero Trust: What You Need to Know to Secure Your Data and Networks Recorded: May 14 2020 61 mins
    Dave Shackleford – SANS Sr Instructor + Ricardo Font – Sr Product Marketing Manager, Gigamon
    Hear from SANS Institute and Gigamon experts on why, when teams are suddenly doing more with less, adopting a Zero Trust architecture is the first step to staying secure as threats continue to evolve.

    You’ll learn:
    •About the effective implementation of Zero Trust and its foundational controls
    •Zero Trust best practices and concepts of deployment, detection and response
    •Why Gigamon ThreatINSIGHT is key to successfully adopting Zero Trust

    Presented by:
    Dave Shackleford, SANS Senior Instructor
    Ricardo Font, Senior Product Marketing Manager at Gigamon
  • Building the Foundation for Secure Patient Care-Centered Technologies Recorded: May 4 2020 45 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

    Watch now to learn:
    • How to balance delivering innovations in patient care with data security
    • Why adopting Zero Trust as the foundation for healthcare security is important
    • The security and operational challenges of handling encrypted data
  • What it’s Really Like When Your IT Vendor is Acquired or Their Products EOL Recorded: Apr 17 2020 22 mins
    Martyn Crew, Ian Farquhar, Jim Mandelbaum and Mike Valladao – Gigamon
    Three seasoned experts share what they’ve learned through real-life experiences dealing with the uncertainty sparked by a vendor you use being acquired or their product going end-of-sale.

    We’ve all experienced that twinge of concern when we hear that a critical piece of our architecture has been end-of-life’d. Or when the vendor for a product upon which we heavily depend has been acquired. What do I have to worry about? After all, I don't know what I don't know. What can I expect? Who can help me?

    Fortunately, our panel of experts have conquered these exact challenges and have over 100-years of real-world advice to share. Join us as Martyn Crew, Gigamon’s Director of Industry Solutions, hosts a video panel discussion with fellow Gigamon experts: Ian Farquhar, Jim Mandelson and Mike Valladao.

    What you’ll learn:
    • What are your options in an acquisition or end-of-life situation?
    • How does this really impact you operationally?
    • Best-practices for evaluating replacement options
  • Approaches to Network Monitoring and Management Recorded: Apr 16 2020 12 mins
    Doug Barth – CEO & Founder, Gatepoint Research + Jim Mandelbaum – SE, Gigamon
    Learn what your peers are doing and why you should care. Data from an independent survey of over 300 IT managers and directors reveals what their top network monitoring and management priorities are, the obstacles they face, the tools they use and more.

    Doug Barth (Principal/Founder of Gatepoint Research) shares the results of the survey, while Jim Mandelbaum (Gigamon Senior Security Engineer) explains what it means and why you should care.
  • Securing Healthcare with Limited Time and Resources Recorded: Apr 14 2020 24 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Very few healthcare InfoSec teams have the time and resources to deal with the formidable security challenges they face. The pressure to do more with less is constant. In this webinar, you'll learn how to improve your security posture by:

    • Optimizing tool and team efficiency by filtering out irrelevant traffic
    • Using AI to accelerate cybersecurity threat detection and response
    • Achieving full network traffic visibility while maintaining PII confidentiality
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GigaBITE 19, Size Does Matter
  • Live at: Oct 13 2020 9:00 am
  • Presented by: Robert Atkinson, Senior Sales Engineer
  • From:
Your email has been sent.
or close