Selecting Security Tools: Smart Network Segmentation and Intelligent Tool Routing

As mentioned in my last blog, the first step to solving the security tool selection problem is asking the right questions and taking inventory of exactly what you do. For…

Read Full Article

An Industry In Transition: Key Tech Trends In 2018

It’s the time of the year where everyone makes predictions for the following year. But rather than focus on predictions, I’d like to zero in on long-term trends that will…

Read Full Article

Selecting Security Tools Based on Your Unique Network and Business Challenges

Pop quiz! Which of these sounds familiar? My security tools create false positives. My security operations (SecOps) team is overwhelmed by a high volume of security alarms. I’m not sure…

Read Full Article

Linux vs. Windows OS in the Public Cloud – Which Is More Secure for Your Critical Applications?

Enterprises are increasingly migrating mission-critical applications to the public cloud, which provides the advantages of on-demand scale and elasticity. While Linux has been the predominant cloud OS – largely due…

Read Full Article

Security Leaders Convened in NYC for Second Annual Cybersecurity Summit

At our second annual NYC Cybersecurity Summit in Manhattan, Gigamon hosted more than 150 security professionals and 10 of our top ecosystem partners for a program that focused on the…

Read Full Article
SHARE