Hi [[ session.user.profile.firstName ]]

Cybersecurity in the Age of Digital Transformation with LogRhythm and Gigamon

COVID-19 has caused businesses across industries to implement remote work policies. But what new security concerns should be on their radar because of this?

In the webinar, we will discuss how to:
Secure your remote users and mitigate common attack vectors
Achieve pervasive network visibility even in complex environments
Realize rapid threat detection and response with LogRhythm & Gigamon integration
Recorded Jun 18 2020 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ng Yeok Chong - APJ SE Director Gigamon, Leonardo Hutabarat Enterprise Sales Engineer LogRhythm
Presentation preview: Cybersecurity in the Age of Digital Transformation with LogRhythm and Gigamon

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Case Study: Australian National University | 2020 Virtual Roundtable Recorded: Oct 2 2020 57 mins
    Suthagar Seevaratnam | ANU CISO
    Globally, there has been increasing reports citing surges in cyber attacks on education institutions, and some of these organisations have paid hackers significant amounts to regain access to their systems. A 2020 global intelligence threat report by NTT, found that the education sector attracted 38% of all attacks last year and was the 2nd most attacked industry after government.

    This rise of attacker techniques combining ransomware and data exfiltration illustrates that defense against either approach in isolation is insufficient. Compounded with the complexity of University environments, this also makes an endpoint-only approach unviable.

    After finding themselves in a data breach in late 2018, the renowned the Australian National University (ANU) published an extensive transparent report, outlining the timeline of events and level of sophistication behind the hack.

    Join us for an exclusive fireside chat with the CISO of ANU, Suthagar Seevaratnam, as we discuss some of the changes they have made post the incident and what they see as their next steps to improve cyber security resiliency in today’s ever-evolving threat landscape.
  • Catching Up With The New Tomorrow Recorded: Aug 26 2020 16 mins
    Vladimir M. Yordanov, Senior SE Director of Gigamon, APJ
    Hear from our APAC Senior Director of Solution Engineering, Vladimir M. Yordanov as he outlines effective ways for organisations to navigate the current changes in work environment and shift from LAN to WAN traffic.

    Join us as we discuss the following topics during the session:

    - COVID 19 impact on ICT and what are current organisational priorities
    - Optimizing ICT infrastructure by reducing complexity and boosting systems and teams efficiency.
    - Building resilient and compliance systems that can withstand today’s cyber threats
    - Achieving full network and application visibly for decision making, resources allocation and secure the environment
  • Ensuring Network Visibility and Security During Unprecedented Times Recorded: Jul 13 2020 33 mins
    Bill Coon, Riverbed + Frank Rubio, Gigamon
    Hear from Gigamon and Riverbed experts on how to provide critical visibility for securing the overwhelming demands of a large-scale remote workforce.

    You’ll learn:
    •How to successfully resolve remote access and VPN issues
    •How to secure your network from threats
    •Optimize bandwidth usage and performance

    Presented by:
    Frank Rubio, Strategic Alliances Director at Gigamon
    Bill Coon, Senior Technical Solutions Architect at Riverbed
  • Building the Foundation for Secure Patient-Care Centered Technologies (Thai) Recorded: Jul 2 2020 44 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    การสร้างรากฐานสำหรับศูนย์กลางเทคโนโลยีในการดูแลรักษาผู้ป่วยอย่างมั่นคงให้ปลอดภัย

    Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

    Watch now to learn:
    • How to balance delivering innovations in patient care with data security
    • Why adopting Zero Trust as the foundation for healthcare security is important
    • The security and operational challenges of handling encrypted data

    ภายใน Webinar นี้ ท่านจะได้เรียนรู้เกี่ยวกับความท้าทายที่ไม่เหมือนใครที่องค์กรด้านสาธารณสุขต้องเผชิญในยุคที่การดูแลรักษาผู้ป่วยต้องพึ่งพาเทคโนโลยีอันหลากหลาย รวมไปถึงโซลูชันของ Gigamon ที่จะช่วยให้การวางมาตรการควบคุมและการรักษาความมั่นคงปลอดภัยบนเทคโนโลยีเหล่านั้นมีประสิทธิภาพมากย่ิงขึ้น เพื่อให้มั่นใจว่าข้อมูลของผู้ป่วยจะได้รับการคุ้มครองจากการโจมตีไซเบอร์

    หัวข้อการบรรยายประกอบด้วย

    การนำนวัตกรรมเข้ามาใช้ในการดูแลรักษาผู้ป่วยในขณะที่ยังคงไว้ซึ่งความมั่นคงปลอดภัยของข้อมูล
    ทำไมโมเดล Zero Trust จึงเป็นรากฐานสำคัญของการรักษาความมั่นคงปลอดภัยของระบบสาธารณสุข
    ความท้าทายเชิงปฏิบัติการและด้านความมั่นคงปลอดภัยในการจัดการกับข้อมูลที่เข้ารหัส
  • Building the Foundation for Secure Patient Care-Centered Technologies (Chinese) Recorded: Jun 18 2020 44 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

    Watch now to learn:
    • How to balance delivering innovations in patient care with data security
    • Why adopting Zero Trust as the foundation for healthcare security is important
    • The security and operational challenges of handling encrypted data
  • Cybersecurity in the Age of Digital Transformation with LogRhythm and Gigamon Recorded: Jun 18 2020 54 mins
    Ng Yeok Chong - APJ SE Director Gigamon, Leonardo Hutabarat Enterprise Sales Engineer LogRhythm
    COVID-19 has caused businesses across industries to implement remote work policies. But what new security concerns should be on their radar because of this?

    In the webinar, we will discuss how to:
    Secure your remote users and mitigate common attack vectors
    Achieve pervasive network visibility even in complex environments
    Realize rapid threat detection and response with LogRhythm & Gigamon integration
  • Building the Foundation for Secure Patient Care-Centered Technologies Recorded: Jun 16 2020 44 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

    Watch now to learn:
    • How to balance delivering innovations in patient care with data security
    • Why adopting Zero Trust as the foundation for healthcare security is important
    • The security and operational challenges of handling encrypted data
  • Network Changes for the new tomorrow Recorded: Jun 2 2020 39 mins
    Bassam Khan - VP of Product and Technical Marketing Engineering
    Some organisations see the challenges and want to return to how things were; other companies see the opportunity and will re-imagine their businesses and IT.

    The urgency for digital transformations just got accelerated in “The New Tomorrow”. IT teams need to move fast to resolve network-related issues that were not common prior to remote working. Organisations need to do more with less while continuing to leverage existing tools yet improve performance and maintain security while the business strategises on turning adversity to opportunities.

    Gigamon interviewed 22 large enterprise and government organisations and learned about common steps, and missteps, that InfoSec and network teams have made in order to not just adjust to, but stay ahead of today’s harsh IT gyrations.

    Join us to learn about these network transition challenges and a visual guide to addressing them.
  • Covid-19啟示 – 部署應對突變事件之新IT架構 Recorded: May 14 2020 38 mins
    Simon Chien, Regional Sales Director for Taiwan, Hong Kong and Macau
    In the face of the continued spread of the COVID-19 epidemic in the world, the urgency for digital transformation just got accelerated. IT teams need to move fast to resolve network-related issues that were not common prior to remote working. Organizations need to do more with less while continuing to leverage existing tools yet improve performance and maintain security while the business strategies on turning adversity to opportunities. Join us to learn about these network transition challenges and how Gigamon solutions adapt to changes quickly in the "New Tomorrow" and optimize traffic before it’s delivered to tools, eliminating costly tool upgrades and increasing tool lifespan.
  • Building the Foundation for Secure Patient Care-Centered Technologies Recorded: May 4 2020 45 mins
    Martyn Crew – Director of Solutions Marketing, Gigamon
    Learn the unique challenges facing healthcare organizations and which Gigamon solutions can bring critical control and security across healthcare networks. At a time when patient care is increasingly dependent on a wide range of technologies, network security, visibility and analytics are more crucial than ever.

    Watch now to learn:
    • How to balance delivering innovations in patient care with data security
    • Why adopting Zero Trust as the foundation for healthcare security is important
    • The security and operational challenges of handling encrypted data
  • NetOps 2.0: Application Intelligence in a Time of Change and Uncertainty Recorded: Apr 30 2020 19 mins
    Bassam Khan - VP of Product and Technical Marketing Engineering
    Overnight millions are suddenly working from home, putting IT teams under tremendous pressure to maintain security and performance in spite of an increased load. But there are effective ways to respond.

    In this webinar, we’ll review these new challenges and how NetOps 2.0 gives you the agility to adapt and win.

    Learn how to:
    • Run fast as million start working from home
    • Defend against an increased attack surface
    • Overcome economic uncertainty and tighter budgets
    • Ensure network infrastructure will support continued changes
    • Adapt to an overall increase in load
  • What it’s Really Like When Your IT Vendor is Acquired or Their Products EOL Recorded: Apr 17 2020 22 mins
    Martyn Crew, Ian Farquhar, Jim Mandelbaum and Mike Valladao – Gigamon
    Three seasoned experts share what they’ve learned through real-life experiences dealing with the uncertainty sparked by a vendor you use being acquired or their product going end-of-sale.

    We’ve all experienced that twinge of concern when we hear that a critical piece of our architecture has been end-of-life’d. Or when the vendor for a product upon which we heavily depend has been acquired. What do I have to worry about? After all, I don't know what I don't know. What can I expect? Who can help me?

    Fortunately, our panel of experts have conquered these exact challenges and have over 100-years of real-world advice to share. Join us as Martyn Crew, Gigamon’s Director of Industry Solutions, hosts a video panel discussion with fellow Gigamon experts: Ian Farquhar, Jim Mandelson and Mike Valladao.

    What you’ll learn:
    • What are your options in an acquisition or end-of-life situation?
    • How does this really impact you operationally?
    • Best-practices for evaluating replacement options
  • Take Control with Application Visibility in Nutanix Private Clouds Recorded: Apr 9 2020 52 mins
    John Gudmundson — Sr. Product Marketing Manager, Gigamon + Mike Wronski – Technical Director of Product Marketing, Nutanix
    Private Clouds are on the ascent. To ensure comprehensive security with superior performance, you need full packet and application visibility. These environments are also very dynamic and complex, so automation is critical to success.

    Today, to acquire and forward traffic, you likely manually deploy hardware network TAPs or tediously install processing-intensive agents for each tool on each compute node. There’s a better way.

    Learn how next-gen Network Packet Brokers collaborate with cloud orchestration tools in hyperconverged infrastructures (HCI) to automatically provision agentless VMs to obtain all traffic. Next, app flows are identified and optimally processed and distributed to the proper tools. Network efficiency rises, user experience is enhanced and over 50% of traffic can be eliminated — thereby improving tool effectiveness with less scaling.

    Watch the webinar to learn how to:
    • Overcome private cloud challenges with HCI
    • Obtain comprehensive app-layer visibility throughout the cloud
    • Leverage advantages of next-gen network packet brokers
    • Ensure infrastructure automation with orchestration tool integration
    • BONUS: watch a live demonstration to see it in action
  • Modernizing and Securing Financial Services Technology Environments Recorded: Apr 1 2020 34 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    Financial services firms have unique needs that other industries don't face. Strict security policies, strong compliance requirements, and extensive and data retention demands are a few examples.

    Top those needs off with complex, distributed, and dynamic applications and most IT professionals who work in the financial industry are in dire need of more efficient, secure, and intelligent solutions than their peers in other industries. But where do you turn to find such solutions? Martyn Crew, Gigamon’s Director, Industry Solutions, has the answer.

    Watch the EcoCast to learn about the unique IT challenges in the financial services industry and discover an innovative solution to solve your greatest IT challenges.
  • SANS 2020 Cybersecurity Spending Survey – Panel Discussion Recorded: Apr 1 2020 58 mins
    Gordon Beith – Senior Director, Product Marketing, Gigamon
    This webcast more closely examines the results of the SANS 2020 Cybersecurity Spending Survey. A panel of sponsor representatives, led by survey author Barbara Filkins and survey advisor John Pescatore, will explore themes that emerged during the survey.

    Hear Barbara Filkins and John Pescatore give an analysis of survey results and reveal strategies that organizations can use to justify security spending.

    PANELISTS:

    Gordon Beith is responsible for overseeing product marketing activities for service providers at Gigamon. His extensive career includes over 30 years of work in telecommunications product management, marketing, hardware and software development, and related next-generation services areas. Gordon also co-authored the book on IMS testing and monitoring, entitled “Ensuring a Quality IMS Experience,” published in 2007, and has one patent to his name.

    As vice president and chief evangelist, Bob Gilbert is in charge of go-to-market strategy at Netskope, a market-leading cloud security company. He has held leadership roles in product management and marketing at various technology companies, including Riverbed, where he was a member of the pioneering product team that launched Riverbed from a small start-up to a market leader. Bob was first introduced to the world of cybersecurity as a teenager in the 1980s when he hosted a BBS and had to develop his own terminal software to prevent hackers from infiltrating the site that he hosted from his parent’s home.


    John Smith is a principal engineer at ExtraHop. John has over two decades of experience as a senior architect in IT organizations, and is a regular speaker at technology events including BriForum, RSAC and Citrix Synergy, among others.
  • Do You Really Know What's Running On Your Network? Recorded: Apr 1 2020 25 mins
    Martyn Crew – Director, Industry Solutions, Gigamon
    Everyone thinks they know what applications and data are on their network, but is that really the case?

    Join us for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you’ll learn invaluable information from Gigamon expert, Martyn Crew.

    What you'll learn:
    - How to identify and visualize what’s on your network
    - Beyond seeing what’s on your network, understand what it’s doing
    - How to use this knowledge to deliver optimal network availability, performance and user satisfaction

    Be sure to join and win in the visibility game. You’ll hear how to save time, increase overall tool efficiency and maximize your infrastructure investment.

    See how Gigamon delivers network visibility and analytics for digital apps and services enabling your organization to run fast, stay secure and innovate.
  • NetOps 2.0: Application Intelligence in a Time of Change and Uncertainty Recorded: Apr 1 2020 20 mins
    Bassam Khan - VP of Product and Technical Marketing Engineering
    Overnight millions are suddenly working from home, putting IT teams under tremendous pressure to maintain security and performance in spite of an increased load. But there are effective ways to respond.

    In this webinar, we’ll review these new challenges and how NetOps 2.0 gives you the agility to adapt and win.

    Learn how to:
    • Run fast as million start working from home
    • Defend against an increased attack surface
    • Overcome economic uncertainty and tighter budgets
    • Ensure network infrastructure will support continued changes
    • Adapt to an overall increase in load
  • Application Awareness for Network Visibility Recorded: Feb 18 2020 35 mins
    Andy Hutchinson – Sales Engineer, Gigamon
    Let’s face it: in the 21st century whatever network buzzwords we have in our I.T. enterprise are really focused on application delivery. How does the network enable the business, and more specifically the applications that the business needs to run. So why focus network visibility exclusively on packets, when it is the applications that are important to our users and our customers?

    With Gigamon Application Intelligence, you can visualize the applications running across your network and make decisions for your environment based on applications, not just packets. Register for this webinar to learn how, within your existing infrastructure you can:

    · Achieve full visibility to applications on your network and the resources they consume
    · Filter out low-risk traffic, for improved detection performance
    · Understand how application metadata can benefit network security and performance measurements
  • Application Awareness with the Power to Take Action Recorded: Aug 22 2019 54 mins
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Don't Let Digital Transformation Wreak Havoc on Your Network! Recorded: Aug 6 2019 52 mins
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
Topics ideal for Network and Network security professionals
Gigamon is the first company to deliver unified network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure. We aggregate, transform and analyse network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity in the Age of Digital Transformation with LogRhythm and Gigamon
  • Live at: Jun 18 2020 2:00 am
  • Presented by: Ng Yeok Chong - APJ SE Director Gigamon, Leonardo Hutabarat Enterprise Sales Engineer LogRhythm
  • From:
Your email has been sent.
or close