Metadata Formats and their uses in a Security Context

Logo
Presented by

Ollie Sheridan, Principal Security Solutions Engineer, CISSP

About this talk

With Network Traffic increasing as Bandwidth costs decrease and the delivery of Applications changing in favour of Cloud environments, monitoring Networks at scale is becoming an increasing challenge. One of the approaches which is gaining popularity is the use of Metadata - but what is Metadata exactly? If you elect to employ Metadata as your method for monitoring your Network what format should you choose? Join Gigamon and (ISC)2 as we discuss the rise in popularity of Metadata, what problem it's trying to solve along with the pros and cons of its use. We'll also investigate how it can be implemented, examining the various formats that can be used to generate this Metadata. Lastly, will be the other uses of Metadata beyond 'traditional' Security, to ultimately lower the costs of implementation and better understand our environments. Join Ollie Sheridan as he raises these questions and gain a better understanding of Metadata in the context of Security.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (85)
Subscribers (3682)
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.