Latest Talk
Mapping to DoD Zero Trust Capabilities: A Practical Guide
The DoD Cybersecurity Reference Architecture is emerging as one of the key Zero Trust Architecture models for both government agencies and commercial
enterprises. It is a detailed – and practical – architecture that clearly outlines the steps toward implementing Zero Trust. Please join Executive and Zero …
On-demand talks
Mapping to DoD Zero Trust Capabilities: A Practical Guide
The DoD Cybersecurity Reference Architecture is emerging as one of the key Zero Trust Architecture models for both government agencies and commercial
enterprises. It is a detailed – and practical – architecture that clearly outlines the steps toward implementing Zero Trust. Please join Executive and Zero
Trust Thought Leaders, Live Action CEO and Co-Founder, John Smith, and Bassam Khan, Vice President of Product and Technical Marketing, as they discuss: …
Maximizing Network Threat Detection: Enhancing Security
Unlocking Speed, Precision, and Efficiency in NDR NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the
leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of ExtraHop’s threat detection by ensuring it has
access to all network traffic regardless of whether this is data center or cloud traffic. Join WWT, ExtraHop and Gigamon experts as they discuss how ExtraH…
Cybersecurity Fundamentals: Building Strong Defenses from Network Observability
As organizations migrate to the cloud, they face a new wave of cybersecurity challenges. Today’s security measures frequently fall short in detecting and
responding to threats that move laterally across virtual infrastructure, often using encryption to hide. In this webinar, we will cover how a single cybersecurity
program built on network visibility across hybrid cloud environments can lead to effective threat management against today’s attacks. Join us as we disc…
사이버 보안 산업의 현황: 준비 상태 격차를 해소하는 방법
2024년 글로벌 정보 보안 지출이 2,150억 달러에 이를 것으로 예상되지만, 오늘날의 조직들은 사이버 범죄자들에 대해 점점 더 뒤처지고 있습니다. 전 세계 1,000명 이상의 보안 및 IT 리더를 대상으로 한 연례 설문 조사에서, 우리는 점점 더 복잡해지는
하이브리드 클라우드 인프라를 보호하고 관리하는 데 있어 사이버 보안의 도전 과제와 최우선 사항을 조사했습니다. 설문 조사 결과, 3분의 1의 조직이 기존 도구를 사용하여 지난 12개월 동안 데이터 유출을 감지하지 못했다고 합니다. 그 이유는 무엇일까요? 우리의
CSO 차임 마잘과 함께 이 기조 연설 세션에 참여하여 설문 조사 주요 내용, 사이버 보안 현황에 대한 통찰력, 그리고 조직이 준비 상태 격차를 해소하기 위해 어떻게 적응해야 하는지에 대해 들어보세요.
Five Capabilities of GigaVUE-OS and GigaVUE-FM You May Not Know
GigaVUE-OS and GigaVUE-FM offer a rich set of features and capabilities - so many that users can be overwhelmed. In this session, we’ll highlight five
high-value features that you may not know about but that could dramatically improve the return on your investment, optimize your workflows, make your
tools more efficient, and help keep your networks healthy and secure.
Decryption Lessons Learned: The Most Efficient Deployment Models
The need to inspect encrypted traffic is critical given the prevalence of encrypted malware lurking in our midst. But with over 90 percent of enterprise data
being encrypted, managing this traffic and determining when and where to decrypt it remains a significant challenge for many organizations. Gigamon
provides a range of decryption solutions and in this session, we’ll explore the pros and cons of the most common deployment scenarios and help you to lea…
선도 기업을 위한 하이브리드 클라우드 네트워크 보호: 비즈니스 및 기술 업데이트
개회 기조연설에 참석하여 Shane Buckley 사장 겸 CEO의 최신 비즈니스 및 시장 업데이트를 들으시고, 이어서 Chief Product Officer인 Michael Dickman의 Gigamon Deep Observability Pipeline에 대한
최신 기술 혁신 업데이트와 향후 로드맵을 엿볼 수 있는 시간을 가지세요. 이 세션에서는 Gigamon을 통해 하이브리드 클라우드 인프라를 보다 안전하게 관리하는 데 기여한 고객들을 인정하는 2024 Giga HERO 고객상 발표도 포함됩니다.
To Tap or Not to Tap and When is an Agent Not an Agent
From an operational perspective, using an agentless solution such as mirroring for virtual traffic access seems ideal. Nothing to install, easier to manage, less
expensive etc. In fact, the opposite is true. Agent-based traffic access solutions are easier to configure, yield higher performance, and usually cost less than
their agentless counterparts. In this session, we’ll expose the myths and misconceptions about using an agent for traffic access. We’ll also discuss why age…