SHARE
Security / October 3, 2022

Partner Spotlight: Gigamon and Trinity Cyber Collaborate to Reduce Organizational Cyber Risk

With a near-zero false-detection rate, Trinity Cyber provides superior protection for its customers. Trinity Cyber was founded in 2016 by Steve Ryan, the former Deputy Director of the Threat Operations Center for the United States National Security Agency (NSA). President Tom Bossert was Homeland Security Advisor to two U.S. presidents, serving as the chief risk officer and senior-most advisor on cybersecurity, homeland security, counterterrorism, and global health security policy.

We sat down with Pete Forno, Trinity Cyber’s vice president of sales, to discuss how Trinity Cyber’s partnership with Gigamon allows customers to see more, do more, and stop more with less.

Gigamon: Who is Trinity Cyber, and what is the company history?

Pete: Trinity Cyber invented and patented a technology that deeply inspects full-session internet traffic inline and modifies it to remove exploits and malware or prevent them from functioning. Our automated, precise session inspection and editing capabilities deliver better detection and defeat attacker tactics, techniques, and procedures (TTPs), which is vital to finding, beating, and preventing modern ransomware and other cyber threats.

Gigamon: Describe your company culture. What makes you tick?

Pete: At Trinity Cyber, we are hyper-focused on customers, our partners, and defeating bad guys. While cybersecurity challenges are constantly evolving and escalating, the breakthrough technology we’ve invented accurately identifies and prevents modern threats. We are redefining cybersecurity with a new approach, and we are on a continuous quest to enhance our technology with additional capabilities, provide better services to our customers, and enable our partners to enjoy faster and greater success.

Gigamon: If you had to describe Gigamon with just one word, what would it be?

Pete: Collaborative.

Gigamon: How do you see Trinity Cyber fitting together with Gigamon to solve your customers’ problems?

Pete: Gigamon’s emphasis on deep observability combined with Trinity Cyber’s unique threat detection, mitigation, and prevention capabilities are a compelling solution that delivers what customers really want and need: better security, dramatically fewer false positives, improved visibility, and significantly reduced alert fatigue and incident response. Our solution allows our customers to see more, do more, and stop more with less!

Gigamon: What are some of your market’s specifics, advantages, and challenges when it comes to network security and visibility?

Pete: Today’s cybercriminals and nation-state cyberattacks are alarmingly successful, as the modern methods they employ enable their attacks to evade detection from traditional security infrastructure. The ability to detect and defeat TTPs is vital to finding, beating, and actually preventing modern cyber threats.

Trinity Cyber invented a new technology, delivered to customers as a managed service, that deeply and contextually inspects and modifies internet traffic in an automated way to detect, mitigate, and prevent threats — especially those that others miss. It removes obfuscation that often fools other security products and exposes the attacker’s TTPs, specific tools, common vulnerabilities and exposures (CVEs), and other content critical to not just alerting but also neutralizing the attack.

Pete Forno, Vice President of Sales at Trinity Cyber

Since attacker TTPs cannot be blocked, more precise and nuanced approaches beyond block and alert are necessary. Trinity Cyber created modify, remove, and replace actions to precisely neutralize attacker tools, TTPs, and malware. As a result, entire categories and families of individual threats and many CVEs are defeated and prevented from fully executing at their root.

With a near-zero false detection rate, cyber threats and attacks in both directions are consistently identified, thwarted, and prevented, providing superior protection, slashed false positives, and dramatically reduced incident response workload.

Gigamon: Which Gigamon features stand out the most and make the product outstrip its competitors?

Pete: A complete and uniform solution for physical, virtual, or hybrid environments. The Gigamon inline capabilities are superior and a key differentiator, as are the wide array of GigaSMART® features that allow for intelligent traffic selection.

Gigamon: What’s an anecdote that customers share when they talk about our joint solution?

Pete: Gigamon and Trinity Cyber have a joint customer who employed a comprehensive set of cybersecurity tools (NGFW, IPS, EDR). We deployed jointly with Gigamon and within hours started detecting and preventing threats that the other solutions were missing. The customer said of the deployment, “We achieved immediate ROI on day one!”

Gigamon: What is the most memorable moment associated with Gigamon as a partner?

Pete: Presenting jointly with Gigamon at Cisco Live was a highlight. Together, we met with customers and potential customers and collaboratively shared ideas on how to make their networks better.

Gigamon: What are the wow moments associated with Gigamon?

Pete: When we first started talking about a partnership, what we could do together was theoretical. When we deployed Gigamon in our lab, on the very first day we all saw what was possible. That was a wow moment.

Seeing everything working together and aligned towards our common goal was an awesome experience. Another wow moment was hearing feedback from our first joint customers about the cooperation of our two companies and what the joint solution means to them and their business.

Gigamon: What are some of the new challenges you see in the market that the partnership with Gigamon can solve?

Pete: Trinity Cyber and Gigamon together offer improved visibility with better security against modern threats. Customers can automatically mitigate and prevent threats by detecting and defeating attacker TTPs. Our joint solution greatly reduces false positives, which in turn dramatically reduces alert fatigue and incident response work.

Gigamon: What are the positive business outcomes as a Gigamon alliance partner?

Pete: One of our main missions as a company is to stop bad actors from damaging our customers’ businesses and networks. We require access to network traffic to be able to do that; Gigamon provides that access in a complete and efficient manner. Together, we can make a true positive impact for our customers in a way that’s never been possible before. It’s a game changer.

Gigamon: What unique capabilities does this partnership bring to our joint business?

Pete: I think it brings a fresh vector or approach to discussions with customers about cybersecurity. We’re able to deliver superior visibility and actual threat prevention, and our combined solution yields a differentiated offer and capabilities that competitors cannot match. I’d say it’s the first significant advancement in cybersecurity in over a decade.

Gigamon: Who is the target audience (such as SecOps, NetOps, or DevOps) for our joint solution, and how do they benefit?

Pete: Our solution is of interest to CISOs, CIOs, and SecOps. Together, Trinity Cyber and Gigamon deliver a compelling solution that reduces organizational cyber risk, delivers better security and visibility, decreases false positives, and reduces incident response.

Gigamon: Which verticals/segments are the best target companies, or where we have seen success and why?

Pete: Our joint solution is horizontally applicable across most verticals, as all sectors are struggling with cyberattacks, ransomware, data exfiltration, and the like. However, specific target segments include critical infrastructure (such as utilities), higher education, federal and SLED agencies, finance, healthcare, and transportation.

Gigamon: Thank you, Pete, for making time for us and for being such a wonderful partner.

CONTINUE THE DISCUSSION

People are talking about this in the Gigamon Community’s Security group.

Share your thoughts today

RELATED CONTENT

REPORT
2022 Ransomware Defense Report
WEBINAR
Unlock Ultimate Hybrid Cloud Security: Join Nutanix for Insights
REPORT
2022 TLS Trends Data
WEBPAGE
Suddenly, Ransomware Has Nowhere to Hide

Back to top