SHARE
Uncategorized / May 11, 2016

New Survey Identifies Requirements for an Effective Security Architecture

To better understand how real organizations are trying to ensure that information and systems are protected, Gigamon sponsored a study of 294 security professionals by SC Magazine in February 2016. The results might surprise you. Read the full article to find out more about the key findings and what they mean in light of new demands on cyber security.


Active Visibility. This blog series looks at critical cyber-security issues that can be mitigated or better managed by adopting new and innovative approaches to traffic visibility and monitoring. The ability to gain complete traffic visibility is essential to directing traffic to security appliances and solutions to optimize their effectiveness. In addition, there are new “best practices” to improve security through traffic monitoring for virtual and cloud infrastructure. This blog series will identify tactical as well as strategic issues around this topic. See past blogs – Blog #1 – Blog #2 – Blog #3 – Blog #4 – Blog #5 – Blog #6 – Blog #7 – Blog #8 – Blog #9 – Blog #10 – Blog #11 – Blog #12 – Blog #13 – Blog #14 – Blog #15 – Blog #16 – Blog #17 – Blog #18 – Blog #19 – Blog #20

Back to top