7 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. Join us to learn how this technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At...
March 13, 2024
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Simply Satisfy Your Zero-Trust ...
Carahsoft is inviting LiveAction CTO and Founder John Smith, and Gigamon Senior Sales Engineer Matt Hollingsworth, for a joint webinar on March 21st at 2pm EST where attendees will learn: White House Executive Order and Memorandums on Zero Trust and OMB M-21-31 Definition of Zero Trust and its principles How this is applied to federal agencies The value of network visibility to maintain compliance LiveAction and Gigamon’s joint solution...
March 21, 2023
Organizer: LiveAction Government Team at Carahsoft
Location: Webcast
Add Favorite
Cloud Migration: Who Is Responsible For...
Fingers crossed, life is starting to get back to normal, and the winning streak cloud-based services saw as a result of the pandemic shows no sign of slowing down as businesses move to embrace hybrid and ‘work from anywhere’ models. Yet despite the numerous benefits of the rapid migration to cloud - collaboration where previously there were silos ranking near the top - the stark reality is that cyber security for the cloud era is f...
January 12, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Design Yo...
This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including: Requirements Architectures Best practices
November 2, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Profiling and Posturing your IoMT Network
The world is constantly changing and now more than ever, already pushed-to-the-brink IT departments are being called upon to help their organizations continue their transformation efforts, to reshape the end user computing experience, and to ensure that IT is secure, compliant, and financially sustainable. Legacy approaches to modern problems may still have a place, but as IT leaders and professionals work to ensure that their platforms are su...
August 3, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Report: NetOps and SecOps Guide to Publ...
Enterprises are moving to the cloud faster and furiouser than ever before. As with any complex project, it’s all too easy to get caught up in the tech of the day and lose sight of the journey. In this strategic session for network operations and security professionals, industry analyst Rich Mogull will pull together over a decade’s experience to identify the top opportunities and avoid the top mistakes when moving to the cloud.This...
June 1, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Upleveling Your Security and Networking...
We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?In this webinar, you'll hear about: Critical components of network detection and response (NDR) technologies Why visibility is a cornerstone to any NDR technology How Gigamon ThreatINSIGHT™ gives you visibility...
May 25, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Back to Search Begin New Search