The Gigamon Platform includes hardware and software applications that provide intelligent network traffic visibility across on-premises, virtual and cloud environments.
GigaSECURE® is purpose-built to reduce architectural complexity, stop tool sprawl and contain costs. Deliver relevant network data to downstream inline threat prevention tools at the rate they can consume.
Power your tools to prevent threats. Stop intrusions before they start.
Gigamon and our partners solve your busines problems with best-of-breed network monitoring and security solutions.
The Gigamon Customer Support Portal is now part of the Gigamon Community. Customers can view and submit cases under “My Gigamon."
Gigamon empowers you to effectively manage, secure and understand all the data in motion across your networks. See how our customers are using our intelligent Gigamon Platform.
Our Resource Library collects industry insights, stories, videos, webinars, ebooks and more so you can better understand how pervasive visibility works in action.
Solution Brief: Investigate, hunt, detect and respond to threats with Gigamon Insight
Video: Moving to the Cloud with GigaSECURE®
Ovum Report: Gigamon offers a next-generation network packet broker for security
Gigamon is the company driving the convergence of networking and security. We help make more threats visible, deploy resources more efficiently and maximize performance of your network and security tools.
Gigamon Applied Threat Research Team
National Cybersecurity Awareness Month (NCSAM) kicks off today with its 15th annual drive to elevate cybersecurity to a national conversation. As I was thinking about this year’s NCSAM overarching theme — that cyber threats come in all shapes and sizes, and that to combat them it is our shared responsibility to work together to improve our nation’s cybersecurity — it occurred to me that cybersecurity really is a team sport.
Consider the actions that drive success for an NFL football team:
Evidence of this whole ecosystem can be seen on Sunday as teams huddle on the sidelines reviewing their plays on tablets to see what is working and where the gaps may be in their game. Think of this as the broad network visibility that is essential to win the game regardless of the size of the team.
The goal of the team, whether it is an NFL franchise, the federal government, our company or our family is to shift the power from the attacker to the defender — to move from defense to offense.
Now, as most sports fans realize, you also need a number of uncontrollable circumstances to all fall in your team’s favor. So yes, admittedly there is an element of luck on your side with referees making the right calls and the wind blowing your game-winning field goal attempt through the uprights; but without all the pieces in place, and the team working together, you will not be set up for optimal success.
I find that events like NCSAM are good reminders for those of us in the security industry that the term cybersecurity evokes a range of nightmare images and emotions depending upon your perspective.
The federal government has certainly made significant investments in this field, including the EINSTEIN and Continuous Diagnostic and Mitigation (CDM) programs, which work together — there’s the team theme again — to identify risks, prioritize responses based on potential impacts and enable cybersecurity personnel to mitigate the most significant problems first.
If all that feels confusing, that’s because it is. The football team understands the rules and the objectives of the game, yet it is often difficult to win on a regular basis (hello Browns fans!). Even at the enterprise level where there are teams of professionals working to insulate their companies from the persistent threat of an attack, there are so many tools that it is often difficult to sort out the clearest path to a secure environment.
At a fundamental level, cybersecurity best-practices need to be developed, communicated and enforced by SecOps and NetOps teams to ensure that the most obvious paths into the network are protected. It is equally important for internal teams to have the network visibility that’s essential to generate powerful intelligence and interpret powerful analytics, in addition to the ability to leverage this intelligence to help secure the enterprise.
On the personal side, I often think about how to best help protect my daughters from cyber ‘everything’ — from threats and theft to even stalking — as their generation is so deeply rooted in an open, sharing and digital lifestyle.
To help do our part to protect what is important to us, the NCSAM tool kit offers some very helpful tips that can be easily implemented to help improve personal cyber-safety. While they may seem like small steps, something as simple as preventing an email virus to propagate across your personal electronics is a huge step towards shifting the power back to the defenders.
As we move through NCSAM, the single most important message I’d like to leave you with is that we need to own our game plan for national and personal cybersecurity. It isn’t someone else’s problem, it is a shared responsibility with the entire team.
Learn more here: https://www.dhs.gov/national-cyber-security-awareness-month.
Follow and join the conversation using the hashtag #CyberAware.