SHARE
Security / October 27, 2020

ThreatINSIGHT 3.2 Reduces the Rising Risks in Today’s Rapidly Changing Environment

Momentum for Gigamon ThreatINSIGHT™ continues to grow since our September release, version 3.1. In this New Tomorrow world, we know enterprise IT is working tirelessly to support the reopening journey with new workplace policies, from WFH to social distancing workplaces. Some may say that these new policies have accelerated various planned digital transformation projects.

Either way, one thing that is certain during these uncertain times is that enterprise IT has been the key driver and at the frontline of supporting firms’ business continuity initiatives. As such, most of our customers are continuing to scale in their cloud journey, along with supporting an increasingly distributed workforce. Realizing that the risks to attack surfaces have simultaneously increased at this time in their journey, enterprise IT is seeking solutions that address their growing concerns about the security of various cloud computing solutions, greater risks of unauthorized access and constantly evolving threat vectors. In that context, we are proud to introduce Gigamon ThreatINSIGHT 3.2.

What’s New…

To continuously enhance security and reduce risks for our customers, ThreatINSIGHT 3.2 has the following highlighted features to help accelerate cloud migrations and other initiatives towards their reopening journey:

  • Unequaled cloud-based visibility: In ThreatINSIGHT 3.1, we addressed AWS cloud sensors along with Zscaler integration. For customers who plan to expand their multi-cloud flexibility virtually, 3.2 now supports native Azure and KVM hypervisor sensors.
  • High-fidelity behavioral-based detection: A popular early-stage threat tactic is to catalogue authentication/authorization privileges from directory services systems and map out accessible file shares and content. In ThreatINSIGHT 3.2, we add advanced detection techniques to identify suspicious behavior related to the enumeration of Active Directory and file shares. Identifying these behaviors early helps security professionals respond faster before adversaries can exfiltrate data at the next level.
  • Rapid, informed response: Whether it’s for threat hunting, investigating or addressing audits, ThreatINSIGHT 3.2 customers now have access to a year’s worth of ThreatINSIGHT metadata with the Bulk Data Export feature.

Featured Webinars
Hear from our experts on the latest trends and best practices to optimize your network visibility and analysis.

CONTINUE THE DISCUSSION

People are talking about this in the Gigamon Community’s Security group.

Share your thoughts today

RELATED CONTENT

CALCULATOR
Customers have saved millions in IT costs. How much can you save?
REPORT
Learn how 1,200 of your IT security peers plan to fight cyberattacks
DEMO
See how to finally achieve visibility to reduce costs and remove complexity
EBOOK
Four steps to become stronger during times of disruption

Back to top