35 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Mapping to DoD Zero Trust Capabilities:...
In this webinar, attendees will learn: How to meet Network, Orchestration/Automation and Visibility/Analytics requirements How to manage encrypted data The importance of Lateral or East-West visibility in Zero Trust
April 16, 2024
Organizer: LiveAction Government Team at Carahsoft
Location: Webcast
Add Favorite
Deep Observability: Critical Solution t...
Securing hybrid and multi-cloud workloads and supporting infrastructures is a daunting challenge for many organizations. Tried and trusted on-premises approaches and tools often don’t easily translate to the cloud and cloud-native monitoring and security tools are often platform specific making it difficult to gain observability across hybrid and multi-cloud infrastructures. To overcome these challenges, realize the full potential of a c...
December 21, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Get More Out of Your Gigamon
The goals and milestones prescribed in OPM Memorandum M-21-31 seem almost impossible to achieve, which include improving the capabilities related to cybersecurity incidents. Join Gigamon and Carahsoft to learn how Deep Observability can help you fast-track your compliance with the Memorandum's objectives all-the-while achieving a foundation for a scalable Zero Trust Architecture. In this complimentary webinar, we will discuss: What M-21-31 is...
March 1, 2022
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Deep Dive INSIGHTS: Fighting Ransomware...
Join experts George Sandford, leader of our ThreatINSIGHT Technical Success Management team and Michael Lazic, a member of Gigamon Applied Threat Research as they discuss how ransomware has forced security teams to shift priorities as organizations see ransomware’s potential impacts across the business. In this webinar, they will walk you through: Why the network is critical infrastructure Key reasons network visibility is important Real...
February 9, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
CISO INSIGHTS: How to Prepare for the R...
Join our distinguished panel of Cybersecurity executives as they discuss why ransomware, extortion, and other attacks are becoming more prevalent and how you can prepare to get ahead of the curve. The panel, moderated by Robert Rodriguez, Founder of SINET, will bring together industry leaders — Nick Shevelyov (CISO, Silicon Valley Bank and best-selling author of Cyber War…and Peace), Edna Conway (VP, Chief Security & Risk Offi...
February 2, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Zero Trust for the Cloud Era: New Use C...
Zero trust is increasingly a guiding principle for modern cybersecurity programs. With an ESG survey finding that for 51% of enterprise respondents it’s the top driver of adopting zero trust - ahead of reducing the number of cybersecurity incidents and supporting Digital Transformation - there’s no denying that zero trust is now central to cybersecurity modernization. You may ask: ‘Weren’t organizations starting to impl...
January 26, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
The Rise of Ransomware: Planning for Wh...
Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular business model for cybercriminals for years, it’s gaining relevance with supply chain attacks, and big game hunting - attacks on enterprises - are increasing. Graff, JBS, Colonial Pipeline and software manager Kaseya are just some of the businesses held to ransom recently. With Colonial pay...
January 19, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Deploy Yo...
The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.You’ll learn everything you need to know about implementation, including: Planning Validation Integration
November 9, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Design Yo...
This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including: Requirements Architectures Best practices
November 2, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Improving Management and Protection of...
Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments are being augmented by new technologies, including containers, software-defined storage, networking, and other capabilities. Operations are looking for ways to optimize all aspects of their virtual environment.In this webinar, we will discuss: Lessons about network traffic visibility...
October 5, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Back to Search Begin New Search