Gigamon news stories

BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.

Migration
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.

Encryption
Why it's essential to focus on security fundamentals
Recently the U.S. White House released a statement citing intelligence reports indicating "… that the Russian government is exploring options for potential cyber-attacks."

Ransomware
How to prevent ransomware devastation
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.

Collaboration
Why doubling down on corporate defence works so well
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.

Cybersecurity
Gigamon unveils latest network detection and response solution
It's the first network detection and response solution on the market to provide 365-day rich network metadata retention.

Endpoint detection and response / EDR
Why network visibility must be the foundation of Zero Trust architecture
In May 2021, U.S. Presidential Executive Order 14028 on improving the nation’s cybersecurity was issued, directing federal agencies to transition to a Zero Trust Architecture (ZTA) as they modernise and move to cloud services.

Networks
What is network optimisation and why is it so important?
Network optimisation is an often-overlooked area of data security. At its most basic, a network is a system comprising two or more computers sharing resources, data and communications, with the goal of accomplishing essential tasks more quickly and effectively.

Compliance
Dark clouds on the horizon: How to close the gaps in cloud security
These days cloud security is more trusted than ever. According to a recent study in a survey of 2,000 IT leaders from around the globe, nearly 85% of respondents said that they trust cloud security practices as much as, or more than, those associated with their on-premises data infrastructures.

Cybersecurity
What is OT security and how does it differ from IT security?
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.

Cybersecurity
What exactly is 5G security, and why is it essential?
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.

Network monitoring
How cloud monitoring delivers both challenges and benefits
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms.

Internet of Things
Armis, Gigamon partnership to safeguard IoT devices against rising cloud threats
IoT devices have become an attractive attack target for cybercriminals, posing a significant and growing security risk as adoption increases.

Cloud Security
The three Rs of visibility for any cloud journey
Network-based telemetry is an essential component in securing the move to the cloud, writes Gigamon CTO Shehzad Merchant.

Cybersecurity
Three ways Shark Week mirrors cybersecurity marketing
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.

TLS
What Is TLS 1.2 — and why should we still care?
Gigamon country manager for A/NZ George Tsoukas takes a closer look at the history of cryptographic protocols.

DDoS
How to build resilience through the cloud in a post-pandemic world
Modern cloud architectures are moving from monolithic, tiered models to distributed microservices-based architectures, writes Gigamon CTO Shehzad Merchant.

Hybrid Cloud
How multi-cloud visibility ensures business continuity
One of the most common applications and use cases that we’ve seen for this capability is tracking the status of SSL/TLS certificates on the thousands of application and communication servers that make up an enterprise network.

Cloud
Gigamon & FireEye tackle security in hybrid cloud environments
The partnership is an extension to a ‘long-standing’ relationship that aims to ‘simplify, secure, and optimise hybrid cloud environments’.

Gartner
Three security essentials for financial services
Financial services organisations must provide the best possible customer experience in terms of mobile and online application availability, performance and security, writes Gigamon country manager for A/NZ George Tsoukas.

Gigamon
What cloud-native actually means
Although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing is.

Gartner
Why effective ROI messaging is critical for driving sales and adoption
ROI-focused communications can help with the approval for unbudgeted purchases and give customers the ability to proceed with two competing projects instead of choosing between them, writes Gigamon CFO Dave Arkley.

Remote Working
Back to the future: Enterprise edition
The pandemic accelerated the timeline of many organisations’ digital transformation journey from years down to months and as a result, cemented the need for the cloud.

Cloud
The ins and outs of cloud-native computing
For businesses and other organisations that want to get the most out of their approach to the cloud, cloud-native computing may provide the answer, writes Gigamon country manager for A/NZ George Tsoukas.