Gigamon recently announced the general availability of GigaSECURE® Cloud for Microsoft Azure. Developed for enterprise customers with mission‐critical applications deployed in Azure, GigaSECURE Cloud enables organizations to acquire, optimize and distribute selected traffic to security and monitoring tools, ensuring business‐critical data in the cloud is protected and monitored by security operations. MORE: How to Achieve a […]
CRN Magazine Names GigaSECURE Cloud for Microsoft Azure One of the “10 Hot New Cloud Security Products” at RSA 2018. TLS 1.3 Is Moving Forward: What You Need to Know Today to Get Ready. How to Achieve a Consistent Security Posture Even with a Multi‐Cloud Strategy. Prevent Security Tool Downtime with Inline Bypass Threat Prevention.
Boise ISSA Information Security Conference May 3 in Boise, ID. Gigamon Federal Cybersecurity Summit May 10 in Washington, DC. Enterprise Cyber Security (ECS) May 10 in London, UK. RevTechX May 16 – 17 in Sacramento, CA. Red Sky Security Conference May 16 – 17 in Sandy, UT. CISO Executive Summits Join us in Los Angeles, […]
Webinars #1. SOC Squad: Select and Deploy New Security Tools Faster Available live online on April 5 at 10:30 a.m. Pacific Time and after on demand Watch as Gigamon CISO Simon Gibson and Sr. Director Graham Melville demonstrate how the GigaSECURE® Security Delivery Platform strengthens new security tool testing and streamlines deployment. Topics include how […]
The RSA Conference is right around the corner. If you plan to attend RSA make sure to say hello to the Gigamon team and check out activities at booth #N4321 in Moscone North. Watch demos and presentations from Gigamon and its partners on inline bypass threat prevention and cloud security. Attend a speaking session led […]
#1. New Enhanced Network Intelligence Features for Visibility Platform for AWS Version 5.2 of the Gigamon® Visibility Platform for AWS adds two new features you’ll want to know about: NetFlow and IPFIX generation: Generate flow records from network traffic to determine IP source and destination of traffic, class of service and causes of congestion. Header Transformation: Modify key content in the header (L2‐L4) to help […]