DataCenterNews Asia Pacific - Specialist news for cloud & data center decision-makers

Gigamon stories - Page 1

Story image
Gigamon helps tech teams and customers at Wyndham ANZ properties
Last month
#
hyperscale
#
aws
#
cybersecurity
"Gigamon ThreatINSIGHT exceeded our requirements of providing robust visibility to activity on our network, delivering high-fidelity detections, and removing distractions from our team."
Story image
How modern IT architectures are moving beyond network visibility
Last month
#
hybrid cloud
#
5g
#
gigamon
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Story image
Gigamon, Outcomex partner for stronger security architecture
Thu 13 Oct 2022
#
managed services
#
breach prevention
#
gigamon
Deep observability company, Gigamon, has partnered with Outcomex, an Australian-based systems integrator that provides professional and managed services.
Story image
Gigamon announces further capabilities with GigaVUE 6.0
Wed 12 Oct 2022
#
cloud
#
hybrid cloud
#
multi-cloud
GigaVUE 6.0, the software powering Gigamon Hawk, democratises security delivery across networking, security and cloud operations
Story image
Gigamon named leading vendor in deep observability market
Wed 5 Oct 2022
#
multi-cloud
#
breach prevention
#
gigamon
650 Group has published a report, recognising Gigamon as the leading vendor in the deep observability market for 2022.
Story image
Hybrid cloud security driving need for deep observability
Wed 28 Sep 2022
#
hybrid cloud
#
cybersecurity
#
multi-cloud
Gigamon is bringing application and network-level intelligence together to help network, security, and cloud IT operations teams eliminate security blind spots.
Story image
How modern IT architectures are moving beyond network visibility
Tue 27 Sep 2022
#
cloud
#
migration
#
cybersecurity
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Story image
Malicious insiders still a key threat to business security
Thu 28 Jul 2022
#
ransomware
#
malware
#
cybersecurity
A new ransomware report from Gigamon has revealed that one in three organisations see malicious insiders as a route for ransomware attacks.
Story image
How zero trust can lead the battle against ransomware
Thu 26 May 2022
#
malware
#
ransomware
#
byod
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Let’s clear the cloud visibility haze with app awareness
Fri 20 May 2022
#
cloud
#
migration
#
cybersecurity
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Why it's essential to focus on security fundamentals
Wed 27 Apr 2022
#
dr
#
encryption
#
breach prevention
Recently the U.S. White House released a statement citing intelligence reports indicating "… that the Russian government is exploring options for potential cyber-attacks."
Story image
How to prevent ransomware devastation
Fri 25 Mar 2022
#
dr
#
ransomware
#
malware
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
Story image
Why doubling down on corporate defence works so well
Thu 3 Mar 2022
#
uc
#
bi
#
big data
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Story image
Gigamon unveils latest network detection and response solution
Fri 11 Feb 2022
#
bi
#
big data
#
data analytics
It's the first network detection and response solution on the market to provide 365-day rich network metadata retention.
Story image
Why network visibility must be the foundation of Zero Trust architecture
Tue 25 Jan 2022
#
malware
#
bi
#
big data
In May 2021, U.S. Presidential Executive Order 14028 on improving the nation’s cybersecurity was issued, directing federal agencies to transition to a Zero Trust Architecture (ZTA) as they modernise and move to cloud services.
Story image
What is network optimisation and why is it so important?
Fri 17 Dec 2021
#
bi
#
big data
#
network infrastructure
Network optimisation is an often-overlooked area of data security. At its most basic, a network is a system comprising two or more computers sharing resources, data and communications, with the goal of accomplishing essential tasks more quickly and effectively.
Story image
Dark clouds on the horizon: How to close the gaps in cloud security
Thu 2 Dec 2021
#
cloud
#
bi
#
big data
These days cloud security is more trusted than ever. According to a recent study in a survey of 2,000 IT leaders from around the globe, nearly 85% of respondents said that they trust cloud security practices as much as, or more than, those associated with their on-premises data infrastructures.
Story image
What is OT security and how does it differ from IT security?
Thu 18 Nov 2021
#
cybersecurity
#
breach prevention
#
it
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.
Story image
What exactly is 5G security, and why is it essential?
Fri 22 Oct 2021
#
cybersecurity
#
iot
#
5g
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
Story image
How cloud monitoring delivers both challenges and benefits
Tue 12 Oct 2021
#
bi
#
data analytics
#
martech
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms. 
Story image
Armis, Gigamon partnership to safeguard IoT devices against rising cloud threats
Mon 4 Oct 2021
#
iot
#
breach prevention
#
gigamon
IoT devices have become an attractive attack target for cybercriminals, posing a significant and growing security risk as adoption increases. 
Story image
The three Rs of visibility for any cloud journey
Fri 17 Sep 2021
#
devops
#
digital transformation
#
cloud security
Network-based telemetry is an essential component in securing the move to the cloud, writes Gigamon CTO Shehzad Merchant.
Story image
Three ways Shark Week mirrors cybersecurity marketing
Tue 24 Aug 2021
#
cybersecurity
#
breach prevention
#
gigamon
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
Story image
What Is TLS 1.2 — and why should we still care?
Fri 23 Jul 2021
#
cybersecurity
#
breach prevention
#
gigamon
Gigamon country manager for ANZ George Tsoukas takes a closer look at the history of cryptographic protocols.
© 2022 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.