Security

Stronger Together: A Year of Highlights from Gigamon’s Ecosystem Partners

At Gigamon, we don’t just create leading-edge technologies like the GigaSMART® Visibility Fabric™ and the GigaSECURE® Security Delivery Platform. We go a step further by designing these products to integrate elegantly with the advanced security, troubleshooting, analysis, forensics, and compliance tools created by our ever-growing family of Gigamon Ecosystem Partners. Indeed, 2016 has been a banner […]

Read more >

A Locked Door Isn’t Enough: Cyber Hunting with FlowTraq and GigaSECURE

Attention all security professionals: If your network collects telemetry data (such as NetFlow or sFlow) only at border points, and nowhere else, you can be blindsided when an adversary is already inside. Fortunately, FlowTraq can help you locate these threat actors—if you feed it telemetry collected from locations inside your network. And that’s where the Gigamon GigaSECURE® […]

Read more >

Recap: Gigamon NYC Cybersecurity Summit—Metadata, Visibility, and Keeping Your Network Safe

On October 27 Gigamon customers and partners gathered at Chelsea Piers in Manhattan for the Gigamon NYC Cybersecurity Summit. Participants were dazzled by the “world’s most famous hacker,” Kevin Mitnick, as he delivered a fascinating keynote address on our human susceptibility to social engineering hacks. This was followed by an expert panel discussion on the […]

Read more >

Top 3 Ways to Pair GigaSECURE with Splunk Enterprise

Splunk Enterprise is a hugely popular network operations tool that’s also gaining market share as a security information manager; your organization might be thinking about deploying it, or might already be using it today. Either way, you’ll definitely want to know how Gigamon’s GigaSECURE® Security Delivery Platform works with Splunk’s offerings to help keep your networks […]

Read more >

The New TLS 1.3 Standard: Ready or Not, Changes Are Coming

Editor’s note: This article was originally published on the Gigamon Blog. Over the past few years, there have been several serious attacks on TLS—the widely used encryption standard to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. For this reason, the Internet Engineering Task Force (IETF) will be […]

Read more >