Logs are no help when you're hosting hackers. How do you stay secure?

Logo
Presented by

Gigamon's Stephen Goudreault, Sr. Technical Marketing Engineer and Marc Edun, Sr. Sales Engineer

About this talk

Unfortunately, your security tools can’t see everything. Smart as they are, security and observability tools that aren’t fed network-derived intelligence and insights can’t see everything, which gives unseen threats plenty of time and space to cause trouble. Logs record traffic, but observers can’t validate if lateral movement is disguised as standard traffic. Logs only see part of the picture. Augmenting log-based tools with network-level intelligence derived from packets, flows, and application metadata extends their value and enables organizations to detect previously unseen threats. What is missing across the board is application and protocols visibility. Join us for this educational webinar to see how Deep Observability exposes previously unseen threats. We will discuss: - Logging can't report applications and protocols in motion on the network. - An easy way for bad guys to avoid detection - Non-standard port usage - Why CloudOps doesn’t want NetOps in on the planning - Can this even be solved?
Related topics:

More from this channel

Upcoming talks (16)
On-demand talks (167)
Subscribers (25654)
Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.