Logs or Packets — Which is Better for Hybrid Cloud Security?

Logo
Presented by

Carl Rios, Cloud Architect, Public Sector, and Stephen Goudreault, Cloud Security Evangelist

About this talk

If your security tools rely on logs, you may not be seeing the whole picture. In fact, the picture may not even be reliable. That’s because logs can be overwritten, manipulated, and deleted by bad actors. To achieve a more proactive security and compliance posture, adding network-derived context to MELT data brings the entire picture into focus. In this session, we’ll discuss how immutable network intelligence enables you to spot SSL/TLS vulnerabilities, identify port spoofing, and stop rogue activities before damage is done.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (110)
Subscribers (6711)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.