Your Cloud Workloads Are Fully Secure, Right?

Logo
Presented by

Bassam Khan, VP of Product and Technical Marketing Engineering - Gigamon

About this talk

You have all the cloud monitoring and security tools in place. Would you agree that it’s still difficult to: - Have complete visibility and eliminate blind spots, like hybrid cloud application activities and container communications, and discover and monitor unmanaged hosts/apps and IoT? - Provide comprehensive security, such as detect and respond to network-based threats, enumerate hosts on the hybrid cloud network, and support shared responsibility and Zero Trust frameworks, particularly as it relates to network traffic? - Detect unwanted activities, such as shadow IT, crypto-mining, and P2P and torrent traffic? - Comply with network-related compliance and SLOs, such as extending on-premises policies, controls, reports, and practice knowledge to cloud apps? Obviously, no security posture is 100% attack-proof. However, bringing the “network perspective” to hybrid-cloud workloads makes it easier to address the challenges above, and more. At this session we will dive into several use cases and we will demo the yet untapped advantage the network perspective brings to cyber defense.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (96)
Subscribers (4041)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.