channel company logo

Gigamon

Supercharge your observability tools with network-level intelligence.

Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps
eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served
  • 28,024 Subscribers
  • 199 talks
  • 7 series

Supercharge your observability tools with network-level intelligence.

Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps
eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served
  • 28,024 Subscribers
  • 199 talks
  • 7 series

On-demand talks

Learn What’s Possible with Enriched Mobile Subscriber Analytics

Learn What’s Possible with Enriched Mobile Subscriber Analytics

Imagine the possibilities when service providers can easily access valuable insight about their mobile subscriber base. Information such as what devices and
OTT applications subscribers are using as well as when and where they use the mobile network. Marketing, advertising, infrastructure planning, customer
service, and product development can all benefit from better subscriber insight, but traditional approaches to collect this data have been costly and comple…

Five Capabilities of GigaVUE-OS and GigaVUE-FM You May Not Know

Five Capabilities of GigaVUE-OS and GigaVUE-FM You May Not Know

GigaVUE-OS and GigaVUE-FM offer a rich set of features and capabilities - so many that users can be overwhelmed. In this session, we’ll highlight five
high-value features that you may not know about but that could dramatically improve the return on your investment, optimize your workflows, make your
tools more efficient, and help keep your networks healthy and secure.

The “Assumption of Compromise”: Government Agency Best Practices

The “Assumption of Compromise”: Government Agency Best Practices

It’s not a matter of “if” but “when” organizations are breached. That’s the premise that Federal agencies operate under and it’s one that would be prudent to
follow. With an Assumption of Compromise, it’s assumed that threat actors are currently living off the land (LTOL) using applications and protocols already
available in workloads. Why LTOL and similar attacks can go unnoticed is because of a critical gap in traditional logging that is often overlooked. Learn why …

Decryption Lessons Learned: The Most Efficient Deployment Models

Decryption Lessons Learned: The Most Efficient Deployment Models

The need to inspect encrypted traffic is critical given the prevalence of encrypted malware lurking in our midst. But with over 90 percent of enterprise data
being encrypted, managing this traffic and determining when and where to decrypt it remains a significant challenge for many organizations. Gigamon
provides a range of decryption solutions and in this session, we’ll explore the pros and cons of the most common deployment scenarios and help you to lea…

End the “Blame Games” with High-Precision App Troubleshooting

End the “Blame Games” with High-Precision App Troubleshooting

Not knowing whether a performance bottleneck is caused by the network or the application itself often leads to a “blame game” among application, network,
and cloud teams. This finger pointing can delay resolution and also stifle collaboration. Join us to learn how Gigamon can help you to more quickly and
precisely pinpoint the root cause of performance bottlenecks and finally end the “blame game”.

Secure Lateral Movement in Hybrid Cloud Infrastructure

Secure Lateral Movement in Hybrid Cloud Infrastructure

As organizations venture deeper into using complex infrastructures, they are met with the challenge of how to effectively secure lateral movement across all
environments. Join Vectra AI and Gigamon to learn how the biggest dilemma lies in the removal of visibility gaps across all the areas where traffic traverses
including North-South, lateral, encrypted, and ingress-egress traffic. Especially in hybrid cloud architectures that rely on public cloud services. During this…

“Wow” Your App Owners with Application Insights Derived from Deep Packet Inspection

“Wow” Your App Owners with Application Insights Derived from Deep Packet Inspection

DevOps must deliver business agility and high application performance together with strong application security. How can security and infrastructure teams
work with DevOps to ensure network intelligence-derived security is incorporated directly into the software development process – without compromising
speed or quality? In this session we will walk you through a free-to-try, self-contained AWS-based Gigamon tool that demonstrates how network-derived inte…

Operationalizing Zero Trust: Strategies and Best Practices for Government Agencies

Operationalizing Zero Trust: Strategies and Best Practices for Government Agencies

Navigating the DoD Framework, Leveraging Cloud Tools, and Overcoming Budget Challenges The goal of achieving Zero Trust remains a top priority for
government agencies, but the realities of operationalizing Zero Trust pose unique challenges to every agency and project. In this webinar we will discuss
approaches and tools to the implementation of the Department of Defense Zero Trust model; discuss best practices from the NSA and highlight ways to buil…

Series