TelcoNews Asia - Telecommunications news for ICT decision-makers

Gigamon stories - Page 4

Gettyimages 1136625706

How modern IT architectures are moving beyond network visibility

Fri, 11th Nov 2022
#
uc
#
hybrid cloud
#
5g & beyond
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Gettyimages 957630020

Gigamon, Outcomex partner for stronger security architecture

Thu, 13th Oct 2022
#
partner programmes
#
breach prevention
#
gigamon
Deep observability company, Gigamon, has partnered with Outcomex, an Australian-based systems integrator that provides professional and managed services.
Giga

Gigamon announces further capabilities with GigaVUE 6.0

Wed, 12th Oct 2022
#
hybrid cloud
#
multi-cloud
#
breach prevention
GigaVUE 6.0, the software powering Gigamon Hawk, democratises security delivery across networking, security and cloud operations.
Gettyimages 1367731553

Gigamon named leading vendor in deep observability market

Wed, 5th Oct 2022
#
multi-cloud
#
breach prevention
#
gigamon
650 Group has published a report, recognising Gigamon as the leading vendor in the deep observability market for 2022.
Gettyimages 1388013584  1

Hybrid cloud security driving need for deep observability

Wed, 28th Sep 2022
#
hybrid cloud
#
multi-cloud
#
breach prevention
Gigamon is bringing application and network-level intelligence together to help network, security, and cloud IT operations teams eliminate security blind spots.
Gettyimages 926015836

How modern IT architectures are moving beyond network visibility

Tue, 27th Sep 2022
#
uc
#
migration
#
5g & beyond
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Gettyimages 857874124

Malicious insiders still a key threat to business security

Thu, 28th Jul 2022
#
malware
#
ransomware
#
advanced persistent threat protection
A new ransomware report from Gigamon has revealed that one in three organisations see malicious insiders as a route for ransomware attacks.
Compatible pic   ian farquhar

How zero trust can lead the battle against ransomware

Thu, 26th May 2022
#
malware
#
ransomware
#
breach prevention
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Pic   george tsuokas  3

Let's clear the cloud visibility haze with app awareness

Fri, 20th May 2022
#
migration
#
iaas
#
multi-cloud
Organizations embracing cloud computing face challenges with identifying applications and filtering traffic. A cloud suite can provide a solution.
Compatible pic   george tsuokas  3

Why it's essential to focus on security fundamentals

Wed, 27th Apr 2022
#
dr
#
encryption
#
mfa
The White House has issued comprehensive cybersecurity recommendations to protect against potential Russian cyber-attacks.
Pic   shane buckley 2022 smaller  1

Gigamon appoints Shane Buckley as president & CEO

Tue, 26th Apr 2022
#
hybrid cloud
#
digital transformation
#
breach prevention
Shane Buckley has been appointed as the new CEO of Gigamon, a leading cybersecurity company, as it aims to expand further in the deep observability market.
Gettyimages 1331943958

How to prevent ransomware devastation

Fri, 25th Mar 2022
#
malware
#
dr
#
ransomware
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
Gettyimages 1354205086

Why doubling down on corporate defence works so well

Thu, 3rd Mar 2022
#
uc
#
data analytics
#
martech
The security operations centre has come a long way since the early 2000s. It wasn't even called a SOC in those days.
Gettyimages 1331943958  3

Gigamon unveils latest network detection and response solution

Fri, 11th Feb 2022
#
data analytics
#
martech
#
planning
It's the first network detection and response solution on the market to provide 365-day rich network metadata retention.
Gettyimages 1157016421

Why network visibility must be the foundation of Zero Trust architecture

Tue, 25th Jan 2022
#
malware
#
data analytics
#
martech
US Presidential Executive Order 14028 directs federal agencies to transition to a Zero Trust Architecture for cybersecurity.
Gettyimages 1126117788

What is network optimisation and why is it so important?

Fri, 17th Dec 2021
#
network infrastructure
#
data analytics
#
martech
Network optimization is crucial for businesses in the digital age, enhancing security, productivity, and customer experience.
Gettyimages 1297147973

Dark clouds on the horizon: How to close the gaps in cloud security

Thu, 2nd Dec 2021
#
data analytics
#
martech
#
planning
Cloud security is more trusted than ever, but there are still gaps that need to be addressed. Find out what they are in this article.
Gettyimages 1018651722

What is OT security and how does it differ from IT security?

Thu, 18th Nov 2021
#
breach prevention
#
cybersecurity
#
gigamon
Let's consider what OT is, its relationship with IT, and the common problems people experience in working with it.
Gettyimages 1187729700

What exactly is 5G security, and why is it essential?

Fri, 22nd Oct 2021
#
uc
#
iot
#
5g & beyond
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
Gettyimages 1213867496

How cloud monitoring delivers both challenges and benefits

Tue, 12th Oct 2021
#
data analytics
#
martech
#
planning
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms.