SlideShare a Scribd company logo
THE ESSENTIAL  ELEMENT OF YOUR SECURITY
Gigamon Cyber Security Roadshow
THAILAND
Date: 16th May 2018
Venue: ETDA (Electronic Transactions Development Agency)
Welcome Address
Mona Yam
Regional Sales Director
Gigamon
4©2018 Gigamon. All rights reserved.
Time Agenda Speaker
1:10 – 1:50 pm Top Cyberthreats and The Road Ahead Graham Melville
Sr. Director, Security Solutions
Gigamon
1:50 – 2:35 pm Customer Use Case Daniel Ong
Channel Account Manager
Gigamon
2:35 – 2:55 pm Networking and Tea Break
2:55 – 3:45 pm Power Your Tools to Prevent Threats Koay Choon Ping
Sales Engineer, South East Asia
Gigamon
3:45 – 4:05 pm Q&A Session
4:05 – 4:15 pm Closing Remarks Mona Yam
Regional Sales Director
Gigamon
Agenda

Recommended for you

Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security

In this webinar, you'll learn about the foundational security blocks and how to start using them effectively to create robust and secure architectures. Discover how Identity and Access management is done and how it integrates with other AWS services. In addition, learn how to improve governance by using AWS Security Hub, AWS Config and CloudTrail to gain unprecedented visibility of activity in the account. Subsequently use AWS Config rules to rectify configuration issues quickly and effectively.

security-webinars-2019
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security

The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. Security for AWS is about three related elements: visibility, auditability, and control. You have to know what you have and where it is before you can assess the environment against best practices, internal standards, and compliance standards. Controls enable you to place precise, well-understood limits on the access to your information. Did you know, for example, that you can define a rule that says that “Tom is the only person who can access this data object that I store with Amazon, and he can only do so from his corporate desktop on the corporate network, from Monday-Friday 9-5 and when he uses MFA?”. That’s the level of granularity you can choose to implement if you wish. In this session, we’ll cover these topics to provide a practical understanding of the security programs, procedures, and best practices you can use to enhance your current security posture. Speakers: Rob Whitmore, AWS Solutions Architect

awseventsaws-summit-london-2015
Azure WAF
Azure WAFAzure WAF
Azure WAF

Azure WAF is a cloud-native web application firewall service that provides powerful protection for web apps with simple deployment, low maintenance costs, and automatic updates. It acts as a content delivery network and can defend against common attacks like command execution, SQL injection, cross-site scripting, and more, as demonstrated in a presentation where custom rules were set up to create an Azure WAF.

azureweb app firewallcloud security
Top Cyberthreats and The Road Ahead
Graham Melville
Senior Director, Security Solutions
Gigamon
6©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
7©2018 Gigamon. All rights reserved.
• 27-question online survey conducted in Nov. 2017
– IT security decision maker or practitioner
– Employed by organization with at least 500 employees
• Survey designed to assess:
– Organization’s security posture
– Perceptions of cyberthreats and IT security challenges
– Current and future IT security investments
– IT security practices and strategies
About The Cyberthreat Defense Report
7
8©2018 Gigamon. All rights reserved.
Survey Demographics
8
Respondents by employee countRespondents by country
1,200 respondents | 17 countries | 19 industries

Recommended for you

[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl

An expert in mobile network security provided a summary of hacking 5G networks. Some key points include: 1) Standard IT security techniques uncovered issues when applied to upgraded legacy 4G networks, such as unpatched operating systems, weak configurations, and lack of encryption. 2) Future 5G networks introduce new security risks due to increased complexity from virtualization and automation layers, as well as a continuously evolving attack surface extending into cloud infrastructure. 3) Red team exercises show that hacking mobile networks has become a multi-step process, where initial access through one vulnerability can enable lateral movement and privilege escalation to compromise critical systems or customer data.

Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212

This document summarizes a security analyst toolset workshop. It lists various online tools and services for security analysis tasks like investigating file samples, hashes, domains, IPs, and extracting strings. Tools covered include URL scanners, passive DNS tools, Shodan, Virustotal, hybrid analysis, Any.Run, Cybereason Iris, Antivirus event analysis, and more. Twitter, pastebin, and other open sources are also mentioned for threat hunting and monitoring.

analysisdfirinformation security
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks

This document discusses strategies for protecting applications from DDoS and bot attacks using AWS and F5 technologies. It outlines common external threats such as SQL injection and SYN floods. It then describes AWS services like Shield Standard, Shield Advanced, WAF, and Firewall Manager that provide detection, mitigation and protection capabilities. The benefits of these services include automatic protection, custom rule creation, access to response teams, and central management. It also outlines F5's managed security solutions for bot protection, threat intelligence and firewall management that are designed for multi-cloud environments.

ddos-hk-webinar-f5hk-webinar-series
9©2018 Gigamon. All rights reserved.
Breaches are Inevitable
Organizations are falling victim to
cyberattacks at an alarming rate …
Percentage compromised at least
once, by country
10©2018 Gigamon. All rights reserved.
Pessimism is the New Reality
… and they are expecting
more of the same in 2018.
Likelihood of successful attack
Percentage who believe a successful
cyberattack is more likely than not, by country
11©2018 Gigamon. All rights reserved.
Challenges
URGENCY
COMPLEXITYSPEED
COST
SKILLS
SHORTAGE
12©2018 Gigamon. All rights reserved.
A Skills Shortage Is The Top Issue
‘Lack of skilled personnel’ edges out ‘Low security
awareness among employees’ for the first time in
five years!

Recommended for you

An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)

The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.

security operation centersoc
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security

The document discusses how F5 networks provides comprehensive web application security through its full-proxy architecture and web application firewall that protects against common attacks like SQL injection, cross-site scripting, and brute force attacks. It also explains how the F5 solution uses a positive security model to allow wanted transactions while denying everything else, providing implicit security against both known and unknown attacks.

Cloud Security
Cloud SecurityCloud Security
Cloud Security

The document discusses cloud security and compliance. It defines cloud computing and outlines the essential characteristics and service models. It then discusses key considerations for cloud security including identity and access management, security threats and countermeasures, application security, operations and maintenance, and compliance. Chief information officer concerns around security, availability, performance and cost are also addressed.

awsaws community daycloud
13©2018 Gigamon. All rights reserved.
IT Security Skills Shortage
IT security admins, analysts, and
architects are in highest demand.
14©2018 Gigamon. All rights reserved.
The Speed Issue
Too much data to analyze continues to be a
major issue for organizations.
15©2018 Gigamon. All rights reserved.
The Data-in-Motion Dilemma
VOLUME + SPEED + THREATS = COMPLEXITY + RISK + COST
*Cisco Global Cloud Index 2016.
**Statista Global machine-to-machine (M2M) data traffic from 2014 to 2019 (in petabytes per month)
Time
Volume
Network Data
Security Tool
Security tools do not
scale as fast as data
Data Center
transition to 100GbEmergence
of Big Data
Internet
of Things
Machine to
Machine
4.7ZB of global data
center traffic in 2016*
1.7PB of M2M
traffic in 2017**
6.7 ns available to
process a network
packet on a 100Gb link
16©2018 Gigamon. All rights reserved.
Complexity
Too many product, Too hard to
manage, No interoperability.

Recommended for you

cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture

The document outlines a cybersecurity reference architecture that provides: 1. Active threat detection across identity, apps, infrastructure, and devices using tools like Azure Security Center, Windows Defender ATP, and Enterprise Threat Detection. 2. Protection of sensitive data through information protection, classification, and data loss prevention tools. 3. Management of identity and access to securely embrace identity as the primary security perimeter.

cyber-securityitcloud computing
Cloud security
Cloud security Cloud security
Cloud security

This document outlines an agenda for discussing cloud security. It begins with an introduction to cloud computing and deployment models. It then discusses challenges of cloud computing and why cloud security is important. Specific threats like data breaches and account hijacking are listed. The document reviews the shared responsibility model and scope of security in public clouds. It describes cloud security penetration testing methods like static and dynamic application testing. Finally, it provides prerequisites and methods for conducting cloud penetration testing, including reconnaissance, threat modeling, and following standard testing methodologies.

securityinformation securitysecurity news
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection

F5 provides both on-premises and cloud-based DDoS protection solutions. Their hybrid approach mitigates attacks at the network, transport, and application layers using hardware-accelerated detection and filtering of over 110 DDoS vector types. Key capabilities include comprehensive L3-L7 protection, multi-terabit cloud scrubbing, and integration of network firewall and web application firewall technologies to strengthen security and ensure application availability even during large DDoS attacks.

17©2018 Gigamon. All rights reserved.
CYBERscape: The Cybersecurity Landscape. Source: Momentum Partners. https://momentumcyber.com/docs/CYBERscape.pdf
18©2018 Gigamon. All rights reserved.
Urgency - Vulnerability Patching Challenges
‘Infrequent patching windows’ and ‘lack of qualified
personnel’ inhibit organizations from patching more
rapidly.
19©2018 Gigamon. All rights reserved.
Rising IT Security Budgets
In response, enterprises are increasing their
security budgets by 4.7% in 2018, globally.
By country:
By industry:
By size:
20©2018 Gigamon. All rights reserved.
2018 Cyberthreat Defense Report, CyberEdge Group, 2018
Costs
FIREWALL
IDS
IPS
NAC
ANTI-MALWARE
DLP
WAF
NEXTGEN FW
NBA
NAT
EMAIL SECURITY
APT
FIREWALL
ANTI VIRUS
Budgets are rising but can they
keep up with the increasing need?

Recommended for you

F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security

The document discusses web application security and the F5 BIG-IP Application Security Manager (ASM). It notes that most attacks are now targeted at web applications rather than networks. It then provides an overview of common web application attacks that ASM can protect against. The document discusses how ASM uses a positive security model to provide implicit protection against both known and unknown attacks. It also outlines the various deployment options and protections that ASM provides, such as bot detection, DDoS mitigation, and web application firewall capabilities.

Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx

This document provides an overview of building secure cloud architecture. It discusses cloud characteristics and services models like IaaS, PaaS, and SaaS. It also covers the shared responsibility model between providers and customers. Additional topics include compliance requirements, privacy basics, architecting for availability, network separation, application protection, identity and access management, monitoring tools, log management, and containers security. The document aims to educate readers on best practices for securely designing cloud infrastructure and applications.

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview

Palo Alto Networks produces next-generation firewalls that can identify applications inside encrypted traffic and allow fine-grained security policies based on applications rather than just ports. The document discusses Palo Alto Networks' products including their firewall appliances of various sizes, their management platform Panorama, their cloud-based malware analysis service WildFire, and their VPN client GlobalProtect. It presents the advantages of the company's approach over traditional firewalls that cannot inspect encrypted traffic or apply policies based on application identification.

21©2018 Gigamon. All rights reserved.
Cyberthreat Hunting Investments
Only a third of respondents are
fully confident in their cyberthreat
hunting investments.
22©2018 Gigamon. All rights reserved.
Security Fundamentals Are Changing
A NEW APPROACH TO SECURITY IS REQUIRED
URGENCYCOMPLEXITYSPEED COSTSKILLS
SHORTAGE
Time to detection and
Time to containment
are too slow
Breaches
continue to happen
23©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
24©2018 Gigamon. All rights reserved.
Internet
Public
Cloud
✕ To many products not enough staff
✕ Hard to keep up with increasing network
speed
✕ Complex with significant blind spots
✕ Difficult to patch security devices
✕ Extraordinary costs
✕ Contention for access to traffic
✕ Inconsistent view of traffic
✕ Too many false positives
✕ Blind to or high cost for encrypted traffic
Challenges with Security Deployments
VISIBILITY LIMITED TO A POINT IN TIME OR PLACE
User Behavior
Analytics
Advanced
Persistent
Threat
Email Threat
Detection
SIEM
Next-Generation
Firewall
Data Loss
Prevention
SIEM
Data Loss
Prevention
User Behavior
Analytics
Next-Generation
Firewall
Advanced
Persistent
Threat
Email Threat
Detection
Data Loss
Prevention
Next-Generation
Firewall
Email Threat
Detection
Advanced
Persistent
Threat
SIEM
User Behavior
Analytics
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
Poor architectural choices will lead to poor results!

Recommended for you

Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language

MITRE ATT&CK is quickly gaining traction and is becoming an important standard to use to assess the overall cyber security posture of an organization. Tools like ATT&CK Navigator facilitate corporate adoption and allow for a holistic overview on attack techniques and how the organization is preventing and detecting them. Furthermore, many vendors, technologies and open-source initiatives are aligning with ATT&CK. Join Erik Van Buggenhout in this presentation, where he will discuss how MITRE ATT&CK can be leveraged in the organization as part of your overall cyber security program, with a focus on adversary emulation. Erik Van Buggenhout is the lead author of SANS SEC599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses. Next to his activities at SANS, Erik is also a co-founder of NVISO, a European cyber security firm with offices in Brussels, Frankfurt and Munich.

att&ckcyber securitysans
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native Security

This document discusses cloud-native security and the challenges of securing containerized and microservices-based applications in cloud environments. It outlines a maturity model for cloud-native security with stages like image acceptance, least privilege at runtime, container immutability, and immediate incident response. The document also provides checklists and best practices for securing Kubernetes clusters, container images, and the container build pipeline to help bridge the gap between development, operations, and security in cloud-native applications.

cloud native securityaqua securityinformation security
Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform

This document discusses the need for security delivery platforms to provide comprehensive network visibility. It notes that traditional security deployments have significant blind spots and challenges scaling to modern network traffic speeds and volumes. A security delivery platform provides targeted network traffic inspection, metadata extraction and decryption to optimize existing security tools and enable more effective threat detection and response. Continuous visibility into all network traffic is presented as a foundational requirement for effective security monitoring.

security deliverysecurity delivery platform
25©2018 Gigamon. All rights reserved.
• With this approach, you:
– Detect and block threats immediately
– Deploy and operate transparently, aka “Bump on the wire” or “Layer 2 mode”
• No need to change routing configurations or endpoints
• But it introduces challenges for both network and security teams:
– Introduces multiple points of failure
– Physical interfaces must match the network
– Degrades network and application performance
– Wastes cycles on traffic it cannot analyze
– Does not scale to network speeds
– Disruptive to upgrade or replace
– Cannot be moved to or from out-of-band operation (detection vs. prevention)
– Asymmetric routing of traffic circumvents tools’ ability to inspect whole sessions
IPS = Intrusion Prevention System; WAF = Web Application Firewall; ATP = Advanced Threat Prevention
Inline Prevention Security Tools
WAN router
Firewall
IPS
WAF
Core switch
ATP
26©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
27©2018 Gigamon. All rights reserved.
GigaSECURE® Security Delivery Platform
THE WORLDS LEADING NEXT GENERATION NETWORK PACKET BROKER
Internet
Public
Cloud
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
Isolation of
applications for
targeted inspection
Visibility to
encrypted traffic for
threat detection
Inline bypass for
connected security
applications
A complete
network-wide reach
Scalable metadata
extraction for
improved forensics
Security Delivery Platform
Next-Generation
Firewall
User Behavior
Analytics
Data Loss
Prevention
Email Threat
Detection
Advanced
Persistent Threat
SIEM
Security Delivery Platform
Isolation of
applications for
targeted inspection
Visibility to
encrypted traffic for
threat detection
Inline bypass for
connected security
applications
A complete
network-wide reach:
physical and virtual
Scalable metadata
extraction for
improved forensics
Physical, Virtual
and Cloud
Metadata
Generation
Application
Session Filtering
SSL
Decryption
Inline
Bypass
On-premise
Data Center
Remote
Sites
Public
Cloud
Cisco ACI Private
Cloud
28©2018 Gigamon. All rights reserved.
Super Charge Existing SOC/ NOC
• Centralized tools
• Traffic backhauled to
centralized tools
• Full traffic flows
• NetFlow/IPFIX flow records
• Metadata of interest
• De-duplicate before
backhaul
• Ideal for both service
providers & enterprises
Security Operations / Network Operations
GigaVUE-HC2GigaVUE-HD8
Remote Site
GigaVUE-HC1
Remote Site
GigaVUE-HC1
Remote Site
GigaVUE-HC1

Recommended for you

Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security

Presentation from Scalar-Gigamon Roundtable, March 10th Toronto, "Visibility and Automation for Enhanced Security".

scalar decisionsgigamon. patmisasiit security
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec

This document discusses network security implications of increased cloud usage and adoption of cloud applications. It identifies key challenges such as rogue cloud app use creating security and compliance issues, backhauling all traffic being costly and slowing performance, and encrypted traffic blinding traditional defenses. It proposes using a cloud-based proxy that can securely decrypt, inspect, and accelerate traffic to address these challenges by providing threat prevention, DLP enforcement, browser isolation, and other advanced security techniques on direct connections to the cloud.

cloud securitycsacloud
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec

Symantec is pitching their data protection solutions to SecureData. They discuss how data is growing exponentially and how data breaches can be very costly. Symantec presents their solutions like DLP, ICE, and CASB that can discover, monitor, and protect data across networks, endpoints, cloud apps, and storage. They demonstrate how their technologies work together using encryption and access controls to secure data wherever it resides. Symantec also discusses upcoming integrations between their SEP and DLP products to provide more comprehensive data protection.

29©2018 Gigamon. All rights reserved.
Ready for Future Multi-cloud: Hybrid Cloud Visibility
PRESERVE TOOL INVESTMENT
Web
tier
App
tier
Azure Load
Balancing
Azure Load
Balancing
Azure SQL
Database
Virtual Network
Visibility tier
Tool
tier
Availability Zone
Region
Web
tier
Elastic Load
Balancing
App
tier
Elastic Load
Balancing
Amazon
RDS
Visibility tier
Tool
tier
Amazon
CloudWatch
On-Premises Data Center
Azure API
Management
Tool
Tier
GigaVUE-FM
TunnelingTunneling
30©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
31©2018 Gigamon. All rights reserved.
Based on 2017 Fortune list and customer data from Q1 2018, Fortune is part of Time Inc.
Top Lists based on FY2016 data.
“Top 50 Banks in the World," Banks around the World. June 30, 2016. Retrieved from: http://www.relbanks.com/worlds-top-banks/assets
Laura Lorenzetti, "The 10 biggest health-care companies in the Fortune 500," Fortune, June 20, 2015. Retrieved from: https://gigamon.my.salesforce.com/00O14000008ef5s
Data Set: Top US Government Agencies by Contract Spending (FY 2016), GovWin from Deltek. Accessed Feb. 7, 2017.
Samantha Sharf, "The World's Largest Tech Companies: Apple Beats Samsung, Microsoft And Alphabet," Forbes, May 26, 2016. Retrieved from:
http://www.forbes.com/sites/samanthasharf/2016/05/26/the-worlds-largest-tech-companies-2016-apple-bests-samsung-microsoft-and-alphabet/#ed4f6fc89ee4
"Stores Top Retailers 2016," Kantar Retail, National Retail Federation, 2016. Retrieved from: https://nrf.com/resources/annual-retailer-lists/top-100-retailers/stores-top-retailers-2016
"The World's Biggest Public Companies," Forbes, June 2, 2016. Retrieved from: https://en.wikipedia.org/wiki/List_of_telephone_operating_companies
Who Deploys Gigamon?
MANY OF THE WORLD’S LEADING ORGANIZATIONS INCLUDING:
32©2018 Gigamon. All rights reserved.
As of Feb 2017
Gigamon Customers
SERVICE PROVIDERFEDERAL
TECHNOLOGY
GENERAL
ENTERPRISE / MISC
RETAIL /
SERVICES FINANCE
HEALTHCARE
/INSURANCE
ENTERPRISE

Recommended for you

Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?

The document discusses the benefits of network forensics and security analytics solutions. It describes how an online gaming company struggled to determine if they were breached due to lacking network visibility. It then outlines how security analytics can provide complete network visibility by passively capturing all network traffic and enriching it with threat intelligence to help speed incident detection and response. The document advocates that organizations should retain at least 30 days of network traffic data for investigations. It also describes how security analytics works and the different deployment options available. Real customer examples are then provided where advanced threat assessments uncovered security issues and helped customers strengthen their security posture.

cyber threatscybersecurityadvanced threat protection
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada

The document discusses the need for cloud security solutions as cloud usage increases. It summarizes that the way people work has changed with access from any device at any time. More sensitive data is now stored in the cloud exposing it to new risks. It then provides an overview of the Netskope cloud security platform, highlighting its capabilities including visibility, data security, compliance, threat protection and ability to govern sanctioned and unsanctioned cloud applications and web usage from a single interface. Sample customers and use cases that Netskope addresses are also summarized.

2018ciberseguridadcsoc
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security

This document discusses how network metadata can be leveraged to improve security analytics and threat detection. As network speeds increase, it is difficult for security tools to keep up and analyze all transmitted data. However, metadata extracted from the network can provide important context like user and device information, DNS queries, and SSL data to help security tools more efficiently detect threats. The document proposes that Gigamon's metadata engine and Security Delivery Platform can extract and provide this metadata to various security tools, allowing them to build up context and identify threats faster through analytics.

seimipfixnetflow
33©2018 Gigamon. All rights reserved.
SERVICE PROVIDERFEDERAL
TECHNOLOGY
GENERAL
ENTERPRISE / MISC
RETAIL /
SERVICES FINANCE
HEALTHCARE
/INSURANCE
ENTERPRISE
Customer data as of Q1 2018
Gigamon Customers
2,800+
End Customers
34©2018 Gigamon. All rights reserved.
34
Case Study
• Reduced Cost: $20M+ in TCO savings with GigaSECURE architecture
• Mitigated Risk to ‘Build with Confidence’: Helped bank identify network
assets and proactively solve deployment issues upfront
• Faster Time to Response: Reduced a 5-day P1 incident by 95% preventing
reputation loss, avoiding bad publicity and increasing customer experience
RESULTS
• Key security initiatives (IPS, APT, Email Protection) to protect customers and meet
security compliance requirements were costing significant CAPEX
• Big concerns about adding prevention tools inline due to network resiliency
concerns and environment complexity
• Limited network visibility for security detection and threat hunting initiatives,
leading to poor ROI / outcomes with existing toolsets
CHALLENGE
• Two-part solution:
• Ph. 1: Leverage Inline Bypass for prevention tools in core network
• Ph. 2: Feed data from data centers, edge to to out-of-band detection tools
SOLUTION
Overview
• Large international bank
serving 13 million
customers
• Decided to in-house
security after many years
of outsourcing challenges
35©2018 Gigamon. All rights reserved.
35
Case Study
• Maximize uptime: Deployed IPS with minimal production changes
• Increased operational agility with decreased risk: Ability to switch
between IPS and IDS modes instantaneously
• Investment protection: Roadmap for future expansion with GigaSMART
functionality such as SSL, de-duplication, NetFlow
RESULTS
• High cost and potential impact from traffic volume of IDS/IPS deployment
in new data center
• Desire to deploy Cisco Firepower and FireEye NX but resistance to
deploy inline
• Wanted future-proof solution, fault tolerant with High Availability
• 18 month project initially with 7 SIs bidding!
CHALLENGE
• GigaSECURE Security Delivery Platform architecture
• 26 GigaVUE-HC2, 40 bypass modules including
• Gigamon Resilient Inline Protection
• GigaVUE-FMSOLUTION
Overview
• Global bank serving 18.9
million customers with total
assets of £800 billion
• Headquarters in the UK
36©2018 Gigamon. All rights reserved.
5 YEARS TCO
CAPEX OPEX CAPEX OPEX CAPEX OPEX
IPS $3,100,000 $3,100,000 $1,330,000 $1,330,000 $1,770,000 $1,770,000 4xIPS to 2xIPS
APT $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xAPT to 2xAPT
WAF $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xWAF to 2xWAF
APM / NPM $2,000,000 $2,000,000 $1,000,000 $1,000,000 $1,000,000 $1,000,000 2xAPM/NPM to 1xAPM/NPM
SIEM $2,000,000 $700,000 $1,000,000 $500,000 $1,000,000 $200,000 Traffic capacity can be reduced
Cloud Tools $4,000,000 $2,000,000 $2,000,000
$7,770,000 $8,970,000
$16,740,000
Savings (USD)With GigamonWithout Gigamon
Equipment Remarks / Assumption
Total Savings (CAPEX + OPEX)
Total Savings
Estimated Cost Saving Based on 5 Years TCO

Recommended for you

Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security

Cyber security is no different from any other management activity, the theory is straight forward and well known, but the execution is very difficult. Interestingly, recent research carried out by a UK/ NATO industry team identified that one key element of high quality cyber security is world class service management as the majority of controls used to secure a system lie within the service management realm. So how do you effectively encompass cyber security into service management? In this presentation Martin outlines the background to the research and shares the results that identify how service management controls fit within a cyber security life cycle. Then, building on this work, Martin showcases how we need to think more about effectiveness and continuous improvement rather than compliance to give us the best chance of staying ahead of the attackers.

information securitysecurityitsm18
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco

Intuitive Network: la Rete Enterprise per il Digital Business che anticipa le azioni, blocca le minacce ed evolve in continuazione

 
by SMAU
smauciscosicurezza
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity

https://info.tigergraph.com/graph-gurus-22 A new weapon in the struggle against cyber security is now available. Graph analytics offer exciting possibilities for an organization to develop an intelligent approach to securing its IT environment with data-driven analytics. By watching this webinar you will learn how to: Detect and mitigate attacks against a firewall with unprecedented accuracy Identify and block devices used in denial of service attacks Build “footprint” profiles that can be used for machine learning.

big datagraph databasegraph analytics
Questions?
Thank You!
Local Customer Use Case
Inline Bypass Solution
Daniel Ong
Channel Account Manager
Gigamon
40©2018 Gigamon. All rights reserved.
Major Banking Group in Thailand
CISCO ACI VISIBILITY
• Rapid visibility for better security – Improved visibility on ACI (40G) network.
• Increased network availability and security.
• Holistic security architecture – Easy to manage SPAN traffic request.
• Ready for troubleshooting at any time.RESULTS
• Can’t monitor traffic (VXLAN) between Spine and Leaf of Cisco ACI (40G).
• Can’t terminate ER SPAN tunnel to consolidate traffic.
• Need to send out huge traffic to the right tool at the right time.
• Limited visibility and lack of control.CHALLENGE
• GigaTAP and GigaSMART: Header Striping
• Send specific protocol to tools for analysis.
• IP tunnelling to monitor across two site.
• GigaSTREAM aids in load sharing traffic into multiple tools according to current and planned
tools throughput.
SOLUTION

Recommended for you

Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...

- Detect and mitigate attacks against a firewall with unprecedented accuracy - Identify and block devices used in denial of service attacks - Build “footprint” profiles that can be used for machine learning.

cyber securitygraph datbasebig data
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance

Watch the replay: http://cs.co/9007Dbh39 In this deep dive you’ll learn how this comprehensive solution provides actionable intelligence to help you get to the right IT decision faster. And speed you on your way to an intent-based network. Learn how to gain end-to-end network visibility in one easy-to-use dashboard, make more sense out of data by eliminating noise and false positives, reduce downtime and troubleshooting time with rapid root-cause analysis and actionable insights and move beyond reactive monitoring with proactive and predictive analytics. Resources: Watch the related TechWiseTV episode: http://cs.co/9008DXCQi TechWiseTV: http://cs.co/9009DzrjN

ciscotechwisetventerprise networks
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company

Digital transformation in the oil and gas industry is being driven by emerging technologies like big data, artificial intelligence, and public cloud adoption. Cybersecurity is crucial as companies integrate IT and operational technology systems. A leading company underwent a three-year cybersecurity transformation that prioritized competency, risk management, hygiene, response and resilience. Their strategy was built on the NIST cybersecurity framework and included goals like achieving certain cyber maturity levels for identify, protect, detect, respond and recover functions. A vulnerability assessment of one company's operational technology environment reviewed policies, physical security, network security, host security and safety aspects across process domains to identify risks.

oil and gasicsscada
41©2018 Gigamon. All rights reserved.
DC & DR Deployment
Major Banking Group in Thailand
CISCO ACI VISIBILITY
42©2018 Gigamon. All rights reserved.
Chemical Industry Customer in Thailand
INLINE BYPASS SOLUTION
• Integrated full Inline Bypass solution for NGFW and ATP.
• Intelligent traffic delivery – Able to specific traffic direction by load sharing
solutions.RESULTS
• No solution for bypass module on ATP appliance.
• Lack of load balancing solutions between NGFW and ATP appliance.
• Security tools impact network uptime.CHALLENGE
• HC1 appliance with Inline Bypass Modules.
• 1 Gbps copper solution.
SOLUTION
43©2018 Gigamon. All rights reserved.
Inline Diagram with Active-Active NGFW
Chemical Industry Customer in Thailand
INLINE BYPASS SOLUTION
Thank You!

Recommended for you

Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...

El panorama de amenazas en evolución basado en nuestro ISTR (Reporte de Anual de Amenazas en Internet Vol. 24) recientemente publicado, refleja las últimas tendencias y cómo se aplican a Colombia y América Latina. Las principales tendencias de transformación digital, como la nube y la movilidad, junto con los nuevos desafíos de seguridad han cambiado el panorama de ciberseguridad por lo que la estrategia debe enfocarse en términos de riesgos clave, regulaciones y hallazgos sobre la madurez de la seguridad. Recomendaciones para enfocar y mejorar las posturas de ciberseguridad para abordar estas tendencias, incluidos los marcos clave, las tecnologías, los procesos y los cambios culturales son parte integral de los pasos a seguir.

cybersecuritysummit
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls

The document summarizes Palo Alto Networks next-generation firewalls which can identify applications, users, and content to provide visibility and granular control. This helps address challenges of uncontrolled use of internet applications in enterprises. The firewalls can see through ports and protocols to classify over 900 applications using techniques like App-ID, User-ID, and Content-ID. This gives IT unprecedented control over network activities.

firewall securityfirewall infrastructurenext generation firewall
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation

This document discusses the need for modern web security solutions and touts the capabilities of Forcepoint's Secure Web Gateway. It notes trends like hybrid cloud deployments, mobile workers, and shadow IT that have expanded organizations' attack surfaces. It then summarizes Forcepoint's critical capabilities like threat defense, flexible deployment options, cloud app control, mobile optimization, and data loss prevention. The document promotes Forcepoint's advanced classification engine and efficacy against threats compared to competitors. It also describes Forcepoint's malware protection, CASB functionality, adaptive architecture, and value in terms of ROI and reduced malware incidents.

cloud securitycloud computingcybersecurity
Tea Break
THE ESSENTIAL  ELEMENT OF YOUR SECURITY
Power Your Tools to Prevent Threats
See what matters.™
Koay Choon Ping
Sales Engineer, South East Asia
Gigamon
48©2018 Gigamon. All rights reserved.
BACKGROUND:
• Founded in 2004
• Headquarters: Santa Clara, CA, U.S.
• Global Offices: 20 countries
• 799 employees
• Over 2,500 customers
Gigamon Visibility Platform provides pervasive visibility into
data in motion across your entire network, enabling stronger
security and network performance.
See what matters.™
PERFORMANCE:
• World’s #1 Visibility Platform
• Named #1 Network Monitoring Equipment (NME)
Vendor Worldwide by Market Share*
• Key Verticals: Federal, Financial Services,
Healthcare, Retail, Technology, Service Providers
• $311M Revenue in FY16, +40% Year-over-Year
©2017 Gigamon. All rights reserved.
Corporate Overview
*Source: IHS Markit Report, Network Monitoring Equipment, May 19, 2017

Recommended for you

Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot

This document discusses the challenges organizations face in securing their networks and data as threats become more advanced and security landscapes more complex. It notes that security is more visible than ever but also more difficult and costly to manage effectively. Traditional perimeter-based defenses are also unable to keep up with rapidly changing attacks. The document then presents cloud-based network security solutions from Level 3 Communications that aim to help organizations more efficiently manage risks by adopting next-generation security technologies in a unified, globally consistent manner while reducing costs and simplifying management.

networkstélécommunicationssecurity
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry

This document discusses the challenges that critical infrastructure organizations face with the increasing adoption of internet of things (IoT) technologies. It notes that while IoT will dramatically increase the amount of data collected, organizations are already struggling to extract useful, timely information from their existing data. The mass expansion of endpoints and legacy systems introduces new vulnerabilities that could overwhelm operators during incidents. Regulatory requirements and outsourcing practices also increase compliance risks. However, new technologies may help address some issues if properly implemented. The document calls utilities to evaluate cybersecurity risks, test defenses, and learn from other sectors' experiences to help secure their operations in an evolving threat landscape.

energypowerutility
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18

This document discusses digital security and the challenges of securing systems in a changing technological landscape. It notes that terminology around information, cyber, and digital security can be confusing, and that security requirements need to be defined on a case-by-case basis. It emphasizes that security risks will continue to increase as digitalization accelerates, and that security professionals must adapt to embrace changes like cloud computing, IoT, and new technologies. The document concludes that data and trust are key currencies, that security enables digitalization when done well, and that effective security requires balancing risks with opportunities through good design principles and lifelong learning.

securityinformation securityapplications
49©2018 Gigamon. All rights reserved.
Internet
Public
Cloud
✕ Significant blind spots
✕ Extraordinary costs
✕ Contention for access to traffic
✕ Inconsistent view of traffic
✕ Blind to encrypted traffic
✕ Too many false positives
Challenges with Ad Hoc Security Deployments
User Behavior
Analytics
Advanced
Persistent
Threat
Email Threat
Detection
SIEM
Next-Generation
Firewall
Data Loss
Prevention
SIEM
Data Loss
Prevention
User Behavior
Analytics
Next-Generation
Firewall
Advanced
Persistent
Threat
Email Threat
Detection
Data Loss
Prevention
Next-Generation
Firewall
Email Threat
Detection
Advanced
Persistent
Threat
SIEM
User Behavior
Analytics
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
It is time the balance of power shifted from attacker to defender!
VISIBILITY LIMITED TO A POINT IN TIME OR PLACE
50©2018 Gigamon. All rights reserved.
Internet
Public
Cloud: AWS
Security Delivery Platform: “See Everything”
A Foundational Building Block To Effective Security
Data Loss
Prevention
Data Loss
PreventionData Loss
Prevention
IPS
(Inline)
IPS
(Inline)
IPS
(Inline)
Email Threat
Detection
Email Threat
Detection
Email Threat
Detection
Forensics
Forensics
Forensics
Intrusion
Detection
System
Intrusion
Detection
System
Intrusion
Detection
System
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
Anti-Malware
(Inline)
Anti-Malware
(Inline)
Anti-Malware
(Inline)
Intrusion
Detection
System
Data Loss
Prevention
Email Threat
Detection
IPS
(Inline)
Anti-Malware
(Inline)
Forensics
 All tools still connected
 Fewer network touch points
 Enhanced tool efficiency
 Decreased OPEX costs
Physical, Virtual
and Cloud
Metadata
Engine
(NetFlow / IPFIX)
Application
Session Filtering
SSL
Decryption
Inline
Bypass
51©2018 Gigamon. All rights reserved.
Gigamon Data-in-Motion Visibility Platform
Any Network
Data Center, Hybrid and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites
Tools & Applications
Security | Experience Management | Performance Monitoring | Analytics Tools and Applications
52©2018 Gigamon. All rights reserved.
Network &
Application
Performance
Management
Gigamon Partner Ecosystem
Security and
Vulnerability
Management
Service
Provider
InfrastructureInfrastructure

Recommended for you

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009

The document discusses how enterprise networks are changing due to increased use of internet applications by employees. It notes that traditional firewalls cannot adequately control these applications or identify users. The document then introduces Palo Alto Networks next-generation firewalls as a solution, claiming they can identify applications, users, and content to enable better policy enforcement and risk management.

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ

กรอบการทำงานเพื่อเป็นแนวทางในการจัดการและตอบสนองอย่างเหมาะสมกับภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ

Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019

ETDA มุ่งหวังให้ผลการสำรวจมูลค่า e-Commerce นี้ ช่วยสะท้อนสถานภาพข้อเท็จจริงในการพัฒนาประเทศไทย ในการนำข้อมูลไปใช้ในการกำหนดนโยบาย และยุทธศาสตร์ในการส่งเสริม e-Transaction และ e-Commerce ของประเทศ และเป็นข้อมูลช่วยผู้ประกอบการไปใช้ในการวางแผน และกำหนดกลยุทธ์ทางการตลาดต่อไป

Top Use Cases
54©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
Eliminate SPAN Port Contention
Few Span Ports, Many Tools
Customer is unable to use all tools! Customer has complete visibility for all tools!
Switch with two SPAN
session limitation
Intrusion Detection
System (IDS)
Application Performance
Management
VoIP Analyzer
Packet Capture
Application
Performance
Management
Intrusion
Detection
System (IDS)
Packet
Capture
VoIP AnalyzerSwitch with
two SPAN
ports
55©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
Limited Access to Environment
Limited Tool Ports, Many Switches
Limited Connectivity
to Full Environment
Pervasive Access – Can Connect to
All Points in the Environment
Analysis tool with
only 2 NICs
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5…n
Analysis tool with
only 2 NICs
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5…n
56©2018 Gigamon. All rights reserved.
Without Gigamon
Run Multiple POCs in Parallel
Accelerate Certification Of New Tools
Customer performs each Proof-of-Concept (POC)
serially at different times using different data
Customer is able to run multiple POCs
concurrently using same data
With Gigamon
POC #1 – Vendor X Tool POC #2 – Vendor Y Tool POC #3 – Vendor Z Tool
1 month 2 month 3 month
POC #1
Vendor X
Tool
POC #2
Vendor Y
Tool
POC #3
Vendor Z
Tool
1 month 2 month 3 month
Tool tested w/ NW
Segment – 4 weeks
Tool tested w/ same NW
Segment – 4 weeks
Tool tested w/ same NW
Segment – 4 weeks

Recommended for you

Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019

In the era of digital society, technologies have developed by leaps and bounds. Online transactions are also increasing in amount and value, significantly resulting in the economic and societal changes. The survey ‘Thailand Internet User Behavior 2019’ by the Electronic Transactions Development Agency or ETDA is therefore interesting data reflecting the extent Thais have changed their lifestyle and internet use behavior in accordance with digitalization.

iubiub 2019etda
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework

The main purpose of the study and its point of action is to develop regional critical information infrastructure (CII) resilience practices by identifying CII that have strategic imperatives and developing coordinated approaches for cybersecurity protection. The scope of this project study is based on the ASEAN ICT Masterplan 2020 which aims to strengthen information security and assurance among ASEAN Member States (AMS).

ciipasean
The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018

The continual rise in e-Commerce value in recent years has significant implications. UNCTAD has set a sustainable development target that expects e-Commerce to be an important tool to help drivethe national economy. Therefore, it is anticipated that the value of the Digital Economy contribution to Thai GDP will reach 25% as we have already witnessed a continual growth trend in the value of e-Commerce.

#ecommerceinthailand
57©2018 Gigamon. All rights reserved.
GigaVUE® Matches Your Network to Your Tools
Without Gigamon With Gigamon
Change Media and Speed
10, 40 Or 100Gbps Traffic To 1Gbps or 10Gbps Tools
10Gb 1Gb
Customer migrates to a 10Gb network and
1Gb monitoring tools become useless
Customer able to extend the life
of their 1Gb network and security tools
VoIP Analyzer
Application Performance
Management
Intrusion Detection
System (IDS)
Packet Capture Intrusion
Detection
System
VoIP
Monitor
Application
Performance
Management
Packet
Capture
58©2018 Gigamon. All rights reserved.
• Maximize tool efficacy
• Increase scale of
security monitoring
• Add, remove, and upgrade
tools seamlessly
• Consolidate multiple points of
failure into a single, bypass-
protected solution
• Integrate inline, out-of-band,
flow-based tools and metadata
via a Security Delivery Platform
Active Security Remediation with Inline Bypass
SCALING INLINE SECURITY WITH INLINE BYPASS
T1
T2
T3
E.g. WAN router
E.g. Firewall
E.g. IPS
E.g. WAF
E.g. ATD
E.g. Core switch
T1 T2
T3T3T3
IPS WAF
ATDATDATD
T1
IPS
59©2018 Gigamon. All rights reserved.
• L2-L4 Map rules
– tcp port, ip subnet, vlan, etc.
• Map priorities applies
– Use this to your advantage
• Customized inspection for each map
– Web: NGFW + IPS + WAF
– Email: NGFW + ATD
– Database: NGFW + IPS + ATD
– Unspecified: NGFW + IPS
Inline Map Definition
Flexible Inline Arrangements
BASIC CONCEPT: TRAFFIC SLICES  INLINE MAPS
Web
Email
Database
Unspecified
Traffic Slices for Inspection
60©2018 Gigamon. All rights reserved.
Intent-based, Drag-and-Drop Configuration

Recommended for you

Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)

The survey found that Thai internet users now spend an average of 10 hours and 5 minutes per day online, an increase of 3 hours and 30 minutes from 2017. Social media is the most popular online activity, with Thai users spending an average of 3.5 hours per day on platforms like Facebook and Line. While online shopping remains in the top 5 activities, there are growing concerns about personal data privacy as more information is required by websites and applications. The special focus of the survey was to evaluate Thai users' awareness of protecting their personal data online and identify behaviors that could put them at risk.

30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...

เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562 (Thailand Internet User Behavior 2019) วันที่ 30 มีนาคม 2563

รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018

Young Blood and Young @Heart: รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018

61©2018 Gigamon. All rights reserved.
Introducing Inline SSL Solution
FIRST INLINE SSL SOLUTION INTEGRATED
IN A VISIBILITY PLATFORM
Any forward-looking indication of plans for products is preliminary
and all future release dates are tentative and subject to change.
Malware and its actions lay hidden in the night
Then came Gigamon Inline SSL and all was light
62©2018 Gigamon. All rights reserved.
SSL Decryption
Out-of-Band SSL Decryption using Security Delivery Platform
IDS at the Perimeter
Anti-Malware
for Web Apps
APM at the Server Rack
DLP at Remote Sites
Router
Firewall with
SSL Proxy
Switch Router
Firewall with
SSL Proxy
Switch
Router
Router
HQ
Database
IDS APM
DLPAnti-
Malware
SSL
Decryption
SSL Decryption
SSL
Decryption
TAP
TAP
WorkstationsFirewall with
SSL Proxy
LAN
SSL Decryption
Server Rack
Branch
63©2018 Gigamon. All rights reserved.
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
SSL Decryption on Gigamon Products
Encrypted Traffic Decrypted / Unencrypted Traffic
Internet Servers
Corporate Servers Clients
NGFW
IPS
Network
Forensics
Anti-malware
Active, Inline
Appliance(s)
Passive, Out-of-Band
Appliance(s)
• Corporate servers
• Enterprise has server keys
• RSA key exchange
• Supported Since 2014
1
• Corporate servers
• Diffie-Hellman (DH) key exchange
• Emerging TLS 1.3 standard
• Need to be inline to decrypt SSL
2
• Internet Servers or SaaS services
• Enterprise does not have server keys
• Need to be inline to decrypt SSL
3
?
Clients
Internet
1 RSA 2 DH, PFS
3 RSA/DH
64©2018 Gigamon. All rights reserved.
Inline Tool Group
(decrypted traffic)
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Gigamon Inline SSL Visibility Solution
Highlights
• Servers and clients located internally
or externally
• Private keys not needed
• RSA, DH, PFS can be used
• Supports inline and out-of-band tools
Out-of-Band Tool
(decrypted traffic)
SSL Session
Leg 1
(encrypted)
SSL Session
Leg 2
(encrypted)
1
2
2
3
Web Monitor Tool
(decrypted traffic)
Encrypted traffic
Decrypted traffic

Recommended for you

เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562

เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562 (Thailand Internet User Behavior 2019) วันที่ 30 มีนาคม 2563

รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562

รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562 (Thailand Internet User Behavior 2019; Thailand IUB 2019) โดย สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์ (สพธอ.) หรือ ETDA (เอ็ตด้า) กระทรวงดิจิทัลเพื่อเศรษฐกิจและสังคม

Etda Annual Report 2019
Etda Annual Report 2019Etda Annual Report 2019
Etda Annual Report 2019

รายงานประจำปี สพธอ. ปี 2562

65©2018 Gigamon. All rights reserved.
• Maximize tool efficacy
• Increase scale of
security monitoring
• Add, remove, and upgrade
tools seamlessly
• Consolidate multiple points of
failure into a single, bypass-
protected solution
• Integrate inline, out-of-band,
flow-based tools and metadata
via a Security Delivery Platform
Active Security Remediation with Inline Bypass
SCALING INLINE SECURITY WITH INLINE BYPASS
T1
T2
T3
E.g. WAN router
E.g. Firewall
E.g. IPS
E.g. WAF
E.g. ATD
E.g. Core switch
T1 T2
T3T3T3
IPS WAF
ATDATDATD
T1
IPS
66©2018 Gigamon. All rights reserved.
Inline tool (decrypted traffic)
Respecting Data Privacy: URL Categorization
Internet
Webroot
• Supports up to 83 Web categories (Finance, Government…)
• Flexible policies based on multiple parameters (IP, Ports, VLAN, domain, categories)
• Whitelists and blacklists with over 5000 domain names
Banking Website (e.g. Citi)
Health care Website (e.g. Aetna)
File sharing Website
(e.g. Dropbox)
67©2018 Gigamon. All rights reserved.
Gigamon Inline SSL Deployment
Benefits of Gigamon Inline SSL Approach
The GigaVUE-HC2 is capable of
adding a single inline security
tool, but it does not unlock the
true potential of the unit.
Scalable GigaSMART®
• Inline SSL Decryption
68©2018 Gigamon. All rights reserved.
Benefits of Gigamon Inline SSL Approach
Adding new inline tools
One single GigaVUE-HC2 is
capable of adding multiple tools

Recommended for you

ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019

รายงานประจำปี 2562 สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์ (สพธอ.) หรือ ETDA (เอ็ตด้า) กระทรวงดิจิทัลเพื่อเศรษฐกิจและสังคม

etdaสพธอรายงานประจำปี
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019

รายงานประจำปีสำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์ ประจำปี 2562

etdaสพธอ.รายงานประจำปี 2562
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019

รายงานประจำปี สพธอ. 2562 (ETDA Annual Report 2019): THE DIGITAL TRANSFORMATION IS A MARATHON JOURNEY THAT YOU'VE ONLY JUST BEGUN.

69©2018 Gigamon. All rights reserved.
Benefits of Gigamon Inline SSL Approach
Adding new network segment
One single GigaVUE-HC2 is
capable of protecting multiple
network links
70©2018 Gigamon. All rights reserved.
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Benefits of Gigamon Inline SSL Approach
Increase inline SSL throughput
The GigaVUE-HC2 is a true Security Delivery Platform that
provides all this functionality in a scalable, modular form factor
• Bypass protection
• Multiple inline tools
• Multiple network links
• Traffic Intelligence
Scalable GigaSMART®
• Inline SSL Decryption
71©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
NetFlow/IPFIX Generation
Challenges:
• High impact on routers and switches for generating NetFlow records
• Routers / switches generate sampled NetFlow which is inadequate for
security
• Some routers do not support NetFlow, others have proprietary flow methods
• Without NetFlow, you can only instrument parts of your network for Deep
Packet Inspection (DPI)
Generating NetFlow Information:
• With NetFlow, you know where you need to DPI.
• Enable end-to-end security enforcement with visibility into every flow
• Ideal to detect Command and Control communications
• Validated with I ndustry-leading SIEM and NetFlow forensics collectors
72©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
Metadata Engine
Volume, types and amount of data overwhelm SIEMs Metadata Engine Benefits:
• High Performance
• Cost Savings
• Full visibility, better security

Recommended for you

เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561

เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561 ในงาน Thailand e-Commerce Week 2019 เมื่อวันที่ 2 กุมภาพันธ์ 2562

เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์etdaetdathailand
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy

The digital economy offers many possibilities for APEC member economies, including opportunities in electronic commerce and digital trade. The Internet and the digital economy enable greater economic integration, more innovation, as well as robust, sustainable, and inclusive economic growth for the Asia-Pacific region. The APEC Framework for Securing the Digital Economy provides non-binding principles and strategic recommendations to inform member economies as they develop policy and regulatory frameworks to secure their digital economies and their digital futures. It offers many possibilities for APEC member economies, such as opportunities in electronic commerce and digital trade.

apecdigital economy
A5 survey 2018 v31
A5 survey 2018 v31A5 survey 2018 v31
A5 survey 2018 v31

A5 survey 2018 v31

73©2018 Gigamon. All rights reserved.
* Planned Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Metadata Enhancements
Uncover Denial of Service & compromise
of internal web servers
HTTP Response Codes
Discover malicious
communications to
C&C servers using
DNS transactions
DNS Discovery
DNS
C&C
Bots
Analyze HTTPS certificates
to discover bad/suspicious
certificates
HTTPS Certificate Anomalies
74©2018 Gigamon. All rights reserved.
Example Use Case for GigaVUE-HC2
Intrusion
Prevention
Systems
Email
Inspection
Data Loss
Prevention
NetFlow
Collector
GigaStream™
Intrusion
Detection
System
NetFlow
Generation
SSL
Decryption
Internet
Edge Routers
Core Switches Out-of-Band
Malware
Visibility into Private Cloud
VMware ESX and NSX
76©2018 Gigamon. All rights reserved.
Network Traffic Visibility For Cross Network Workloads
Challenges
VM VM VM VM VM VM
VIRTUALIZE
• SPAN on Switch Ports
• Physical TAPs
Switch
TRADITIONAL VISIBILITY
• Blind spots for Inter-Host VM traffic
• Blind spots for Intra-Host VM traffic (blade center)
VIRTUAL VISIBILITY CHALLENGES
SERVER SERVER
Switch
Security and Application Monitoring are forcing considerations!!!
SERVER
SERVER
Hypervisor Hypervisor

Recommended for you

กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นกฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น

โดย สุรางคณา วายุภาพ ผู้อำนวยการ ETDA ในงานสัมมนาแนะนำกฎหมายและสำนักงานคณะกรรมการคุ้มครองข้อมูลส่วนบุคคล ณ 10 ตุลาคม 2562

ผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoringผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoring

ผลวิเคราะห์โครงการ mSMEs Scoring

ผลวิเคราะห์โครงการ msmes scoringetdaetdathailand
รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561

รายงานประจำปีไทยเซิร์ต 2560-2561 (2017-2018 ThaiCERT Annual Report)

77©2018 Gigamon. All rights reserved.
1. Security no longer an after-thought during virtualization
2. Increasing VM density with mission-critical workloads
3. Visibility into VM-VM traffic needed for Security and Application Performance Monitoring (APM)
4. Creating new virtual instances of tools affects workload performance
5. Automated visibility after VM migration
Virtual Visibility: More Important Than Ever
5 REASONS WHY YOU MUST CARE
HYPERVISOR
SERVER
VIRTUAL
IDS VM1
VIRTUAL
ANTI-
MALWARE
VIRTUAL
APM VM
HYPERVISOR
SERVER
GigaVUE-VM
IDS
ANTI-MALWARE
APM
VIRTUAL SWITCH VIRTUAL SWITCH
78©2018 Gigamon. All rights reserved.
GigaVUE-VM
Light Footprint Virtual Machine, Not Kernel Module
79©2018 Gigamon. All rights reserved.
GigaVUE-VM: Virtual Workload Monitoring
Enhanced for Software Defined Data Centers (SDDC)
• vCenter integration
• Bulk GigaVUE-VM onboarding
• Virtual traffic policy creation
• Automatic migration of monitoring policiesGigaVUE-FM
Private
Cloud
SERVER I SERVER II
Application
Performance
Network
Management
Security
Virtual Traffic Policies
Tunneling
Internet
Production Network Tools and Analytics
80©2018 Gigamon. All rights reserved.
GigaVUE-VM VM3
Hypervisor
vSwitch
• Integration with vCenter to detect vMotion
• Automated re-deployment of rules that follow the VM
Visibility in Motion
Automated Monitoring Policy Management
Hypervisor
vSwitch
VM1VM1VM1VM1VM1 VM2
GigaVUE-FM
vMotion InitiatevMotion Notify
GigaVUE-VM
Monitor VM1
UpdateUpdate
Application
Performance
Network
Management
Security

Recommended for you

Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company

Steps in EDI implementation Value Added Networks Internet based EDI Work Flow Coordination

edi
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理

特殊工艺完全按照原版制作【微信:A575476】【(mqu毕业证)麦考瑞大学毕业证成绩单offer】【微信:A575476】(留信学历认证永久存档查询)采用学校原版纸张(包括:隐形水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠,文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪)行业标杆!精益求精,诚心合作,真诚制作!多年品质 ,按需精细制作,24小时接单,全套进口原装设备,十五年致力于帮助留学生解决难题,业务范围有加拿大、英国、澳洲、韩国、美国、新加坡,新西兰等学历材料,包您满意。 【业务选择办理准则】 一、工作未确定,回国需先给父母、亲戚朋友看下文凭的情况,办理一份就读学校的毕业证【微信:A575476】文凭即可 二、回国进私企、外企、自己做生意的情况,这些单位是不查询毕业证真伪的,而且国内没有渠道去查询国外文凭的真假,也不需要提供真实教育部认证。鉴于此,办理一份毕业证【微信:A575476】即可 三、进国企,银行,事业单位,考公务员等等,这些单位是必需要提供真实教育部认证的,办理教育部认证所需资料众多且烦琐,所有材料您都必须提供原件,我们凭借丰富的经验,快捷的绿色通道帮您快速整合材料,让您少走弯路。 留信网认证的作用: 1:该专业认证可证明留学生真实身份【微信:A575476】 2:同时对留学生所学专业登记给予评定 3:国家专业人才认证中心颁发入库证书 4:这个认证书并且可以归档倒地方 5:凡事获得留信网入网的信息将会逐步更新到个人身份内,将在公安局网内查询个人身份证信息后,同步读取人才网入库信息 6:个人职称评审加20分 7:个人信誉贷款加10分 8:在国家人才网主办的国家网络招聘大会中纳入资料,供国家高端企业选择人才 → 【关于价格问题(保证一手价格) 我们所定的价格是非常合理的,而且我们现在做得单子大多数都是代理和回头客户介绍的所以一般现在有新的单子 我给客户的都是第一手的代理价格,因为我想坦诚对待大家 不想跟大家在价格方面浪费时间 对于老客户或者被老客户介绍过来的朋友,我们都会适当给一些优惠。 选择实体注册公司办理,更放心,更安全!我们的承诺:可来公司面谈,可签订合同,会陪同客户一起到教育部认证窗口递交认证材料,客户在教育部官方认证查询网站查询到认证通过结果后付款,不成功不收费! 办理(mqu毕业证)麦考瑞大学毕业证【微信:A575476】外观非常精致,由特殊纸质材料制成,上面印有校徽、校名、毕业生姓名、专业等信息。 办理(mqu毕业证)麦考瑞大学毕业证【微信:A575476】格式相对统一,各专业都有相应的模板。通常包括以下部分: 校徽:象征着学校的荣誉和传承。 校名:学校英文全称 授予学位:本部分将注明获得的具体学位名称。 毕业生姓名:这是最重要的信息之一,标志着该证书是由特定人员获得的。 颁发日期:这是毕业正式生效的时间,也代表着毕业生学业的结束。 其他信息:根据不同的专业和学位,可能会有一些特定的信息或章节。 办理(mqu毕业证)麦考瑞大学毕业证【微信:A575476】价值很高,需要妥善保管。一般来说,应放置在安全、干燥、防潮的地方,避免长时间暴露在阳光下。如需使用,最好使用复印件而不是原件,以免丢失。 综上所述,办理(mqu毕业证)麦考瑞大学毕业证【微信:A575476 】是证明身份和学历的高价值文件。外观简单庄重,格式统一,包括重要的个人信息和发布日期。对持有人来说,妥善保管是非常重要的。

特拉利理工学院毕业证沃特福德理工学院毕业证邓莱里文艺理工学院毕业证
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts

Jarren Duran Fuck EM T shirts https://www.pinterest.com/youngtshirt/jarren-duran-fuck-em-t-shirts/ Happy to Pay Fine for Expletive shirt,Happy to Pay Fine for Expletive T shirts,Jarren Duran Fuck EM T shirts Grabs yours today. tag and share who loves it.

jarren duran fuck em t shirts
81©2018 Gigamon. All rights reserved.
• Logical (virtual) networks that are decoupled
from underlying physical network
• All intelligence moved to the virtual edge (inside
a server)
• Creation of overlay (virtual network)
that is separate from underlay
(physical network)
• Benefits:
– Create virtual networks independent of
physical network topology
– Ability to rapidly make network changes
based on application/tenant needs
Gigamon Value Prop:
Preserve and extend monitoring tools by
offloading new encapsulations or
by providing tenant-level visibility.
Network Virtualization: VMware NSX
Multi-Tenant Networks
Existing Physical Network
Virtual Networks
“Network hypervisor” (NSX)
Internet
82©2018 Gigamon. All rights reserved.
Dynamic ‘Traffic Visibility Service’ Insertion
Internet
Security/Monitor Admin
“Copy
Packet”
GigaVUE-FM
Tools and Analytics
Application
Performance
Network
Management
Security
Monitoring Policy
83©2018 Gigamon. All rights reserved.
REST APIs
Software-Defined Visibility
Internet
SDDC / Cloud Monitoring –
Tenant and Application Visibility
SSL
Decryption
NetFlow / IPFIX
Generation
Application
Session Filtering
Adaptive
Packet Filtering
Header
Stripping
APM
Anti-Malware
IDS
DLP
Network Forensics
APT
Centralized Tools
Application Performance
Network Performance
Customer Experience
Security
Monitoring
De-cap VXLAN
Virtual Traffic
VXLAN=6000
SSL Decrypted
NetFlow / IPFIX
TAPs
GigaVUE-VM
Filtered and Sliced Virtual Traffic
NSX APIs, Gigamon Service Insertion
vCenter APIs, Events
vCenter
NSX Manager
GigaVUE-FM
2. Apply “Visibility” Policy
GigaVUE-VM
vRealize Automation (vRA)
1. Deploy new Tenants and Applications 2. Apply “Visibility” Policy
84©2018 Gigamon. All rights reserved.
Partner Solution Categories and Integration Options
Solution Category Integration Options
SDDC Operations and Visibility Port Mirroring, NSX-API, NetX
Automated Traffic Visibility for
VMware powered SDDC

Recommended for you

一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理

特殊工艺完全按照原版制作【微信:A575476】【(london毕业证书)英国伦敦大学毕业证成绩单offer】【微信:A575476】(留信学历认证永久存档查询)采用学校原版纸张(包括:隐形水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠,文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪)行业标杆!精益求精,诚心合作,真诚制作!多年品质 ,按需精细制作,24小时接单,全套进口原装设备,十五年致力于帮助留学生解决难题,业务范围有加拿大、英国、澳洲、韩国、美国、新加坡,新西兰等学历材料,包您满意。 【业务选择办理准则】 一、工作未确定,回国需先给父母、亲戚朋友看下文凭的情况,办理一份就读学校的毕业证【微信:A575476】文凭即可 二、回国进私企、外企、自己做生意的情况,这些单位是不查询毕业证真伪的,而且国内没有渠道去查询国外文凭的真假,也不需要提供真实教育部认证。鉴于此,办理一份毕业证【微信:A575476】即可 三、进国企,银行,事业单位,考公务员等等,这些单位是必需要提供真实教育部认证的,办理教育部认证所需资料众多且烦琐,所有材料您都必须提供原件,我们凭借丰富的经验,快捷的绿色通道帮您快速整合材料,让您少走弯路。 留信网认证的作用: 1:该专业认证可证明留学生真实身份【微信:A575476】 2:同时对留学生所学专业登记给予评定 3:国家专业人才认证中心颁发入库证书 4:这个认证书并且可以归档倒地方 5:凡事获得留信网入网的信息将会逐步更新到个人身份内,将在公安局网内查询个人身份证信息后,同步读取人才网入库信息 6:个人职称评审加20分 7:个人信誉贷款加10分 8:在国家人才网主办的国家网络招聘大会中纳入资料,供国家高端企业选择人才 → 【关于价格问题(保证一手价格) 我们所定的价格是非常合理的,而且我们现在做得单子大多数都是代理和回头客户介绍的所以一般现在有新的单子 我给客户的都是第一手的代理价格,因为我想坦诚对待大家 不想跟大家在价格方面浪费时间 对于老客户或者被老客户介绍过来的朋友,我们都会适当给一些优惠。 选择实体注册公司办理,更放心,更安全!我们的承诺:可来公司面谈,可签订合同,会陪同客户一起到教育部认证窗口递交认证材料,客户在教育部官方认证查询网站查询到认证通过结果后付款,不成功不收费! 办理(london毕业证书)英国伦敦大学毕业证【微信:A575476】外观非常精致,由特殊纸质材料制成,上面印有校徽、校名、毕业生姓名、专业等信息。 办理(london毕业证书)英国伦敦大学毕业证【微信:A575476】格式相对统一,各专业都有相应的模板。通常包括以下部分: 校徽:象征着学校的荣誉和传承。 校名:学校英文全称 授予学位:本部分将注明获得的具体学位名称。 毕业生姓名:这是最重要的信息之一,标志着该证书是由特定人员获得的。 颁发日期:这是毕业正式生效的时间,也代表着毕业生学业的结束。 其他信息:根据不同的专业和学位,可能会有一些特定的信息或章节。 办理(london毕业证书)英国伦敦大学毕业证【微信:A575476】价值很高,需要妥善保管。一般来说,应放置在安全、干燥、防潮的地方,避免长时间暴露在阳光下。如需使用,最好使用复印件而不是原件,以免丢失。 综上所述,办理(london毕业证书)英国伦敦大学毕业证【微信:A575476 】是证明身份和学历的高价值文件。外观简单庄重,格式统一,包括重要的个人信息和发布日期。对持有人来说,妥善保管是非常重要的。

白金汉大学毕业证赫瑞瓦特大学毕业证利物浦大学毕业证
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage

Website blog collective

archivewebsitehomepage
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra

International dating programhttps: please register here and start to meet new people todayhttps://www.digistore24.com/redir/384521/godtim/. get started. https://www.digistore24.com/redir/384521/godtim/

international dating program
Gigamon Visibility Platform
Public Cloud
88©2018 Gigamon. All rights reserved.
Public Cloud Visibility Challenges and Gigamon Solution
Gigamon Visibility Platform
Database
Web
Tier
App
Tier
Load Balancer
Tool Tier
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Load Balancer
RDS
Web
Tier
App
Tier
ELB
ELB
Tool Tier
Region
AZ
VPC
Database
Web
Tier
App
Tier
Load Balancer
Load Balancer
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Visibility Tier
GigaVUE-FM
Tool
Tier
X Inability to access all traffic
X Discrete vendor monitoring agents per instance
X Impacts workload and virtual network performance
X Static visibility with heavy disruption
 Minimize agent overload
 Aggregate, select, optimize, and distribute traffic
 Customize orchestration and
single-pane-of-glass visualization
 Elastic Visibility with ATS as workloads scale-out
Load Balancer Subnet Database Availability Zone (AZ)ToolInstances
89©2018 Gigamon. All rights reserved.
Economic Benefits of Using Single Gigamon Agent
vs. Multiple Agents
Compares 1 Gigamon agent to 1- 8
tool agents
Assumptions
• Average traffic bandwidth of 250Mbps
per Amazon EC2 instance monitored
• Starting Amazon EC2 instance of type
c4.large
90©2018 Gigamon. All rights reserved.
Network &
Application
Performance
Management
Visibility Platform for AWS: Cloud Validated Tools
Security and
Vulnerability
Management
Infrastructure
Open Source

Recommended for you

一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理

特殊工艺完全按照原版制作【微信:A575476】【(greenwich毕业证书)英国格林威治大学毕业证成绩单offer】【微信:A575476】(留信学历认证永久存档查询)采用学校原版纸张(包括:隐形水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠,文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪)行业标杆!精益求精,诚心合作,真诚制作!多年品质 ,按需精细制作,24小时接单,全套进口原装设备,十五年致力于帮助留学生解决难题,业务范围有加拿大、英国、澳洲、韩国、美国、新加坡,新西兰等学历材料,包您满意。 【业务选择办理准则】 一、工作未确定,回国需先给父母、亲戚朋友看下文凭的情况,办理一份就读学校的毕业证【微信:A575476】文凭即可 二、回国进私企、外企、自己做生意的情况,这些单位是不查询毕业证真伪的,而且国内没有渠道去查询国外文凭的真假,也不需要提供真实教育部认证。鉴于此,办理一份毕业证【微信:A575476】即可 三、进国企,银行,事业单位,考公务员等等,这些单位是必需要提供真实教育部认证的,办理教育部认证所需资料众多且烦琐,所有材料您都必须提供原件,我们凭借丰富的经验,快捷的绿色通道帮您快速整合材料,让您少走弯路。 留信网认证的作用: 1:该专业认证可证明留学生真实身份【微信:A575476】 2:同时对留学生所学专业登记给予评定 3:国家专业人才认证中心颁发入库证书 4:这个认证书并且可以归档倒地方 5:凡事获得留信网入网的信息将会逐步更新到个人身份内,将在公安局网内查询个人身份证信息后,同步读取人才网入库信息 6:个人职称评审加20分 7:个人信誉贷款加10分 8:在国家人才网主办的国家网络招聘大会中纳入资料,供国家高端企业选择人才 → 【关于价格问题(保证一手价格) 我们所定的价格是非常合理的,而且我们现在做得单子大多数都是代理和回头客户介绍的所以一般现在有新的单子 我给客户的都是第一手的代理价格,因为我想坦诚对待大家 不想跟大家在价格方面浪费时间 对于老客户或者被老客户介绍过来的朋友,我们都会适当给一些优惠。 选择实体注册公司办理,更放心,更安全!我们的承诺:可来公司面谈,可签订合同,会陪同客户一起到教育部认证窗口递交认证材料,客户在教育部官方认证查询网站查询到认证通过结果后付款,不成功不收费! 办理(greenwich毕业证书)英国格林威治大学毕业证【微信:A575476】外观非常精致,由特殊纸质材料制成,上面印有校徽、校名、毕业生姓名、专业等信息。 办理(greenwich毕业证书)英国格林威治大学毕业证【微信:A575476】格式相对统一,各专业都有相应的模板。通常包括以下部分: 校徽:象征着学校的荣誉和传承。 校名:学校英文全称 授予学位:本部分将注明获得的具体学位名称。 毕业生姓名:这是最重要的信息之一,标志着该证书是由特定人员获得的。 颁发日期:这是毕业正式生效的时间,也代表着毕业生学业的结束。 其他信息:根据不同的专业和学位,可能会有一些特定的信息或章节。 办理(greenwich毕业证书)英国格林威治大学毕业证【微信:A575476】价值很高,需要妥善保管。一般来说,应放置在安全、干燥、防潮的地方,避免长时间暴露在阳光下。如需使用,最好使用复印件而不是原件,以免丢失。 综上所述,办理(greenwich毕业证书)英国格林威治大学毕业证【微信:A575476 】是证明身份和学历的高价值文件。外观简单庄重,格式统一,包括重要的个人信息和发布日期。对持有人来说,妥善保管是非常重要的。

伦敦大学毕业证伦敦商学院毕业证牛津大学毕业证
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears

Tarun Gaur On Data Breaches and Privacy Fears https://www.cbs19news.com/story/50764645/tarun-gaur-on-data-breaches-and-privacy-fears-navigating-the-minefield-of-modern-internet-safety

tarun gaurdata breachesprivacy fears
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...

In this slide, you can easily find out regarding Alibaba company and how to work on this website.Come on!Enjoy it!

social media
Multi-Cloud Deployments
92©2018 Gigamon. All rights reserved.
Multi-cloud: Hybrid Cloud Visibility
PRESERVE TOOL INVESTMENT
Web
tier
App
tier
Azure Load
Balancing
Azure Load
Balancing
Azure SQL
Database
Virtual Network
Visibility tier
Tool
tier
Availability Zone
Region
Web
tier
Elastic Load
Balancing
App
tier
Elastic Load
Balancing
Amazon
RDS
Visibility tier
Tool
tier
Amazon
CloudWatch
On-Premises Data Center
Azure API
Management
Tool
Tier
GigaVUE-FM
TunnelingTunneling
93©2018 Gigamon. All rights reserved.
Multi-cloud: Centralized Visibility and Security
PRESERVE TOOL INVESTMENT
On-Premises
Data Center
Security, Performance Management,
and Analytics Tools
Applications
Web
tier
Web
tier
SecOps VPC
GigaVUE-FM
Amazon
CloudWatch
Visibility tier
Visibility tier
Tool tier Web
tier
App
tier
Visibility tier
Azure API
Management
AWS Direct
Connect
Azure
ExpressRoute
Applications
Thank You!

Recommended for you

一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理

特殊工艺完全按照原版制作【微信:A575476】【(aber毕业证)亚伯大学毕业证成绩单offer】【微信:A575476】(留信学历认证永久存档查询)采用学校原版纸张(包括:隐形水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠,文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪)行业标杆!精益求精,诚心合作,真诚制作!多年品质 ,按需精细制作,24小时接单,全套进口原装设备,十五年致力于帮助留学生解决难题,业务范围有加拿大、英国、澳洲、韩国、美国、新加坡,新西兰等学历材料,包您满意。 【业务选择办理准则】 一、工作未确定,回国需先给父母、亲戚朋友看下文凭的情况,办理一份就读学校的毕业证【微信:A575476】文凭即可 二、回国进私企、外企、自己做生意的情况,这些单位是不查询毕业证真伪的,而且国内没有渠道去查询国外文凭的真假,也不需要提供真实教育部认证。鉴于此,办理一份毕业证【微信:A575476】即可 三、进国企,银行,事业单位,考公务员等等,这些单位是必需要提供真实教育部认证的,办理教育部认证所需资料众多且烦琐,所有材料您都必须提供原件,我们凭借丰富的经验,快捷的绿色通道帮您快速整合材料,让您少走弯路。 留信网认证的作用: 1:该专业认证可证明留学生真实身份【微信:A575476】 2:同时对留学生所学专业登记给予评定 3:国家专业人才认证中心颁发入库证书 4:这个认证书并且可以归档倒地方 5:凡事获得留信网入网的信息将会逐步更新到个人身份内,将在公安局网内查询个人身份证信息后,同步读取人才网入库信息 6:个人职称评审加20分 7:个人信誉贷款加10分 8:在国家人才网主办的国家网络招聘大会中纳入资料,供国家高端企业选择人才 → 【关于价格问题(保证一手价格) 我们所定的价格是非常合理的,而且我们现在做得单子大多数都是代理和回头客户介绍的所以一般现在有新的单子 我给客户的都是第一手的代理价格,因为我想坦诚对待大家 不想跟大家在价格方面浪费时间 对于老客户或者被老客户介绍过来的朋友,我们都会适当给一些优惠。 选择实体注册公司办理,更放心,更安全!我们的承诺:可来公司面谈,可签订合同,会陪同客户一起到教育部认证窗口递交认证材料,客户在教育部官方认证查询网站查询到认证通过结果后付款,不成功不收费! 办理(aber毕业证)亚伯大学毕业证【微信:A575476】外观非常精致,由特殊纸质材料制成,上面印有校徽、校名、毕业生姓名、专业等信息。 办理(aber毕业证)亚伯大学毕业证【微信:A575476】格式相对统一,各专业都有相应的模板。通常包括以下部分: 校徽:象征着学校的荣誉和传承。 校名:学校英文全称 授予学位:本部分将注明获得的具体学位名称。 毕业生姓名:这是最重要的信息之一,标志着该证书是由特定人员获得的。 颁发日期:这是毕业正式生效的时间,也代表着毕业生学业的结束。 其他信息:根据不同的专业和学位,可能会有一些特定的信息或章节。 办理(aber毕业证)亚伯大学毕业证【微信:A575476】价值很高,需要妥善保管。一般来说,应放置在安全、干燥、防潮的地方,避免长时间暴露在阳光下。如需使用,最好使用复印件而不是原件,以免丢失。 综上所述,办理(aber毕业证)亚伯大学毕业证【微信:A575476 】是证明身份和学历的高价值文件。外观简单庄重,格式统一,包括重要的个人信息和发布日期。对持有人来说,妥善保管是非常重要的。

科克大学学院毕业证都柏林大学学院毕业证国立高威大学毕业证
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理

特殊工艺完全按照原版制作【微信:A575476】【(lu毕业证书)英国拉夫堡大学毕业证成绩单offer】【微信:A575476】(留信学历认证永久存档查询)采用学校原版纸张(包括:隐形水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠,文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪)行业标杆!精益求精,诚心合作,真诚制作!多年品质 ,按需精细制作,24小时接单,全套进口原装设备,十五年致力于帮助留学生解决难题,业务范围有加拿大、英国、澳洲、韩国、美国、新加坡,新西兰等学历材料,包您满意。 【业务选择办理准则】 一、工作未确定,回国需先给父母、亲戚朋友看下文凭的情况,办理一份就读学校的毕业证【微信:A575476】文凭即可 二、回国进私企、外企、自己做生意的情况,这些单位是不查询毕业证真伪的,而且国内没有渠道去查询国外文凭的真假,也不需要提供真实教育部认证。鉴于此,办理一份毕业证【微信:A575476】即可 三、进国企,银行,事业单位,考公务员等等,这些单位是必需要提供真实教育部认证的,办理教育部认证所需资料众多且烦琐,所有材料您都必须提供原件,我们凭借丰富的经验,快捷的绿色通道帮您快速整合材料,让您少走弯路。 留信网认证的作用: 1:该专业认证可证明留学生真实身份【微信:A575476】 2:同时对留学生所学专业登记给予评定 3:国家专业人才认证中心颁发入库证书 4:这个认证书并且可以归档倒地方 5:凡事获得留信网入网的信息将会逐步更新到个人身份内,将在公安局网内查询个人身份证信息后,同步读取人才网入库信息 6:个人职称评审加20分 7:个人信誉贷款加10分 8:在国家人才网主办的国家网络招聘大会中纳入资料,供国家高端企业选择人才 → 【关于价格问题(保证一手价格) 我们所定的价格是非常合理的,而且我们现在做得单子大多数都是代理和回头客户介绍的所以一般现在有新的单子 我给客户的都是第一手的代理价格,因为我想坦诚对待大家 不想跟大家在价格方面浪费时间 对于老客户或者被老客户介绍过来的朋友,我们都会适当给一些优惠。 选择实体注册公司办理,更放心,更安全!我们的承诺:可来公司面谈,可签订合同,会陪同客户一起到教育部认证窗口递交认证材料,客户在教育部官方认证查询网站查询到认证通过结果后付款,不成功不收费! 办理(lu毕业证书)英国拉夫堡大学毕业证【微信:A575476】外观非常精致,由特殊纸质材料制成,上面印有校徽、校名、毕业生姓名、专业等信息。 办理(lu毕业证书)英国拉夫堡大学毕业证【微信:A575476】格式相对统一,各专业都有相应的模板。通常包括以下部分: 校徽:象征着学校的荣誉和传承。 校名:学校英文全称 授予学位:本部分将注明获得的具体学位名称。 毕业生姓名:这是最重要的信息之一,标志着该证书是由特定人员获得的。 颁发日期:这是毕业正式生效的时间,也代表着毕业生学业的结束。 其他信息:根据不同的专业和学位,可能会有一些特定的信息或章节。 办理(lu毕业证书)英国拉夫堡大学毕业证【微信:A575476】价值很高,需要妥善保管。一般来说,应放置在安全、干燥、防潮的地方,避免长时间暴露在阳光下。如需使用,最好使用复印件而不是原件,以免丢失。 综上所述,办理(lu毕业证书)英国拉夫堡大学毕业证【微信:A575476 】是证明身份和学历的高价值文件。外观简单庄重,格式统一,包括重要的个人信息和发布日期。对持有人来说,妥善保管是非常重要的。

白金汉大学毕业证赫瑞瓦特大学毕业证利物浦大学毕业证
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理

特殊工艺完全按照原版制作【微信:A575476】【(ukc毕业证书)英国肯特大学毕业证成绩单offer】【微信:A575476】(留信学历认证永久存档查询)采用学校原版纸张(包括:隐形水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠,文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪)行业标杆!精益求精,诚心合作,真诚制作!多年品质 ,按需精细制作,24小时接单,全套进口原装设备,十五年致力于帮助留学生解决难题,业务范围有加拿大、英国、澳洲、韩国、美国、新加坡,新西兰等学历材料,包您满意。 【业务选择办理准则】 一、工作未确定,回国需先给父母、亲戚朋友看下文凭的情况,办理一份就读学校的毕业证【微信:A575476】文凭即可 二、回国进私企、外企、自己做生意的情况,这些单位是不查询毕业证真伪的,而且国内没有渠道去查询国外文凭的真假,也不需要提供真实教育部认证。鉴于此,办理一份毕业证【微信:A575476】即可 三、进国企,银行,事业单位,考公务员等等,这些单位是必需要提供真实教育部认证的,办理教育部认证所需资料众多且烦琐,所有材料您都必须提供原件,我们凭借丰富的经验,快捷的绿色通道帮您快速整合材料,让您少走弯路。 留信网认证的作用: 1:该专业认证可证明留学生真实身份【微信:A575476】 2:同时对留学生所学专业登记给予评定 3:国家专业人才认证中心颁发入库证书 4:这个认证书并且可以归档倒地方 5:凡事获得留信网入网的信息将会逐步更新到个人身份内,将在公安局网内查询个人身份证信息后,同步读取人才网入库信息 6:个人职称评审加20分 7:个人信誉贷款加10分 8:在国家人才网主办的国家网络招聘大会中纳入资料,供国家高端企业选择人才 → 【关于价格问题(保证一手价格) 我们所定的价格是非常合理的,而且我们现在做得单子大多数都是代理和回头客户介绍的所以一般现在有新的单子 我给客户的都是第一手的代理价格,因为我想坦诚对待大家 不想跟大家在价格方面浪费时间 对于老客户或者被老客户介绍过来的朋友,我们都会适当给一些优惠。 选择实体注册公司办理,更放心,更安全!我们的承诺:可来公司面谈,可签订合同,会陪同客户一起到教育部认证窗口递交认证材料,客户在教育部官方认证查询网站查询到认证通过结果后付款,不成功不收费! 办理(ukc毕业证书)英国肯特大学毕业证【微信:A575476】外观非常精致,由特殊纸质材料制成,上面印有校徽、校名、毕业生姓名、专业等信息。 办理(ukc毕业证书)英国肯特大学毕业证【微信:A575476】格式相对统一,各专业都有相应的模板。通常包括以下部分: 校徽:象征着学校的荣誉和传承。 校名:学校英文全称 授予学位:本部分将注明获得的具体学位名称。 毕业生姓名:这是最重要的信息之一,标志着该证书是由特定人员获得的。 颁发日期:这是毕业正式生效的时间,也代表着毕业生学业的结束。 其他信息:根据不同的专业和学位,可能会有一些特定的信息或章节。 办理(ukc毕业证书)英国肯特大学毕业证【微信:A575476】价值很高,需要妥善保管。一般来说,应放置在安全、干燥、防潮的地方,避免长时间暴露在阳光下。如需使用,最好使用复印件而不是原件,以免丢失。 综上所述,办理(ukc毕业证书)英国肯特大学毕业证【微信:A575476 】是证明身份和学历的高价值文件。外观简单庄重,格式统一,包括重要的个人信息和发布日期。对持有人来说,妥善保管是非常重要的。

萨塞克斯大学毕业证布里斯托大学毕业证谢菲尔德大学毕业证
Q&A Session
Mona Yam
Regional Sales Director
Gigamon
Sittipong Nateeprasittiporn
Product Manager
nForce Secure Co.,Ltd.
Closing Remarks
Mona Yam
Regional Sales Director
Gigamon

More Related Content

What's hot

AWS CloudFormation Masterclass
AWS CloudFormation MasterclassAWS CloudFormation Masterclass
AWS CloudFormation Masterclass
Amazon Web Services
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
 
AWS PrivateLink - Deep Dive
AWS PrivateLink - Deep DiveAWS PrivateLink - Deep Dive
AWS PrivateLink - Deep Dive
Enri Peters
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
Cheah Eng Soon
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212
Florian Roth
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
Amazon Web Services
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
MarketingArrowECS_CZ
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
 
Cloud security
Cloud security Cloud security
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
MarketingArrowECS_CZ
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
MarketingArrowECS_CZ
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
Belsoft
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
Erik Van Buggenhout
 
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native Security
VMware Tanzu
 

What's hot (20)

AWS CloudFormation Masterclass
AWS CloudFormation MasterclassAWS CloudFormation Masterclass
AWS CloudFormation Masterclass
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
AWS PrivateLink - Deep Dive
AWS PrivateLink - Deep DiveAWS PrivateLink - Deep Dive
AWS PrivateLink - Deep Dive
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212Security Analyst Workshop - 20200212
Security Analyst Workshop - 20200212
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Cloud security
Cloud security Cloud security
Cloud security
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native Security
 

Similar to THE ESSENTIAL ELEMENT OF YOUR SECURITY

Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
John Pollack
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
patmisasi
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Cristian Garcia G.
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security
John Pollack
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security
itSMF UK
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
SMAU
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
TigerGraph
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Amanda Morris
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
Robb Boyd
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
Advanced Technology Consulting (ATC)
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
Kevin Murphy
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 

Similar to THE ESSENTIAL ELEMENT OF YOUR SECURITY (20)

Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 

More from ETDAofficialRegist

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ETDAofficialRegist
 
Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019
ETDAofficialRegist
 
Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019
ETDAofficialRegist
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
ETDAofficialRegist
 
The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018
ETDAofficialRegist
 
Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)
ETDAofficialRegist
 
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
ETDAofficialRegist
 
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
ETDAofficialRegist
 
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
ETDAofficialRegist
 
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
ETDAofficialRegist
 
Etda Annual Report 2019
Etda Annual Report 2019Etda Annual Report 2019
Etda Annual Report 2019
ETDAofficialRegist
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
ETDAofficialRegist
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
ETDAofficialRegist
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
ETDAofficialRegist
 
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
ETDAofficialRegist
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
ETDAofficialRegist
 
A5 survey 2018 v31
A5 survey 2018 v31A5 survey 2018 v31
A5 survey 2018 v31
ETDAofficialRegist
 
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นกฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
ETDAofficialRegist
 
ผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoringผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoring
ETDAofficialRegist
 
รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561
ETDAofficialRegist
 

More from ETDAofficialRegist (20)

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
 
Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019
 
Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018
 
Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)
 
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
 
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
 
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
 
Etda Annual Report 2019
Etda Annual Report 2019Etda Annual Report 2019
Etda Annual Report 2019
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
 
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
 
A5 survey 2018 v31
A5 survey 2018 v31A5 survey 2018 v31
A5 survey 2018 v31
 
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นกฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
 
ผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoringผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoring
 
รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561
 

Recently uploaded

Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
sivaraman163206
 
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦���瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
taqyea
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
exgf28
 
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
taqyea
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra
thomaskurtha9
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
taqyea
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
Erkinjon Erkinov
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
taqyea
 
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
taqyea
 
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
taqyea
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
taqyea
 
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
taqyea
 
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
taqyea
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
ffg01100
 
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
taqyea
 
10th International Conference on Networks, Mobile Communications and Telema...
10th International Conference on Networks, Mobile Communications and   Telema...10th International Conference on Networks, Mobile Communications and   Telema...
10th International Conference on Networks, Mobile Communications and Telema...
ijp2p
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
Serva AppLabs
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
RohitRoshanBengROHIT
 

Recently uploaded (20)

Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
 
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
 
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
 
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
 
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
 
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
 
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
 
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
 
10th International Conference on Networks, Mobile Communications and Telema...
10th International Conference on Networks, Mobile Communications and   Telema...10th International Conference on Networks, Mobile Communications and   Telema...
10th International Conference on Networks, Mobile Communications and Telema...
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
 

THE ESSENTIAL ELEMENT OF YOUR SECURITY

  • 2. Gigamon Cyber Security Roadshow THAILAND Date: 16th May 2018 Venue: ETDA (Electronic Transactions Development Agency)
  • 3. Welcome Address Mona Yam Regional Sales Director Gigamon
  • 4. 4©2018 Gigamon. All rights reserved. Time Agenda Speaker 1:10 – 1:50 pm Top Cyberthreats and The Road Ahead Graham Melville Sr. Director, Security Solutions Gigamon 1:50 – 2:35 pm Customer Use Case Daniel Ong Channel Account Manager Gigamon 2:35 – 2:55 pm Networking and Tea Break 2:55 – 3:45 pm Power Your Tools to Prevent Threats Koay Choon Ping Sales Engineer, South East Asia Gigamon 3:45 – 4:05 pm Q&A Session 4:05 – 4:15 pm Closing Remarks Mona Yam Regional Sales Director Gigamon Agenda
  • 5. Top Cyberthreats and The Road Ahead Graham Melville Senior Director, Security Solutions Gigamon
  • 6. 6©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 7. 7©2018 Gigamon. All rights reserved. • 27-question online survey conducted in Nov. 2017 – IT security decision maker or practitioner – Employed by organization with at least 500 employees • Survey designed to assess: – Organization’s security posture – Perceptions of cyberthreats and IT security challenges – Current and future IT security investments – IT security practices and strategies About The Cyberthreat Defense Report 7
  • 8. 8©2018 Gigamon. All rights reserved. Survey Demographics 8 Respondents by employee countRespondents by country 1,200 respondents | 17 countries | 19 industries
  • 9. 9©2018 Gigamon. All rights reserved. Breaches are Inevitable Organizations are falling victim to cyberattacks at an alarming rate … Percentage compromised at least once, by country
  • 10. 10©2018 Gigamon. All rights reserved. Pessimism is the New Reality … and they are expecting more of the same in 2018. Likelihood of successful attack Percentage who believe a successful cyberattack is more likely than not, by country
  • 11. 11©2018 Gigamon. All rights reserved. Challenges URGENCY COMPLEXITYSPEED COST SKILLS SHORTAGE
  • 12. 12©2018 Gigamon. All rights reserved. A Skills Shortage Is The Top Issue ‘Lack of skilled personnel’ edges out ‘Low security awareness among employees’ for the first time in five years!
  • 13. 13©2018 Gigamon. All rights reserved. IT Security Skills Shortage IT security admins, analysts, and architects are in highest demand.
  • 14. 14©2018 Gigamon. All rights reserved. The Speed Issue Too much data to analyze continues to be a major issue for organizations.
  • 15. 15©2018 Gigamon. All rights reserved. The Data-in-Motion Dilemma VOLUME + SPEED + THREATS = COMPLEXITY + RISK + COST *Cisco Global Cloud Index 2016. **Statista Global machine-to-machine (M2M) data traffic from 2014 to 2019 (in petabytes per month) Time Volume Network Data Security Tool Security tools do not scale as fast as data Data Center transition to 100GbEmergence of Big Data Internet of Things Machine to Machine 4.7ZB of global data center traffic in 2016* 1.7PB of M2M traffic in 2017** 6.7 ns available to process a network packet on a 100Gb link
  • 16. 16©2018 Gigamon. All rights reserved. Complexity Too many product, Too hard to manage, No interoperability.
  • 17. 17©2018 Gigamon. All rights reserved. CYBERscape: The Cybersecurity Landscape. Source: Momentum Partners. https://momentumcyber.com/docs/CYBERscape.pdf
  • 18. 18©2018 Gigamon. All rights reserved. Urgency - Vulnerability Patching Challenges ‘Infrequent patching windows’ and ‘lack of qualified personnel’ inhibit organizations from patching more rapidly.
  • 19. 19©2018 Gigamon. All rights reserved. Rising IT Security Budgets In response, enterprises are increasing their security budgets by 4.7% in 2018, globally. By country: By industry: By size:
  • 20. 20©2018 Gigamon. All rights reserved. 2018 Cyberthreat Defense Report, CyberEdge Group, 2018 Costs FIREWALL IDS IPS NAC ANTI-MALWARE DLP WAF NEXTGEN FW NBA NAT EMAIL SECURITY APT FIREWALL ANTI VIRUS Budgets are rising but can they keep up with the increasing need?
  • 21. 21©2018 Gigamon. All rights reserved. Cyberthreat Hunting Investments Only a third of respondents are fully confident in their cyberthreat hunting investments.
  • 22. 22©2018 Gigamon. All rights reserved. Security Fundamentals Are Changing A NEW APPROACH TO SECURITY IS REQUIRED URGENCYCOMPLEXITYSPEED COSTSKILLS SHORTAGE Time to detection and Time to containment are too slow Breaches continue to happen
  • 23. 23©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 24. 24©2018 Gigamon. All rights reserved. Internet Public Cloud ✕ To many products not enough staff ✕ Hard to keep up with increasing network speed ✕ Complex with significant blind spots ✕ Difficult to patch security devices ✕ Extraordinary costs ✕ Contention for access to traffic ✕ Inconsistent view of traffic ✕ Too many false positives ✕ Blind to or high cost for encrypted traffic Challenges with Security Deployments VISIBILITY LIMITED TO A POINT IN TIME OR PLACE User Behavior Analytics Advanced Persistent Threat Email Threat Detection SIEM Next-Generation Firewall Data Loss Prevention SIEM Data Loss Prevention User Behavior Analytics Next-Generation Firewall Advanced Persistent Threat Email Threat Detection Data Loss Prevention Next-Generation Firewall Email Threat Detection Advanced Persistent Threat SIEM User Behavior Analytics Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Poor architectural choices will lead to poor results!
  • 25. 25©2018 Gigamon. All rights reserved. • With this approach, you: – Detect and block threats immediately – Deploy and operate transparently, aka “Bump on the wire” or “Layer 2 mode” • No need to change routing configurations or endpoints • But it introduces challenges for both network and security teams: – Introduces multiple points of failure – Physical interfaces must match the network – Degrades network and application performance – Wastes cycles on traffic it cannot analyze – Does not scale to network speeds – Disruptive to upgrade or replace – Cannot be moved to or from out-of-band operation (detection vs. prevention) – Asymmetric routing of traffic circumvents tools’ ability to inspect whole sessions IPS = Intrusion Prevention System; WAF = Web Application Firewall; ATP = Advanced Threat Prevention Inline Prevention Security Tools WAN router Firewall IPS WAF Core switch ATP
  • 26. 26©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 27. 27©2018 Gigamon. All rights reserved. GigaSECURE® Security Delivery Platform THE WORLDS LEADING NEXT GENERATION NETWORK PACKET BROKER Internet Public Cloud Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach Scalable metadata extraction for improved forensics Security Delivery Platform Next-Generation Firewall User Behavior Analytics Data Loss Prevention Email Threat Detection Advanced Persistent Threat SIEM Security Delivery Platform Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach: physical and virtual Scalable metadata extraction for improved forensics Physical, Virtual and Cloud Metadata Generation Application Session Filtering SSL Decryption Inline Bypass On-premise Data Center Remote Sites Public Cloud Cisco ACI Private Cloud
  • 28. 28©2018 Gigamon. All rights reserved. Super Charge Existing SOC/ NOC • Centralized tools • Traffic backhauled to centralized tools • Full traffic flows • NetFlow/IPFIX flow records • Metadata of interest • De-duplicate before backhaul • Ideal for both service providers & enterprises Security Operations / Network Operations GigaVUE-HC2GigaVUE-HD8 Remote Site GigaVUE-HC1 Remote Site GigaVUE-HC1 Remote Site GigaVUE-HC1
  • 29. 29©2018 Gigamon. All rights reserved. Ready for Future Multi-cloud: Hybrid Cloud Visibility PRESERVE TOOL INVESTMENT Web tier App tier Azure Load Balancing Azure Load Balancing Azure SQL Database Virtual Network Visibility tier Tool tier Availability Zone Region Web tier Elastic Load Balancing App tier Elastic Load Balancing Amazon RDS Visibility tier Tool tier Amazon CloudWatch On-Premises Data Center Azure API Management Tool Tier GigaVUE-FM TunnelingTunneling
  • 30. 30©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 31. 31©2018 Gigamon. All rights reserved. Based on 2017 Fortune list and customer data from Q1 2018, Fortune is part of Time Inc. Top Lists based on FY2016 data. “Top 50 Banks in the World," Banks around the World. June 30, 2016. Retrieved from: http://www.relbanks.com/worlds-top-banks/assets Laura Lorenzetti, "The 10 biggest health-care companies in the Fortune 500," Fortune, June 20, 2015. Retrieved from: https://gigamon.my.salesforce.com/00O14000008ef5s Data Set: Top US Government Agencies by Contract Spending (FY 2016), GovWin from Deltek. Accessed Feb. 7, 2017. Samantha Sharf, "The World's Largest Tech Companies: Apple Beats Samsung, Microsoft And Alphabet," Forbes, May 26, 2016. Retrieved from: http://www.forbes.com/sites/samanthasharf/2016/05/26/the-worlds-largest-tech-companies-2016-apple-bests-samsung-microsoft-and-alphabet/#ed4f6fc89ee4 "Stores Top Retailers 2016," Kantar Retail, National Retail Federation, 2016. Retrieved from: https://nrf.com/resources/annual-retailer-lists/top-100-retailers/stores-top-retailers-2016 "The World's Biggest Public Companies," Forbes, June 2, 2016. Retrieved from: https://en.wikipedia.org/wiki/List_of_telephone_operating_companies Who Deploys Gigamon? MANY OF THE WORLD’S LEADING ORGANIZATIONS INCLUDING:
  • 32. 32©2018 Gigamon. All rights reserved. As of Feb 2017 Gigamon Customers SERVICE PROVIDERFEDERAL TECHNOLOGY GENERAL ENTERPRISE / MISC RETAIL / SERVICES FINANCE HEALTHCARE /INSURANCE ENTERPRISE
  • 33. 33©2018 Gigamon. All rights reserved. SERVICE PROVIDERFEDERAL TECHNOLOGY GENERAL ENTERPRISE / MISC RETAIL / SERVICES FINANCE HEALTHCARE /INSURANCE ENTERPRISE Customer data as of Q1 2018 Gigamon Customers 2,800+ End Customers
  • 34. 34©2018 Gigamon. All rights reserved. 34 Case Study • Reduced Cost: $20M+ in TCO savings with GigaSECURE architecture • Mitigated Risk to ‘Build with Confidence’: Helped bank identify network assets and proactively solve deployment issues upfront • Faster Time to Response: Reduced a 5-day P1 incident by 95% preventing reputation loss, avoiding bad publicity and increasing customer experience RESULTS • Key security initiatives (IPS, APT, Email Protection) to protect customers and meet security compliance requirements were costing significant CAPEX • Big concerns about adding prevention tools inline due to network resiliency concerns and environment complexity • Limited network visibility for security detection and threat hunting initiatives, leading to poor ROI / outcomes with existing toolsets CHALLENGE • Two-part solution: • Ph. 1: Leverage Inline Bypass for prevention tools in core network • Ph. 2: Feed data from data centers, edge to to out-of-band detection tools SOLUTION Overview • Large international bank serving 13 million customers • Decided to in-house security after many years of outsourcing challenges
  • 35. 35©2018 Gigamon. All rights reserved. 35 Case Study • Maximize uptime: Deployed IPS with minimal production changes • Increased operational agility with decreased risk: Ability to switch between IPS and IDS modes instantaneously • Investment protection: Roadmap for future expansion with GigaSMART functionality such as SSL, de-duplication, NetFlow RESULTS • High cost and potential impact from traffic volume of IDS/IPS deployment in new data center • Desire to deploy Cisco Firepower and FireEye NX but resistance to deploy inline • Wanted future-proof solution, fault tolerant with High Availability • 18 month project initially with 7 SIs bidding! CHALLENGE • GigaSECURE Security Delivery Platform architecture • 26 GigaVUE-HC2, 40 bypass modules including • Gigamon Resilient Inline Protection • GigaVUE-FMSOLUTION Overview • Global bank serving 18.9 million customers with total assets of £800 billion • Headquarters in the UK
  • 36. 36©2018 Gigamon. All rights reserved. 5 YEARS TCO CAPEX OPEX CAPEX OPEX CAPEX OPEX IPS $3,100,000 $3,100,000 $1,330,000 $1,330,000 $1,770,000 $1,770,000 4xIPS to 2xIPS APT $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xAPT to 2xAPT WAF $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xWAF to 2xWAF APM / NPM $2,000,000 $2,000,000 $1,000,000 $1,000,000 $1,000,000 $1,000,000 2xAPM/NPM to 1xAPM/NPM SIEM $2,000,000 $700,000 $1,000,000 $500,000 $1,000,000 $200,000 Traffic capacity can be reduced Cloud Tools $4,000,000 $2,000,000 $2,000,000 $7,770,000 $8,970,000 $16,740,000 Savings (USD)With GigamonWithout Gigamon Equipment Remarks / Assumption Total Savings (CAPEX + OPEX) Total Savings Estimated Cost Saving Based on 5 Years TCO
  • 39. Local Customer Use Case Inline Bypass Solution Daniel Ong Channel Account Manager Gigamon
  • 40. 40©2018 Gigamon. All rights reserved. Major Banking Group in Thailand CISCO ACI VISIBILITY • Rapid visibility for better security – Improved visibility on ACI (40G) network. • Increased network availability and security. • Holistic security architecture – Easy to manage SPAN traffic request. • Ready for troubleshooting at any time.RESULTS • Can’t monitor traffic (VXLAN) between Spine and Leaf of Cisco ACI (40G). • Can’t terminate ER SPAN tunnel to consolidate traffic. • Need to send out huge traffic to the right tool at the right time. • Limited visibility and lack of control.CHALLENGE • GigaTAP and GigaSMART: Header Striping • Send specific protocol to tools for analysis. • IP tunnelling to monitor across two site. • GigaSTREAM aids in load sharing traffic into multiple tools according to current and planned tools throughput. SOLUTION
  • 41. 41©2018 Gigamon. All rights reserved. DC & DR Deployment Major Banking Group in Thailand CISCO ACI VISIBILITY
  • 42. 42©2018 Gigamon. All rights reserved. Chemical Industry Customer in Thailand INLINE BYPASS SOLUTION • Integrated full Inline Bypass solution for NGFW and ATP. • Intelligent traffic delivery – Able to specific traffic direction by load sharing solutions.RESULTS • No solution for bypass module on ATP appliance. • Lack of load balancing solutions between NGFW and ATP appliance. • Security tools impact network uptime.CHALLENGE • HC1 appliance with Inline Bypass Modules. • 1 Gbps copper solution. SOLUTION
  • 43. 43©2018 Gigamon. All rights reserved. Inline Diagram with Active-Active NGFW Chemical Industry Customer in Thailand INLINE BYPASS SOLUTION
  • 47. Power Your Tools to Prevent Threats See what matters.™ Koay Choon Ping Sales Engineer, South East Asia Gigamon
  • 48. 48©2018 Gigamon. All rights reserved. BACKGROUND: • Founded in 2004 • Headquarters: Santa Clara, CA, U.S. • Global Offices: 20 countries • 799 employees • Over 2,500 customers Gigamon Visibility Platform provides pervasive visibility into data in motion across your entire network, enabling stronger security and network performance. See what matters.™ PERFORMANCE: • World’s #1 Visibility Platform • Named #1 Network Monitoring Equipment (NME) Vendor Worldwide by Market Share* • Key Verticals: Federal, Financial Services, Healthcare, Retail, Technology, Service Providers • $311M Revenue in FY16, +40% Year-over-Year ©2017 Gigamon. All rights reserved. Corporate Overview *Source: IHS Markit Report, Network Monitoring Equipment, May 19, 2017
  • 49. 49©2018 Gigamon. All rights reserved. Internet Public Cloud ✕ Significant blind spots ✕ Extraordinary costs ✕ Contention for access to traffic ✕ Inconsistent view of traffic ✕ Blind to encrypted traffic ✕ Too many false positives Challenges with Ad Hoc Security Deployments User Behavior Analytics Advanced Persistent Threat Email Threat Detection SIEM Next-Generation Firewall Data Loss Prevention SIEM Data Loss Prevention User Behavior Analytics Next-Generation Firewall Advanced Persistent Threat Email Threat Detection Data Loss Prevention Next-Generation Firewall Email Threat Detection Advanced Persistent Threat SIEM User Behavior Analytics Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm It is time the balance of power shifted from attacker to defender! VISIBILITY LIMITED TO A POINT IN TIME OR PLACE
  • 50. 50©2018 Gigamon. All rights reserved. Internet Public Cloud: AWS Security Delivery Platform: “See Everything” A Foundational Building Block To Effective Security Data Loss Prevention Data Loss PreventionData Loss Prevention IPS (Inline) IPS (Inline) IPS (Inline) Email Threat Detection Email Threat Detection Email Threat Detection Forensics Forensics Forensics Intrusion Detection System Intrusion Detection System Intrusion Detection System Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Anti-Malware (Inline) Anti-Malware (Inline) Anti-Malware (Inline) Intrusion Detection System Data Loss Prevention Email Threat Detection IPS (Inline) Anti-Malware (Inline) Forensics  All tools still connected  Fewer network touch points  Enhanced tool efficiency  Decreased OPEX costs Physical, Virtual and Cloud Metadata Engine (NetFlow / IPFIX) Application Session Filtering SSL Decryption Inline Bypass
  • 51. 51©2018 Gigamon. All rights reserved. Gigamon Data-in-Motion Visibility Platform Any Network Data Center, Hybrid and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites Tools & Applications Security | Experience Management | Performance Monitoring | Analytics Tools and Applications
  • 52. 52©2018 Gigamon. All rights reserved. Network & Application Performance Management Gigamon Partner Ecosystem Security and Vulnerability Management Service Provider InfrastructureInfrastructure
  • 54. 54©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon Eliminate SPAN Port Contention Few Span Ports, Many Tools Customer is unable to use all tools! Customer has complete visibility for all tools! Switch with two SPAN session limitation Intrusion Detection System (IDS) Application Performance Management VoIP Analyzer Packet Capture Application Performance Management Intrusion Detection System (IDS) Packet Capture VoIP AnalyzerSwitch with two SPAN ports
  • 55. 55©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon Limited Access to Environment Limited Tool Ports, Many Switches Limited Connectivity to Full Environment Pervasive Access – Can Connect to All Points in the Environment Analysis tool with only 2 NICs Switch 1 Switch 2 Switch 3 Switch 4 Switch 5…n Analysis tool with only 2 NICs Switch 1 Switch 2 Switch 3 Switch 4 Switch 5…n
  • 56. 56©2018 Gigamon. All rights reserved. Without Gigamon Run Multiple POCs in Parallel Accelerate Certification Of New Tools Customer performs each Proof-of-Concept (POC) serially at different times using different data Customer is able to run multiple POCs concurrently using same data With Gigamon POC #1 – Vendor X Tool POC #2 – Vendor Y Tool POC #3 – Vendor Z Tool 1 month 2 month 3 month POC #1 Vendor X Tool POC #2 Vendor Y Tool POC #3 Vendor Z Tool 1 month 2 month 3 month Tool tested w/ NW Segment – 4 weeks Tool tested w/ same NW Segment – 4 weeks Tool tested w/ same NW Segment – 4 weeks
  • 57. 57©2018 Gigamon. All rights reserved. GigaVUE® Matches Your Network to Your Tools Without Gigamon With Gigamon Change Media and Speed 10, 40 Or 100Gbps Traffic To 1Gbps or 10Gbps Tools 10Gb 1Gb Customer migrates to a 10Gb network and 1Gb monitoring tools become useless Customer able to extend the life of their 1Gb network and security tools VoIP Analyzer Application Performance Management Intrusion Detection System (IDS) Packet Capture Intrusion Detection System VoIP Monitor Application Performance Management Packet Capture
  • 58. 58©2018 Gigamon. All rights reserved. • Maximize tool efficacy • Increase scale of security monitoring • Add, remove, and upgrade tools seamlessly • Consolidate multiple points of failure into a single, bypass- protected solution • Integrate inline, out-of-band, flow-based tools and metadata via a Security Delivery Platform Active Security Remediation with Inline Bypass SCALING INLINE SECURITY WITH INLINE BYPASS T1 T2 T3 E.g. WAN router E.g. Firewall E.g. IPS E.g. WAF E.g. ATD E.g. Core switch T1 T2 T3T3T3 IPS WAF ATDATDATD T1 IPS
  • 59. 59©2018 Gigamon. All rights reserved. • L2-L4 Map rules – tcp port, ip subnet, vlan, etc. • Map priorities applies – Use this to your advantage • Customized inspection for each map – Web: NGFW + IPS + WAF – Email: NGFW + ATD – Database: NGFW + IPS + ATD – Unspecified: NGFW + IPS Inline Map Definition Flexible Inline Arrangements BASIC CONCEPT: TRAFFIC SLICES  INLINE MAPS Web Email Database Unspecified Traffic Slices for Inspection
  • 60. 60©2018 Gigamon. All rights reserved. Intent-based, Drag-and-Drop Configuration
  • 61. 61©2018 Gigamon. All rights reserved. Introducing Inline SSL Solution FIRST INLINE SSL SOLUTION INTEGRATED IN A VISIBILITY PLATFORM Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Malware and its actions lay hidden in the night Then came Gigamon Inline SSL and all was light
  • 62. 62©2018 Gigamon. All rights reserved. SSL Decryption Out-of-Band SSL Decryption using Security Delivery Platform IDS at the Perimeter Anti-Malware for Web Apps APM at the Server Rack DLP at Remote Sites Router Firewall with SSL Proxy Switch Router Firewall with SSL Proxy Switch Router Router HQ Database IDS APM DLPAnti- Malware SSL Decryption SSL Decryption SSL Decryption TAP TAP WorkstationsFirewall with SSL Proxy LAN SSL Decryption Server Rack Branch
  • 63. 63©2018 Gigamon. All rights reserved. Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. SSL Decryption on Gigamon Products Encrypted Traffic Decrypted / Unencrypted Traffic Internet Servers Corporate Servers Clients NGFW IPS Network Forensics Anti-malware Active, Inline Appliance(s) Passive, Out-of-Band Appliance(s) • Corporate servers • Enterprise has server keys • RSA key exchange • Supported Since 2014 1 • Corporate servers • Diffie-Hellman (DH) key exchange • Emerging TLS 1.3 standard • Need to be inline to decrypt SSL 2 • Internet Servers or SaaS services • Enterprise does not have server keys • Need to be inline to decrypt SSL 3 ? Clients Internet 1 RSA 2 DH, PFS 3 RSA/DH
  • 64. 64©2018 Gigamon. All rights reserved. Inline Tool Group (decrypted traffic) Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Gigamon Inline SSL Visibility Solution Highlights • Servers and clients located internally or externally • Private keys not needed • RSA, DH, PFS can be used • Supports inline and out-of-band tools Out-of-Band Tool (decrypted traffic) SSL Session Leg 1 (encrypted) SSL Session Leg 2 (encrypted) 1 2 2 3 Web Monitor Tool (decrypted traffic) Encrypted traffic Decrypted traffic
  • 65. 65©2018 Gigamon. All rights reserved. • Maximize tool efficacy • Increase scale of security monitoring • Add, remove, and upgrade tools seamlessly • Consolidate multiple points of failure into a single, bypass- protected solution • Integrate inline, out-of-band, flow-based tools and metadata via a Security Delivery Platform Active Security Remediation with Inline Bypass SCALING INLINE SECURITY WITH INLINE BYPASS T1 T2 T3 E.g. WAN router E.g. Firewall E.g. IPS E.g. WAF E.g. ATD E.g. Core switch T1 T2 T3T3T3 IPS WAF ATDATDATD T1 IPS
  • 66. 66©2018 Gigamon. All rights reserved. Inline tool (decrypted traffic) Respecting Data Privacy: URL Categorization Internet Webroot • Supports up to 83 Web categories (Finance, Government…) • Flexible policies based on multiple parameters (IP, Ports, VLAN, domain, categories) • Whitelists and blacklists with over 5000 domain names Banking Website (e.g. Citi) Health care Website (e.g. Aetna) File sharing Website (e.g. Dropbox)
  • 67. 67©2018 Gigamon. All rights reserved. Gigamon Inline SSL Deployment Benefits of Gigamon Inline SSL Approach The GigaVUE-HC2 is capable of adding a single inline security tool, but it does not unlock the true potential of the unit. Scalable GigaSMART® • Inline SSL Decryption
  • 68. 68©2018 Gigamon. All rights reserved. Benefits of Gigamon Inline SSL Approach Adding new inline tools One single GigaVUE-HC2 is capable of adding multiple tools
  • 69. 69©2018 Gigamon. All rights reserved. Benefits of Gigamon Inline SSL Approach Adding new network segment One single GigaVUE-HC2 is capable of protecting multiple network links
  • 70. 70©2018 Gigamon. All rights reserved. Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Benefits of Gigamon Inline SSL Approach Increase inline SSL throughput The GigaVUE-HC2 is a true Security Delivery Platform that provides all this functionality in a scalable, modular form factor • Bypass protection • Multiple inline tools • Multiple network links • Traffic Intelligence Scalable GigaSMART® • Inline SSL Decryption
  • 71. 71©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon NetFlow/IPFIX Generation Challenges: • High impact on routers and switches for generating NetFlow records • Routers / switches generate sampled NetFlow which is inadequate for security • Some routers do not support NetFlow, others have proprietary flow methods • Without NetFlow, you can only instrument parts of your network for Deep Packet Inspection (DPI) Generating NetFlow Information: • With NetFlow, you know where you need to DPI. • Enable end-to-end security enforcement with visibility into every flow • Ideal to detect Command and Control communications • Validated with I ndustry-leading SIEM and NetFlow forensics collectors
  • 72. 72©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon Metadata Engine Volume, types and amount of data overwhelm SIEMs Metadata Engine Benefits: • High Performance • Cost Savings • Full visibility, better security
  • 73. 73©2018 Gigamon. All rights reserved. * Planned Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Metadata Enhancements Uncover Denial of Service & compromise of internal web servers HTTP Response Codes Discover malicious communications to C&C servers using DNS transactions DNS Discovery DNS C&C Bots Analyze HTTPS certificates to discover bad/suspicious certificates HTTPS Certificate Anomalies
  • 74. 74©2018 Gigamon. All rights reserved. Example Use Case for GigaVUE-HC2 Intrusion Prevention Systems Email Inspection Data Loss Prevention NetFlow Collector GigaStream™ Intrusion Detection System NetFlow Generation SSL Decryption Internet Edge Routers Core Switches Out-of-Band Malware
  • 75. Visibility into Private Cloud VMware ESX and NSX
  • 76. 76©2018 Gigamon. All rights reserved. Network Traffic Visibility For Cross Network Workloads Challenges VM VM VM VM VM VM VIRTUALIZE • SPAN on Switch Ports • Physical TAPs Switch TRADITIONAL VISIBILITY • Blind spots for Inter-Host VM traffic • Blind spots for Intra-Host VM traffic (blade center) VIRTUAL VISIBILITY CHALLENGES SERVER SERVER Switch Security and Application Monitoring are forcing considerations!!! SERVER SERVER Hypervisor Hypervisor
  • 77. 77©2018 Gigamon. All rights reserved. 1. Security no longer an after-thought during virtualization 2. Increasing VM density with mission-critical workloads 3. Visibility into VM-VM traffic needed for Security and Application Performance Monitoring (APM) 4. Creating new virtual instances of tools affects workload performance 5. Automated visibility after VM migration Virtual Visibility: More Important Than Ever 5 REASONS WHY YOU MUST CARE HYPERVISOR SERVER VIRTUAL IDS VM1 VIRTUAL ANTI- MALWARE VIRTUAL APM VM HYPERVISOR SERVER GigaVUE-VM IDS ANTI-MALWARE APM VIRTUAL SWITCH VIRTUAL SWITCH
  • 78. 78©2018 Gigamon. All rights reserved. GigaVUE-VM Light Footprint Virtual Machine, Not Kernel Module
  • 79. 79©2018 Gigamon. All rights reserved. GigaVUE-VM: Virtual Workload Monitoring Enhanced for Software Defined Data Centers (SDDC) • vCenter integration • Bulk GigaVUE-VM onboarding • Virtual traffic policy creation • Automatic migration of monitoring policiesGigaVUE-FM Private Cloud SERVER I SERVER II Application Performance Network Management Security Virtual Traffic Policies Tunneling Internet Production Network Tools and Analytics
  • 80. 80©2018 Gigamon. All rights reserved. GigaVUE-VM VM3 Hypervisor vSwitch • Integration with vCenter to detect vMotion • Automated re-deployment of rules that follow the VM Visibility in Motion Automated Monitoring Policy Management Hypervisor vSwitch VM1VM1VM1VM1VM1 VM2 GigaVUE-FM vMotion InitiatevMotion Notify GigaVUE-VM Monitor VM1 UpdateUpdate Application Performance Network Management Security
  • 81. 81©2018 Gigamon. All rights reserved. • Logical (virtual) networks that are decoupled from underlying physical network • All intelligence moved to the virtual edge (inside a server) • Creation of overlay (virtual network) that is separate from underlay (physical network) • Benefits: – Create virtual networks independent of physical network topology – Ability to rapidly make network changes based on application/tenant needs Gigamon Value Prop: Preserve and extend monitoring tools by offloading new encapsulations or by providing tenant-level visibility. Network Virtualization: VMware NSX Multi-Tenant Networks Existing Physical Network Virtual Networks “Network hypervisor” (NSX) Internet
  • 82. 82©2018 Gigamon. All rights reserved. Dynamic ‘Traffic Visibility Service’ Insertion Internet Security/Monitor Admin “Copy Packet” GigaVUE-FM Tools and Analytics Application Performance Network Management Security Monitoring Policy
  • 83. 83©2018 Gigamon. All rights reserved. REST APIs Software-Defined Visibility Internet SDDC / Cloud Monitoring – Tenant and Application Visibility SSL Decryption NetFlow / IPFIX Generation Application Session Filtering Adaptive Packet Filtering Header Stripping APM Anti-Malware IDS DLP Network Forensics APT Centralized Tools Application Performance Network Performance Customer Experience Security Monitoring De-cap VXLAN Virtual Traffic VXLAN=6000 SSL Decrypted NetFlow / IPFIX TAPs GigaVUE-VM Filtered and Sliced Virtual Traffic NSX APIs, Gigamon Service Insertion vCenter APIs, Events vCenter NSX Manager GigaVUE-FM 2. Apply “Visibility” Policy GigaVUE-VM vRealize Automation (vRA) 1. Deploy new Tenants and Applications 2. Apply “Visibility” Policy
  • 84. 84©2018 Gigamon. All rights reserved. Partner Solution Categories and Integration Options Solution Category Integration Options SDDC Operations and Visibility Port Mirroring, NSX-API, NetX Automated Traffic Visibility for VMware powered SDDC
  • 86. 88©2018 Gigamon. All rights reserved. Public Cloud Visibility Challenges and Gigamon Solution Gigamon Visibility Platform Database Web Tier App Tier Load Balancer Tool Tier Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Load Balancer RDS Web Tier App Tier ELB ELB Tool Tier Region AZ VPC Database Web Tier App Tier Load Balancer Load Balancer Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Visibility Tier GigaVUE-FM Tool Tier X Inability to access all traffic X Discrete vendor monitoring agents per instance X Impacts workload and virtual network performance X Static visibility with heavy disruption  Minimize agent overload  Aggregate, select, optimize, and distribute traffic  Customize orchestration and single-pane-of-glass visualization  Elastic Visibility with ATS as workloads scale-out Load Balancer Subnet Database Availability Zone (AZ)ToolInstances
  • 87. 89©2018 Gigamon. All rights reserved. Economic Benefits of Using Single Gigamon Agent vs. Multiple Agents Compares 1 Gigamon agent to 1- 8 tool agents Assumptions • Average traffic bandwidth of 250Mbps per Amazon EC2 instance monitored • Starting Amazon EC2 instance of type c4.large
  • 88. 90©2018 Gigamon. All rights reserved. Network & Application Performance Management Visibility Platform for AWS: Cloud Validated Tools Security and Vulnerability Management Infrastructure Open Source
  • 90. 92©2018 Gigamon. All rights reserved. Multi-cloud: Hybrid Cloud Visibility PRESERVE TOOL INVESTMENT Web tier App tier Azure Load Balancing Azure Load Balancing Azure SQL Database Virtual Network Visibility tier Tool tier Availability Zone Region Web tier Elastic Load Balancing App tier Elastic Load Balancing Amazon RDS Visibility tier Tool tier Amazon CloudWatch On-Premises Data Center Azure API Management Tool Tier GigaVUE-FM TunnelingTunneling
  • 91. 93©2018 Gigamon. All rights reserved. Multi-cloud: Centralized Visibility and Security PRESERVE TOOL INVESTMENT On-Premises Data Center Security, Performance Management, and Analytics Tools Applications Web tier Web tier SecOps VPC GigaVUE-FM Amazon CloudWatch Visibility tier Visibility tier Tool tier Web tier App tier Visibility tier Azure API Management AWS Direct Connect Azure ExpressRoute Applications
  • 93. Q&A Session Mona Yam Regional Sales Director Gigamon Sittipong Nateeprasittiporn Product Manager nForce Secure Co.,Ltd.
  • 94. Closing Remarks Mona Yam Regional Sales Director Gigamon