Logs or Packets — Which is Better for Hybrid Cloud Security?

Logo
Presented by

Carl Rios, Cloud Architect, Public Sector, and Stephen Goudreault, Cloud Security Evangelist

About this talk

If your security tools rely on logs, you may not be seeing the whole picture. In fact, the picture may not even be reliable. That’s because logs can be overwritten, manipulated, and deleted by bad actors. To achieve a more proactive security and compliance posture, adding network-derived context to MELT data brings the entire picture into focus. In this session, we’ll discuss how immutable network intelligence enables you to spot SSL/TLS vulnerabilities, identify port spoofing, and stop rogue activities before damage is done.
Related topics:

More from this channel

Upcoming talks (16)
On-demand talks (167)
Subscribers (25654)
Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.