DataCenterNews Asia logo
Specialist data center news for Asia

Gigamon news stories

Story image
Ransomware
Malicious insiders still a key threat to business security
A new ransomware report from Gigamon has revealed that one in three organisations see malicious insiders as a route for ransomware attacks.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Migration
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Encryption
Why it's essential to focus on security fundamentals
Recently the U.S. White House released a statement citing intelligence reports indicating "… that the Russian government is exploring options for potential cyber-attacks."
Story image
Ransomware
How to prevent ransomware devastation
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
Story image
Collaboration
Why doubling down on corporate defence works so well
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Story image
Cybersecurity
Gigamon unveils latest network detection and response solution
It's the first network detection and response solution on the market to provide 365-day rich network metadata retention.
Story image
Endpoint detection and response / EDR
Why network visibility must be the foundation of Zero Trust architecture
In May 2021, U.S. Presidential Executive Order 14028 on improving the nation’s cybersecurity was issued, directing federal agencies to transition to a Zero Trust Architecture (ZTA) as they modernise and move to cloud services.
Story image
Networks
What is network optimisation and why is it so important?
Network optimisation is an often-overlooked area of data security. At its most basic, a network is a system comprising two or more computers sharing resources, data and communications, with the goal of accomplishing essential tasks more quickly and effectively.
Story image
Compliance
Dark clouds on the horizon: How to close the gaps in cloud security
These days cloud security is more trusted than ever. According to a recent study in a survey of 2,000 IT leaders from around the globe, nearly 85% of respondents said that they trust cloud security practices as much as, or more than, those associated with their on-premises data infrastructures.
Story image
Cybersecurity
What is OT security and how does it differ from IT security?
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.
Story image
Cybersecurity
What exactly is 5G security, and why is it essential?
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
Story image
Network monitoring
How cloud monitoring delivers both challenges and benefits
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms. 
Story image
Internet of Things
Armis, Gigamon partnership to safeguard IoT devices against rising cloud threats
IoT devices have become an attractive attack target for cybercriminals, posing a significant and growing security risk as adoption increases. 
Story image
Cloud Security
The three Rs of visibility for any cloud journey
Network-based telemetry is an essential component in securing the move to the cloud, writes Gigamon CTO Shehzad Merchant.
Story image
Cybersecurity
Three ways Shark Week mirrors cybersecurity marketing
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
Story image
TLS
What Is TLS 1.2 — and why should we still care?
Gigamon country manager for A/NZ George Tsoukas takes a closer look at the history of cryptographic protocols.
Story image
DDoS
How to build resilience through the cloud in a post-pandemic world
Modern cloud architectures are moving from monolithic, tiered models to distributed microservices-based architectures, writes Gigamon CTO Shehzad Merchant.
Story image
Hybrid Cloud
How multi-cloud visibility ensures business continuity
One of the most common applications and use cases that we’ve seen for this capability is tracking the status of SSL/TLS certificates on the thousands of application and communication servers that make up an enterprise network.
Story image
Cloud
Gigamon & FireEye tackle security in hybrid cloud environments
The partnership is an extension to a ‘long-standing’ relationship that aims to ‘simplify, secure, and optimise hybrid cloud environments’.
Story image
Gartner
Three security essentials for financial services
Financial services organisations must provide the best possible customer experience in terms of mobile and online application availability, performance and security, writes Gigamon country manager for A/NZ George Tsoukas.
Story image
Gigamon
What cloud-native actually means
Although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing is.
Story image
Gartner
Why effective ROI messaging is critical for driving sales and adoption
ROI-focused communications can help with the approval for unbudgeted purchases and give customers the ability to proceed with two competing projects instead of choosing between them, writes Gigamon CFO Dave Arkley.
Story image
Remote Working
Back to the future: Enterprise edition
The pandemic accelerated the timeline of many organisations’ digital transformation journey from years down to months and as a result, cemented the need for the cloud.