SlideShare a Scribd company logo
Gigamon Cyber Security Roadshow
THAILAND
Date: 16th May 2018
Venue: ETDA (Electronic Transactions Development Agency)
Welcome Address
Mona Yam
Regional Sales Director
Gigamon
4©2018 Gigamon. All rights reserved.
Time Agenda Speaker
1:10 – 1:50 pm Top Cyberthreats and The Road Ahead Graham Melville
Sr. Director, Security Solutions
Gigamon
1:50 – 2:35 pm Customer Use Case Daniel Ong
Channel Account Manager
Gigamon
2:35 – 2:55 pm Networking and Tea Break
2:55 – 3:45 pm Power Your Tools to Prevent Threats Koay Choon Ping
Sales Engineer, South East Asia
Gigamon
3:45 – 4:05 pm Q&A Session
4:05 – 4:15 pm Closing Remarks Mona Yam
Regional Sales Director
Gigamon
Agenda
Top Cyberthreats and The Road Ahead
Graham Melville
Senior Director, Security Solutions
Gigamon
6©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
7©2018 Gigamon. All rights reserved.
• 27-question online survey conducted in Nov. 2017
– IT security decision maker or practitioner
– Employed by organization with at least 500 employees
• Survey designed to assess:
– Organization’s security posture
– Perceptions of cyberthreats and IT security challenges
– Current and future IT security investments
– IT security practices and strategies
About The Cyberthreat Defense Report
7
8©2018 Gigamon. All rights reserved.
Survey Demographics
8
Respondents by employee countRespondents by country
1,200 respondents | 17 countries | 19 industries
9©2018 Gigamon. All rights reserved.
Breaches are Inevitable
Organizations are falling victim to
cyberattacks at an alarming rate …
Percentage compromised at least
once, by country
10©2018 Gigamon. All rights reserved.
Pessimism is the New Reality
… and they are expecting
more of the same in 2018.
Likelihood of successful attack
Percentage who believe a successful
cyberattack is more likely than not, by country
11©2018 Gigamon. All rights reserved.
Challenges
URGENCY
COMPLEXITYSPEED
COST
SKILLS
SHORTAGE
12©2018 Gigamon. All rights reserved.
A Skills Shortage Is The Top Issue
‘Lack of skilled personnel’ edges out ‘Low security
awareness among employees’ for the first time in
five years!
13©2018 Gigamon. All rights reserved.
IT Security Skills Shortage
IT security admins, analysts, and
architects are in highest demand.
14©2018 Gigamon. All rights reserved.
The Speed Issue
Too much data to analyze continues to be a
major issue for organizations.
15©2018 Gigamon. All rights reserved.
The Data-in-Motion Dilemma
VOLUME + SPEED + THREATS = COMPLEXITY + RISK + COST
*Cisco Global Cloud Index 2016.
**Statista Global machine-to-machine (M2M) data traffic from 2014 to 2019 (in petabytes per month)
Time
Volume
Network Data
Security Tool
Security tools do not
scale as fast as data
Data Center
transition to 100GbEmergence
of Big Data
Internet
of Things
Machine to
Machine
4.7ZB of global data
center traffic in 2016*
1.7PB of M2M
traffic in 2017**
6.7 ns available to
process a network
packet on a 100Gb link
16©2018 Gigamon. All rights reserved.
Complexity
Too many product, Too hard to
manage, No interoperability.
17©2018 Gigamon. All rights reserved.
CYBERscape: The Cybersecurity Landscape. Source: Momentum Partners. https://momentumcyber.com/docs/CYBERscape.pdf
18©2018 Gigamon. All rights reserved.
Urgency - Vulnerability Patching Challenges
‘Infrequent patching windows’ and ‘lack of qualified
personnel’ inhibit organizations from patching more
rapidly.
19©2018 Gigamon. All rights reserved.
Rising IT Security Budgets
In response, enterprises are increasing their
security budgets by 4.7% in 2018, globally.
By country:
By industry:
By size:
20©2018 Gigamon. All rights reserved.
2018 Cyberthreat Defense Report, CyberEdge Group, 2018
Costs
FIREWALL
IDS
IPS
NAC
ANTI-MALWARE
DLP
WAF
NEXTGEN FW
NBA
NAT
EMAIL SECURITY
APT
FIREWALL
ANTI VIRUS
Budgets are rising but can they
keep up with the increasing need?
21©2018 Gigamon. All rights reserved.
Cyberthreat Hunting Investments
Only a third of respondents are
fully confident in their cyberthreat
hunting investments.
22©2018 Gigamon. All rights reserved.
Security Fundamentals Are Changing
A NEW APPROACH TO SECURITY IS REQUIRED
URGENCYCOMPLEXITYSPEED COSTSKILLS
SHORTAGE
Time to detection and
Time to containment
are too slow
Breaches
continue to happen
23©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
24©2018 Gigamon. All rights reserved.
Internet
Public
Cloud
✕ To many products not enough staff
✕ Hard to keep up with increasing network
speed
✕ Complex with significant blind spots
✕ Difficult to patch security devices
✕ Extraordinary costs
✕ Contention for access to traffic
✕ Inconsistent view of traffic
✕ Too many false positives
✕ Blind to or high cost for encrypted traffic
Challenges with Security Deployments
VISIBILITY LIMITED TO A POINT IN TIME OR PLACE
User Behavior
Analytics
Advanced
Persistent
Threat
Email Threat
Detection
SIEM
Next-Generation
Firewall
Data Loss
Prevention
SIEM
Data Loss
Prevention
User Behavior
Analytics
Next-Generation
Firewall
Advanced
Persistent
Threat
Email Threat
Detection
Data Loss
Prevention
Next-Generation
Firewall
Email Threat
Detection
Advanced
Persistent
Threat
SIEM
User Behavior
Analytics
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
Poor architectural choices will lead to poor results!
25©2018 Gigamon. All rights reserved.
• With this approach, you:
– Detect and block threats immediately
– Deploy and operate transparently, aka “Bump on the wire” or “Layer 2 mode”
• No need to change routing configurations or endpoints
• But it introduces challenges for both network and security teams:
– Introduces multiple points of failure
– Physical interfaces must match the network
– Degrades network and application performance
– Wastes cycles on traffic it cannot analyze
– Does not scale to network speeds
– Disruptive to upgrade or replace
– Cannot be moved to or from out-of-band operation (detection vs. prevention)
– Asymmetric routing of traffic circumvents tools’ ability to inspect whole sessions
IPS = Intrusion Prevention System; WAF = Web Application Firewall; ATP = Advanced Threat Prevention
Inline Prevention Security Tools
WAN router
Firewall
IPS
WAF
Core switch
ATP
26©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
27©2018 Gigamon. All rights reserved.
GigaSECURE® Security Delivery Platform
THE WORLDS LEADING NEXT GENERATION NETWORK PACKET BROKER
Internet
Public
Cloud
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
Isolation of
applications for
targeted inspection
Visibility to
encrypted traffic for
threat detection
Inline bypass for
connected security
applications
A complete
network-wide reach
Scalable metadata
extraction for
improved forensics
Security Delivery Platform
Next-Generation
Firewall
User Behavior
Analytics
Data Loss
Prevention
Email Threat
Detection
Advanced
Persistent Threat
SIEM
Security Delivery Platform
Isolation of
applications for
targeted inspection
Visibility to
encrypted traffic for
threat detection
Inline bypass for
connected security
applications
A complete
network-wide reach:
physical and virtual
Scalable metadata
extraction for
improved forensics
Physical, Virtual
and Cloud
Metadata
Generation
Application
Session Filtering
SSL
Decryption
Inline
Bypass
On-premise
Data Center
Remote
Sites
Public
Cloud
Cisco ACI Private
Cloud
28©2018 Gigamon. All rights reserved.
Super Charge Existing SOC/ NOC
• Centralized tools
• Traffic backhauled to
centralized tools
• Full traffic flows
• NetFlow/IPFIX flow records
• Metadata of interest
• De-duplicate before
backhaul
• Ideal for both service
providers & enterprises
Security Operations / Network Operations
GigaVUE-HC2GigaVUE-HD8
Remote Site
GigaVUE-HC1
Remote Site
GigaVUE-HC1
Remote Site
GigaVUE-HC1
29©2018 Gigamon. All rights reserved.
Ready for Future Multi-cloud: Hybrid Cloud Visibility
PRESERVE TOOL INVESTMENT
Web
tier
App
tier
Azure Load
Balancing
Azure Load
Balancing
Azure SQL
Database
Virtual Network
Visibility tier
Tool
tier
Availability Zone
Region
Web
tier
Elastic Load
Balancing
App
tier
Elastic Load
Balancing
Amazon
RDS
Visibility tier
Tool
tier
Amazon
CloudWatch
On-Premises Data Center
Azure API
Management
Tool
Tier
GigaVUE-FM
TunnelingTunneling
30©2018 Gigamon. All rights reserved.
Agenda
Industry Challenges We Are Facing1
A Look At The Inline Problem
A Better Way
Real World Results
2
3
4
31©2018 Gigamon. All rights reserved.
Based on 2017 Fortune list and customer data from Q1 2018, Fortune is part of Time Inc.
Top Lists based on FY2016 data.
“Top 50 Banks in the World," Banks around the World. June 30, 2016. Retrieved from: http://www.relbanks.com/worlds-top-banks/assets
Laura Lorenzetti, "The 10 biggest health-care companies in the Fortune 500," Fortune, June 20, 2015. Retrieved from: https://gigamon.my.salesforce.com/00O14000008ef5s
Data Set: Top US Government Agencies by Contract Spending (FY 2016), GovWin from Deltek. Accessed Feb. 7, 2017.
Samantha Sharf, "The World's Largest Tech Companies: Apple Beats Samsung, Microsoft And Alphabet," Forbes, May 26, 2016. Retrieved from:
http://www.forbes.com/sites/samanthasharf/2016/05/26/the-worlds-largest-tech-companies-2016-apple-bests-samsung-microsoft-and-alphabet/#ed4f6fc89ee4
"Stores Top Retailers 2016," Kantar Retail, National Retail Federation, 2016. Retrieved from: https://nrf.com/resources/annual-retailer-lists/top-100-retailers/stores-top-retailers-2016
"The World's Biggest Public Companies," Forbes, June 2, 2016. Retrieved from: https://en.wikipedia.org/wiki/List_of_telephone_operating_companies
Who Deploys Gigamon?
MANY OF THE WORLD’S LEADING ORGANIZATIONS INCLUDING:
32©2018 Gigamon. All rights reserved.
As of Feb 2017
Gigamon Customers
SERVICE PROVIDERFEDERAL
TECHNOLOGY
GENERAL
ENTERPRISE / MISC
RETAIL /
SERVICES FINANCE
HEALTHCARE
/INSURANCE
ENTERPRISE
33©2018 Gigamon. All rights reserved.
SERVICE PROVIDERFEDERAL
TECHNOLOGY
GENERAL
ENTERPRISE / MISC
RETAIL /
SERVICES FINANCE
HEALTHCARE
/INSURANCE
ENTERPRISE
Customer data as of Q1 2018
Gigamon Customers
2,800+
End Customers
34©2018 Gigamon. All rights reserved.
34
Case Study
• Reduced Cost: $20M+ in TCO savings with GigaSECURE architecture
• Mitigated Risk to ‘Build with Confidence’: Helped bank identify network
assets and proactively solve deployment issues upfront
• Faster Time to Response: Reduced a 5-day P1 incident by 95% preventing
reputation loss, avoiding bad publicity and increasing customer experience
RESULTS
• Key security initiatives (IPS, APT, Email Protection) to protect customers and meet
security compliance requirements were costing significant CAPEX
• Big concerns about adding prevention tools inline due to network resiliency
concerns and environment complexity
• Limited network visibility for security detection and threat hunting initiatives,
leading to poor ROI / outcomes with existing toolsets
CHALLENGE
• Two-part solution:
• Ph. 1: Leverage Inline Bypass for prevention tools in core network
• Ph. 2: Feed data from data centers, edge to to out-of-band detection tools
SOLUTION
Overview
• Large international bank
serving 13 million
customers
• Decided to in-house
security after many years
of outsourcing challenges
35©2018 Gigamon. All rights reserved.
35
Case Study
• Maximize uptime: Deployed IPS with minimal production changes
• Increased operational agility with decreased risk: Ability to switch
between IPS and IDS modes instantaneously
• Investment protection: Roadmap for future expansion with GigaSMART
functionality such as SSL, de-duplication, NetFlow
RESULTS
• High cost and potential impact from traffic volume of IDS/IPS deployment
in new data center
• Desire to deploy Cisco Firepower and FireEye NX but resistance to
deploy inline
• Wanted future-proof solution, fault tolerant with High Availability
• 18 month project initially with 7 SIs bidding!
CHALLENGE
• GigaSECURE Security Delivery Platform architecture
• 26 GigaVUE-HC2, 40 bypass modules including
• Gigamon Resilient Inline Protection
• GigaVUE-FMSOLUTION
Overview
• Global bank serving 18.9
million customers with total
assets of £800 billion
• Headquarters in the UK
36©2018 Gigamon. All rights reserved.
5 YEARS TCO
CAPEX OPEX CAPEX OPEX CAPEX OPEX
IPS $3,100,000 $3,100,000 $1,330,000 $1,330,000 $1,770,000 $1,770,000 4xIPS to 2xIPS
APT $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xAPT to 2xAPT
WAF $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xWAF to 2xWAF
APM / NPM $2,000,000 $2,000,000 $1,000,000 $1,000,000 $1,000,000 $1,000,000 2xAPM/NPM to 1xAPM/NPM
SIEM $2,000,000 $700,000 $1,000,000 $500,000 $1,000,000 $200,000 Traffic capacity can be reduced
Cloud Tools $4,000,000 $2,000,000 $2,000,000
$7,770,000 $8,970,000
$16,740,000
Savings (USD)With GigamonWithout Gigamon
Equipment Remarks / Assumption
Total Savings (CAPEX + OPEX)
Total Savings
Estimated Cost Saving Based on 5 Years TCO
Questions?
Thank You!
Local Customer Use Case
Inline Bypass Solution
Daniel Ong
Channel Account Manager
Gigamon
40©2018 Gigamon. All rights reserved.
Major Banking Group in Thailand
CISCO ACI VISIBILITY
• Rapid visibility for better security – Improved visibility on ACI (40G) network.
• Increased network availability and security.
• Holistic security architecture – Easy to manage SPAN traffic request.
• Ready for troubleshooting at any time.RESULTS
• Can’t monitor traffic (VXLAN) between Spine and Leaf of Cisco ACI (40G).
• Can’t terminate ER SPAN tunnel to consolidate traffic.
• Need to send out huge traffic to the right tool at the right time.
• Limited visibility and lack of control.CHALLENGE
• GigaTAP and GigaSMART: Header Striping
• Send specific protocol to tools for analysis.
• IP tunnelling to monitor across two site.
• GigaSTREAM aids in load sharing traffic into multiple tools according to current and planned
tools throughput.
SOLUTION
41©2018 Gigamon. All rights reserved.
DC & DR Deployment
Major Banking Group in Thailand
CISCO ACI VISIBILITY
42©2018 Gigamon. All rights reserved.
Chemical Industry Customer in Thailand
INLINE BYPASS SOLUTION
• Integrated full Inline Bypass solution for NGFW and ATP.
• Intelligent traffic delivery – Able to specific traffic direction by load sharing
solutions.RESULTS
• No solution for bypass module on ATP appliance.
• Lack of load balancing solutions between NGFW and ATP appliance.
• Security tools impact network uptime.CHALLENGE
• HC1 appliance with Inline Bypass Modules.
• 1 Gbps copper solution.
SOLUTION
43©2018 Gigamon. All rights reserved.
Inline Diagram with Active-Active NGFW
Chemical Industry Customer in Thailand
INLINE BYPASS SOLUTION
Thank You!
Tea Break
Power Your Tools to Prevent Threats
See what matters.™
Koay Choon Ping
Sales Engineer, South East Asia
Gigamon
48©2018 Gigamon. All rights reserved.
BACKGROUND:
• Founded in 2004
• Headquarters: Santa Clara, CA, U.S.
• Global Offices: 20 countries
• 799 employees
• Over 2,500 customers
Gigamon Visibility Platform provides pervasive visibility into
data in motion across your entire network, enabling stronger
security and network performance.
See what matters.™
PERFORMANCE:
• World’s #1 Visibility Platform
• Named #1 Network Monitoring Equipment (NME)
Vendor Worldwide by Market Share*
• Key Verticals: Federal, Financial Services,
Healthcare, Retail, Technology, Service Providers
• $311M Revenue in FY16, +40% Year-over-Year
©2017 Gigamon. All rights reserved.
Corporate Overview
*Source: IHS Markit Report, Network Monitoring Equipment, May 19, 2017
49©2018 Gigamon. All rights reserved.
Internet
Public
Cloud
✕ Significant blind spots
✕ Extraordinary costs
✕ Contention for access to traffic
✕ Inconsistent view of traffic
✕ Blind to encrypted traffic
✕ Too many false positives
Challenges with Ad Hoc Security Deployments
User Behavior
Analytics
Advanced
Persistent
Threat
Email Threat
Detection
SIEM
Next-Generation
Firewall
Data Loss
Prevention
SIEM
Data Loss
Prevention
User Behavior
Analytics
Next-Generation
Firewall
Advanced
Persistent
Threat
Email Threat
Detection
Data Loss
Prevention
Next-Generation
Firewall
Email Threat
Detection
Advanced
Persistent
Threat
SIEM
User Behavior
Analytics
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
It is time the balance of power shifted from attacker to defender!
VISIBILITY LIMITED TO A POINT IN TIME OR PLACE
50©2018 Gigamon. All rights reserved.
Internet
Public
Cloud: AWS
Security Delivery Platform: “See Everything”
A Foundational Building Block To Effective Security
Data Loss
Prevention
Data Loss
PreventionData Loss
Prevention
IPS
(Inline)
IPS
(Inline)
IPS
(Inline)
Email Threat
Detection
Email Threat
Detection
Email Threat
Detection
Forensics
Forensics
Forensics
Intrusion
Detection
System
Intrusion
Detection
System
Intrusion
Detection
System
Routers
“Spine”
Switches
“Leaf”
Switches
Virtualized
Server Farm
Anti-Malware
(Inline)
Anti-Malware
(Inline)
Anti-Malware
(Inline)
Intrusion
Detection
System
Data Loss
Prevention
Email Threat
Detection
IPS
(Inline)
Anti-Malware
(Inline)
Forensics
 All tools still connected
 Fewer network touch points
 Enhanced tool efficiency
 Decreased OPEX costs
Physical, Virtual
and Cloud
Metadata
Engine
(NetFlow / IPFIX)
Application
Session Filtering
SSL
Decryption
Inline
Bypass
51©2018 Gigamon. All rights reserved.
Gigamon Data-in-Motion Visibility Platform
Any Network
Data Center, Hybrid and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites
Tools & Applications
Security | Experience Management | Performance Monitoring | Analytics Tools and Applications
52©2018 Gigamon. All rights reserved.
Network &
Application
Performance
Management
Gigamon Partner Ecosystem
Security and
Vulnerability
Management
Service
Provider
InfrastructureInfrastructure
Top Use Cases
54©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
Eliminate SPAN Port Contention
Few Span Ports, Many Tools
Customer is unable to use all tools! Customer has complete visibility for all tools!
Switch with two SPAN
session limitation
Intrusion Detection
System (IDS)
Application Performance
Management
VoIP Analyzer
Packet Capture
Application
Performance
Management
Intrusion
Detection
System (IDS)
Packet
Capture
VoIP AnalyzerSwitch with
two SPAN
ports
55©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
Limited Access to Environment
Limited Tool Ports, Many Switches
Limited Connectivity
to Full Environment
Pervasive Access – Can Connect to
All Points in the Environment
Analysis tool with
only 2 NICs
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5…n
Analysis tool with
only 2 NICs
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5…n
56©2018 Gigamon. All rights reserved.
Without Gigamon
Run Multiple POCs in Parallel
Accelerate Certification Of New Tools
Customer performs each Proof-of-Concept (POC)
serially at different times using different data
Customer is able to run multiple POCs
concurrently using same data
With Gigamon
POC #1 – Vendor X Tool POC #2 – Vendor Y Tool POC #3 – Vendor Z Tool
1 month 2 month 3 month
POC #1
Vendor X
Tool
POC #2
Vendor Y
Tool
POC #3
Vendor Z
Tool
1 month 2 month 3 month
Tool tested w/ NW
Segment – 4 weeks
Tool tested w/ same NW
Segment – 4 weeks
Tool tested w/ same NW
Segment – 4 weeks
57©2018 Gigamon. All rights reserved.
GigaVUE® Matches Your Network to Your Tools
Without Gigamon With Gigamon
Change Media and Speed
10, 40 Or 100Gbps Traffic To 1Gbps or 10Gbps Tools
10Gb 1Gb
Customer migrates to a 10Gb network and
1Gb monitoring tools become useless
Customer able to extend the life
of their 1Gb network and security tools
VoIP Analyzer
Application Performance
Management
Intrusion Detection
System (IDS)
Packet Capture Intrusion
Detection
System
VoIP
Monitor
Application
Performance
Management
Packet
Capture
58©2018 Gigamon. All rights reserved.
• Maximize tool efficacy
• Increase scale of
security monitoring
• Add, remove, and upgrade
tools seamlessly
• Consolidate multiple points of
failure into a single, bypass-
protected solution
• Integrate inline, out-of-band,
flow-based tools and metadata
via a Security Delivery Platform
Active Security Remediation with Inline Bypass
SCALING INLINE SECURITY WITH INLINE BYPASS
T1
T2
T3
E.g. WAN router
E.g. Firewall
E.g. IPS
E.g. WAF
E.g. ATD
E.g. Core switch
T1 T2
T3T3T3
IPS WAF
ATDATDATD
T1
IPS
59©2018 Gigamon. All rights reserved.
• L2-L4 Map rules
– tcp port, ip subnet, vlan, etc.
• Map priorities applies
– Use this to your advantage
• Customized inspection for each map
– Web: NGFW + IPS + WAF
– Email: NGFW + ATD
– Database: NGFW + IPS + ATD
– Unspecified: NGFW + IPS
Inline Map Definition
Flexible Inline Arrangements
BASIC CONCEPT: TRAFFIC SLICES  INLINE MAPS
Web
Email
Database
Unspecified
Traffic Slices for Inspection
60©2018 Gigamon. All rights reserved.
Intent-based, Drag-and-Drop Configuration
61©2018 Gigamon. All rights reserved.
Introducing Inline SSL Solution
FIRST INLINE SSL SOLUTION INTEGRATED
IN A VISIBILITY PLATFORM
Any forward-looking indication of plans for products is preliminary
and all future release dates are tentative and subject to change.
Malware and its actions lay hidden in the night
Then came Gigamon Inline SSL and all was light
62©2018 Gigamon. All rights reserved.
SSL Decryption
Out-of-Band SSL Decryption using Security Delivery Platform
IDS at the Perimeter
Anti-Malware
for Web Apps
APM at the Server Rack
DLP at Remote Sites
Router
Firewall with
SSL Proxy
Switch Router
Firewall with
SSL Proxy
Switch
Router
Router
HQ
Database
IDS APM
DLPAnti-
Malware
SSL
Decryption
SSL Decryption
SSL
Decryption
TAP
TAP
WorkstationsFirewall with
SSL Proxy
LAN
SSL Decryption
Server Rack
Branch
63©2018 Gigamon. All rights reserved.
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
SSL Decryption on Gigamon Products
Encrypted Traffic Decrypted / Unencrypted Traffic
Internet Servers
Corporate Servers Clients
NGFW
IPS
Network
Forensics
Anti-malware
Active, Inline
Appliance(s)
Passive, Out-of-Band
Appliance(s)
• Corporate servers
• Enterprise has server keys
• RSA key exchange
• Supported Since 2014
1
• Corporate servers
• Diffie-Hellman (DH) key exchange
• Emerging TLS 1.3 standard
• Need to be inline to decrypt SSL
2
• Internet Servers or SaaS services
• Enterprise does not have server keys
• Need to be inline to decrypt SSL
3
?
Clients
Internet
1 RSA 2 DH, PFS
3 RSA/DH
64©2018 Gigamon. All rights reserved.
Inline Tool Group
(decrypted traffic)
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Gigamon Inline SSL Visibility Solution
Highlights
• Servers and clients located internally
or externally
• Private keys not needed
• RSA, DH, PFS can be used
• Supports inline and out-of-band tools
Out-of-Band Tool
(decrypted traffic)
SSL Session
Leg 1
(encrypted)
SSL Session
Leg 2
(encrypted)
1
2
2
3
Web Monitor Tool
(decrypted traffic)
Encrypted traffic
Decrypted traffic
65©2018 Gigamon. All rights reserved.
• Maximize tool efficacy
• Increase scale of
security monitoring
• Add, remove, and upgrade
tools seamlessly
• Consolidate multiple points of
failure into a single, bypass-
protected solution
• Integrate inline, out-of-band,
flow-based tools and metadata
via a Security Delivery Platform
Active Security Remediation with Inline Bypass
SCALING INLINE SECURITY WITH INLINE BYPASS
T1
T2
T3
E.g. WAN router
E.g. Firewall
E.g. IPS
E.g. WAF
E.g. ATD
E.g. Core switch
T1 T2
T3T3T3
IPS WAF
ATDATDATD
T1
IPS
66©2018 Gigamon. All rights reserved.
Inline tool (decrypted traffic)
Respecting Data Privacy: URL Categorization
Internet
Webroot
• Supports up to 83 Web categories (Finance, Government…)
• Flexible policies based on multiple parameters (IP, Ports, VLAN, domain, categories)
• Whitelists and blacklists with over 5000 domain names
Banking Website (e.g. Citi)
Health care Website (e.g. Aetna)
File sharing Website
(e.g. Dropbox)
67©2018 Gigamon. All rights reserved.
Gigamon Inline SSL Deployment
Benefits of Gigamon Inline SSL Approach
The GigaVUE-HC2 is capable of
adding a single inline security
tool, but it does not unlock the
true potential of the unit.
Scalable GigaSMART®
• Inline SSL Decryption
68©2018 Gigamon. All rights reserved.
Benefits of Gigamon Inline SSL Approach
Adding new inline tools
One single GigaVUE-HC2 is
capable of adding multiple tools
69©2018 Gigamon. All rights reserved.
Benefits of Gigamon Inline SSL Approach
Adding new network segment
One single GigaVUE-HC2 is
capable of protecting multiple
network links
70©2018 Gigamon. All rights reserved.
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Benefits of Gigamon Inline SSL Approach
Increase inline SSL throughput
The GigaVUE-HC2 is a true Security Delivery Platform that
provides all this functionality in a scalable, modular form factor
• Bypass protection
• Multiple inline tools
• Multiple network links
• Traffic Intelligence
Scalable GigaSMART®
• Inline SSL Decryption
71©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
NetFlow/IPFIX Generation
Challenges:
• High impact on routers and switches for generating NetFlow records
• Routers / switches generate sampled NetFlow which is inadequate for
security
• Some routers do not support NetFlow, others have proprietary flow methods
• Without NetFlow, you can only instrument parts of your network for Deep
Packet Inspection (DPI)
Generating NetFlow Information:
• With NetFlow, you know where you need to DPI.
• Enable end-to-end security enforcement with visibility into every flow
• Ideal to detect Command and Control communications
• Validated with I ndustry-leading SIEM and NetFlow forensics collectors
72©2018 Gigamon. All rights reserved.
Without Gigamon With Gigamon
Metadata Engine
Volume, types and amount of data overwhelm SIEMs Metadata Engine Benefits:
• High Performance
• Cost Savings
• Full visibility, better security
73©2018 Gigamon. All rights reserved.
* Planned Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Metadata Enhancements
Uncover Denial of Service & compromise
of internal web servers
HTTP Response Codes
Discover malicious
communications to
C&C servers using
DNS transactions
DNS Discovery
DNS
C&C
Bots
Analyze HTTPS certificates
to discover bad/suspicious
certificates
HTTPS Certificate Anomalies
74©2018 Gigamon. All rights reserved.
Example Use Case for GigaVUE-HC2
Intrusion
Prevention
Systems
Email
Inspection
Data Loss
Prevention
NetFlow
Collector
GigaStream™
Intrusion
Detection
System
NetFlow
Generation
SSL
Decryption
Internet
Edge Routers
Core Switches Out-of-Band
Malware
Visibility into Private Cloud
VMware ESX and NSX
76©2018 Gigamon. All rights reserved.
Network Traffic Visibility For Cross Network Workloads
Challenges
VM VM VM VM VM VM
VIRTUALIZE
• SPAN on Switch Ports
• Physical TAPs
Switch
TRADITIONAL VISIBILITY
• Blind spots for Inter-Host VM traffic
• Blind spots for Intra-Host VM traffic (blade center)
VIRTUAL VISIBILITY CHALLENGES
SERVER SERVER
Switch
Security and Application Monitoring are forcing considerations!!!
SERVER
SERVER
Hypervisor Hypervisor
77©2018 Gigamon. All rights reserved.
1. Security no longer an after-thought during virtualization
2. Increasing VM density with mission-critical workloads
3. Visibility into VM-VM traffic needed for Security and Application Performance Monitoring (APM)
4. Creating new virtual instances of tools affects workload performance
5. Automated visibility after VM migration
Virtual Visibility: More Important Than Ever
5 REASONS WHY YOU MUST CARE
HYPERVISOR
SERVER
VIRTUAL
IDS VM1
VIRTUAL
ANTI-
MALWARE
VIRTUAL
APM VM
HYPERVISOR
SERVER
GigaVUE-VM
IDS
ANTI-MALWARE
APM
VIRTUAL SWITCH VIRTUAL SWITCH
78©2018 Gigamon. All rights reserved.
GigaVUE-VM
Light Footprint Virtual Machine, Not Kernel Module
79©2018 Gigamon. All rights reserved.
GigaVUE-VM: Virtual Workload Monitoring
Enhanced for Software Defined Data Centers (SDDC)
• vCenter integration
• Bulk GigaVUE-VM onboarding
• Virtual traffic policy creation
• Automatic migration of monitoring policiesGigaVUE-FM
Private
Cloud
SERVER I SERVER II
Application
Performance
Network
Management
Security
Virtual Traffic Policies
Tunneling
Internet
Production Network Tools and Analytics
80©2018 Gigamon. All rights reserved.
GigaVUE-VM VM3
Hypervisor
vSwitch
• Integration with vCenter to detect vMotion
• Automated re-deployment of rules that follow the VM
Visibility in Motion
Automated Monitoring Policy Management
Hypervisor
vSwitch
VM1VM1VM1VM1VM1 VM2
GigaVUE-FM
vMotion InitiatevMotion Notify
GigaVUE-VM
Monitor VM1
UpdateUpdate
Application
Performance
Network
Management
Security
81©2018 Gigamon. All rights reserved.
• Logical (virtual) networks that are decoupled
from underlying physical network
• All intelligence moved to the virtual edge (inside
a server)
• Creation of overlay (virtual network)
that is separate from underlay
(physical network)
• Benefits:
– Create virtual networks independent of
physical network topology
– Ability to rapidly make network changes
based on application/tenant needs
Gigamon Value Prop:
Preserve and extend monitoring tools by
offloading new encapsulations or
by providing tenant-level visibility.
Network Virtualization: VMware NSX
Multi-Tenant Networks
Existing Physical Network
Virtual Networks
“Network hypervisor” (NSX)
Internet
82©2018 Gigamon. All rights reserved.
Dynamic ‘Traffic Visibility Service’ Insertion
Internet
Security/Monitor Admin
“Copy
Packet”
GigaVUE-FM
Tools and Analytics
Application
Performance
Network
Management
Security
Monitoring Policy
83©2018 Gigamon. All rights reserved.
REST APIs
Software-Defined Visibility
Internet
SDDC / Cloud Monitoring –
Tenant and Application Visibility
SSL
Decryption
NetFlow / IPFIX
Generation
Application
Session Filtering
Adaptive
Packet Filtering
Header
Stripping
APM
Anti-Malware
IDS
DLP
Network Forensics
APT
Centralized Tools
Application Performance
Network Performance
Customer Experience
Security
Monitoring
De-cap VXLAN
Virtual Traffic
VXLAN=6000
SSL Decrypted
NetFlow / IPFIX
TAPs
GigaVUE-VM
Filtered and Sliced Virtual Traffic
NSX APIs, Gigamon Service Insertion
vCenter APIs, Events
vCenter
NSX Manager
GigaVUE-FM
2. Apply “Visibility” Policy
GigaVUE-VM
vRealize Automation (vRA)
1. Deploy new Tenants and Applications 2. Apply “Visibility” Policy
84©2018 Gigamon. All rights reserved.
Partner Solution Categories and Integration Options
Solution Category Integration Options
SDDC Operations and Visibility Port Mirroring, NSX-API, NetX
Automated Traffic Visibility for
VMware powered SDDC
Gigamon Visibility Platform
Public Cloud
88©2018 Gigamon. All rights reserved.
Public Cloud Visibility Challenges and Gigamon Solution
Gigamon Visibility Platform
Database
Web
Tier
App
Tier
Load Balancer
Tool Tier
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Load Balancer
RDS
Web
Tier
App
Tier
ELB
ELB
Tool Tier
Region
AZ
VPC
Database
Web
Tier
App
Tier
Load Balancer
Load Balancer
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Visibility Tier
GigaVUE-FM
Tool
Tier
X Inability to access all traffic
X Discrete vendor monitoring agents per instance
X Impacts workload and virtual network performance
X Static visibility with heavy disruption
 Minimize agent overload
 Aggregate, select, optimize, and distribute traffic
 Customize orchestration and
single-pane-of-glass visualization
 Elastic Visibility with ATS as workloads scale-out
Load Balancer Subnet Database Availability Zone (AZ)ToolInstances
89©2018 Gigamon. All rights reserved.
Economic Benefits of Using Single Gigamon Agent
vs. Multiple Agents
Compares 1 Gigamon agent to 1- 8
tool agents
Assumptions
• Average traffic bandwidth of 250Mbps
per Amazon EC2 instance monitored
• Starting Amazon EC2 instance of type
c4.large
90©2018 Gigamon. All rights reserved.
Network &
Application
Performance
Management
Visibility Platform for AWS: Cloud Validated Tools
Security and
Vulnerability
Management
Infrastructure
Open Source
Multi-Cloud Deployments
92©2018 Gigamon. All rights reserved.
Multi-cloud: Hybrid Cloud Visibility
PRESERVE TOOL INVESTMENT
Web
tier
App
tier
Azure Load
Balancing
Azure Load
Balancing
Azure SQL
Database
Virtual Network
Visibility tier
Tool
tier
Availability Zone
Region
Web
tier
Elastic Load
Balancing
App
tier
Elastic Load
Balancing
Amazon
RDS
Visibility tier
Tool
tier
Amazon
CloudWatch
On-Premises Data Center
Azure API
Management
Tool
Tier
GigaVUE-FM
TunnelingTunneling
93©2018 Gigamon. All rights reserved.
Multi-cloud: Centralized Visibility and Security
PRESERVE TOOL INVESTMENT
On-Premises
Data Center
Security, Performance Management,
and Analytics Tools
Applications
Web
tier
Web
tier
SecOps VPC
GigaVUE-FM
Amazon
CloudWatch
Visibility tier
Visibility tier
Tool tier Web
tier
App
tier
Visibility tier
Azure API
Management
AWS Direct
Connect
Azure
ExpressRoute
Applications
Thank You!
Q&A Session
Mona Yam
Regional Sales Director
Gigamon
Sittipong Nateeprasittiporn
Product Manager
nForce Secure Co.,Ltd.
Closing Remarks
Mona Yam
Regional Sales Director
Gigamon

More Related Content

What's hot

Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Florian Roth
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSMike Felch
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Florian Roth
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy conceptsMostafa El Lathy
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101Jannis Kirschner
 
Vault - Secret and Key Management
Vault - Secret and Key ManagementVault - Secret and Key Management
Vault - Secret and Key ManagementAnthony Ikeda
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryWill Schroeder
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAlienVault
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
Managing secrets at scale
Managing secrets at scaleManaging secrets at scale
Managing secrets at scaleAlex Schoof
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingNikhil Mittal
 
Keeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp VaultKeeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp VaultMitchell Pronschinske
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Red Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATARed Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATANikhil Mittal
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxAdityaChawan4
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

What's hot (20)

Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWS
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
Vault - Secret and Key Management
Vault - Secret and Key ManagementVault - Secret and Key Management
Vault - Secret and Key Management
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Hunting_GrrCON22.pdf
Hunting_GrrCON22.pdfHunting_GrrCON22.pdf
Hunting_GrrCON22.pdf
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
Managing secrets at scale
Managing secrets at scaleManaging secrets at scale
Managing secrets at scale
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
 
Keeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp VaultKeeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp Vault
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Red Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATARed Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATA
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptx
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 
Secure Coding for Java
Secure Coding for JavaSecure Coding for Java
Secure Coding for Java
 

Similar to THE ESSENTIAL ELEMENT OF YOUR SECURITY

Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformJohn Pollack
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityJohn Pollack
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityitSMF UK
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityTigerGraph
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Amanda Morris
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceRobb Boyd
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryKevin Murphy
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 

Similar to THE ESSENTIAL ELEMENT OF YOUR SECURITY (20)

Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 

More from ETDAofficialRegist

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐETDAofficialRegist
 
Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019ETDAofficialRegist
 
Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019ETDAofficialRegist
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018ETDAofficialRegist
 
Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)ETDAofficialRegist
 
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...ETDAofficialRegist
 
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018ETDAofficialRegist
 
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562ETDAofficialRegist
 
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562ETDAofficialRegist
 
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561ETDAofficialRegist
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyETDAofficialRegist
 
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นกฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นETDAofficialRegist
 
ผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoringผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs ScoringETDAofficialRegist
 
รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561ETDAofficialRegist
 

More from ETDAofficialRegist (20)

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
 
Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019
 
Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018
 
Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)
 
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
 
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
 
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
 
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
 
Etda Annual Report 2019
Etda Annual Report 2019Etda Annual Report 2019
Etda Annual Report 2019
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
 
ETDA Annual Report 2019
ETDA Annual Report 2019ETDA Annual Report 2019
ETDA Annual Report 2019
 
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
 
A5 survey 2018 v31
A5 survey 2018 v31A5 survey 2018 v31
A5 survey 2018 v31
 
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นกฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
 
ผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoringผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoring
 
รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561
 

Recently uploaded

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
 

Recently uploaded (12)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Stay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design TrendsStay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design Trends
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 

THE ESSENTIAL ELEMENT OF YOUR SECURITY

  • 1.
  • 2. Gigamon Cyber Security Roadshow THAILAND Date: 16th May 2018 Venue: ETDA (Electronic Transactions Development Agency)
  • 3. Welcome Address Mona Yam Regional Sales Director Gigamon
  • 4. 4©2018 Gigamon. All rights reserved. Time Agenda Speaker 1:10 – 1:50 pm Top Cyberthreats and The Road Ahead Graham Melville Sr. Director, Security Solutions Gigamon 1:50 – 2:35 pm Customer Use Case Daniel Ong Channel Account Manager Gigamon 2:35 – 2:55 pm Networking and Tea Break 2:55 – 3:45 pm Power Your Tools to Prevent Threats Koay Choon Ping Sales Engineer, South East Asia Gigamon 3:45 – 4:05 pm Q&A Session 4:05 – 4:15 pm Closing Remarks Mona Yam Regional Sales Director Gigamon Agenda
  • 5. Top Cyberthreats and The Road Ahead Graham Melville Senior Director, Security Solutions Gigamon
  • 6. 6©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 7. 7©2018 Gigamon. All rights reserved. • 27-question online survey conducted in Nov. 2017 – IT security decision maker or practitioner – Employed by organization with at least 500 employees • Survey designed to assess: – Organization’s security posture – Perceptions of cyberthreats and IT security challenges – Current and future IT security investments – IT security practices and strategies About The Cyberthreat Defense Report 7
  • 8. 8©2018 Gigamon. All rights reserved. Survey Demographics 8 Respondents by employee countRespondents by country 1,200 respondents | 17 countries | 19 industries
  • 9. 9©2018 Gigamon. All rights reserved. Breaches are Inevitable Organizations are falling victim to cyberattacks at an alarming rate … Percentage compromised at least once, by country
  • 10. 10©2018 Gigamon. All rights reserved. Pessimism is the New Reality … and they are expecting more of the same in 2018. Likelihood of successful attack Percentage who believe a successful cyberattack is more likely than not, by country
  • 11. 11©2018 Gigamon. All rights reserved. Challenges URGENCY COMPLEXITYSPEED COST SKILLS SHORTAGE
  • 12. 12©2018 Gigamon. All rights reserved. A Skills Shortage Is The Top Issue ‘Lack of skilled personnel’ edges out ‘Low security awareness among employees’ for the first time in five years!
  • 13. 13©2018 Gigamon. All rights reserved. IT Security Skills Shortage IT security admins, analysts, and architects are in highest demand.
  • 14. 14©2018 Gigamon. All rights reserved. The Speed Issue Too much data to analyze continues to be a major issue for organizations.
  • 15. 15©2018 Gigamon. All rights reserved. The Data-in-Motion Dilemma VOLUME + SPEED + THREATS = COMPLEXITY + RISK + COST *Cisco Global Cloud Index 2016. **Statista Global machine-to-machine (M2M) data traffic from 2014 to 2019 (in petabytes per month) Time Volume Network Data Security Tool Security tools do not scale as fast as data Data Center transition to 100GbEmergence of Big Data Internet of Things Machine to Machine 4.7ZB of global data center traffic in 2016* 1.7PB of M2M traffic in 2017** 6.7 ns available to process a network packet on a 100Gb link
  • 16. 16©2018 Gigamon. All rights reserved. Complexity Too many product, Too hard to manage, No interoperability.
  • 17. 17©2018 Gigamon. All rights reserved. CYBERscape: The Cybersecurity Landscape. Source: Momentum Partners. https://momentumcyber.com/docs/CYBERscape.pdf
  • 18. 18©2018 Gigamon. All rights reserved. Urgency - Vulnerability Patching Challenges ‘Infrequent patching windows’ and ‘lack of qualified personnel’ inhibit organizations from patching more rapidly.
  • 19. 19©2018 Gigamon. All rights reserved. Rising IT Security Budgets In response, enterprises are increasing their security budgets by 4.7% in 2018, globally. By country: By industry: By size:
  • 20. 20©2018 Gigamon. All rights reserved. 2018 Cyberthreat Defense Report, CyberEdge Group, 2018 Costs FIREWALL IDS IPS NAC ANTI-MALWARE DLP WAF NEXTGEN FW NBA NAT EMAIL SECURITY APT FIREWALL ANTI VIRUS Budgets are rising but can they keep up with the increasing need?
  • 21. 21©2018 Gigamon. All rights reserved. Cyberthreat Hunting Investments Only a third of respondents are fully confident in their cyberthreat hunting investments.
  • 22. 22©2018 Gigamon. All rights reserved. Security Fundamentals Are Changing A NEW APPROACH TO SECURITY IS REQUIRED URGENCYCOMPLEXITYSPEED COSTSKILLS SHORTAGE Time to detection and Time to containment are too slow Breaches continue to happen
  • 23. 23©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 24. 24©2018 Gigamon. All rights reserved. Internet Public Cloud ✕ To many products not enough staff ✕ Hard to keep up with increasing network speed ✕ Complex with significant blind spots ✕ Difficult to patch security devices ✕ Extraordinary costs ✕ Contention for access to traffic ✕ Inconsistent view of traffic ✕ Too many false positives ✕ Blind to or high cost for encrypted traffic Challenges with Security Deployments VISIBILITY LIMITED TO A POINT IN TIME OR PLACE User Behavior Analytics Advanced Persistent Threat Email Threat Detection SIEM Next-Generation Firewall Data Loss Prevention SIEM Data Loss Prevention User Behavior Analytics Next-Generation Firewall Advanced Persistent Threat Email Threat Detection Data Loss Prevention Next-Generation Firewall Email Threat Detection Advanced Persistent Threat SIEM User Behavior Analytics Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Poor architectural choices will lead to poor results!
  • 25. 25©2018 Gigamon. All rights reserved. • With this approach, you: – Detect and block threats immediately – Deploy and operate transparently, aka “Bump on the wire” or “Layer 2 mode” • No need to change routing configurations or endpoints • But it introduces challenges for both network and security teams: – Introduces multiple points of failure – Physical interfaces must match the network – Degrades network and application performance – Wastes cycles on traffic it cannot analyze – Does not scale to network speeds – Disruptive to upgrade or replace – Cannot be moved to or from out-of-band operation (detection vs. prevention) – Asymmetric routing of traffic circumvents tools’ ability to inspect whole sessions IPS = Intrusion Prevention System; WAF = Web Application Firewall; ATP = Advanced Threat Prevention Inline Prevention Security Tools WAN router Firewall IPS WAF Core switch ATP
  • 26. 26©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 27. 27©2018 Gigamon. All rights reserved. GigaSECURE® Security Delivery Platform THE WORLDS LEADING NEXT GENERATION NETWORK PACKET BROKER Internet Public Cloud Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach Scalable metadata extraction for improved forensics Security Delivery Platform Next-Generation Firewall User Behavior Analytics Data Loss Prevention Email Threat Detection Advanced Persistent Threat SIEM Security Delivery Platform Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach: physical and virtual Scalable metadata extraction for improved forensics Physical, Virtual and Cloud Metadata Generation Application Session Filtering SSL Decryption Inline Bypass On-premise Data Center Remote Sites Public Cloud Cisco ACI Private Cloud
  • 28. 28©2018 Gigamon. All rights reserved. Super Charge Existing SOC/ NOC • Centralized tools • Traffic backhauled to centralized tools • Full traffic flows • NetFlow/IPFIX flow records • Metadata of interest • De-duplicate before backhaul • Ideal for both service providers & enterprises Security Operations / Network Operations GigaVUE-HC2GigaVUE-HD8 Remote Site GigaVUE-HC1 Remote Site GigaVUE-HC1 Remote Site GigaVUE-HC1
  • 29. 29©2018 Gigamon. All rights reserved. Ready for Future Multi-cloud: Hybrid Cloud Visibility PRESERVE TOOL INVESTMENT Web tier App tier Azure Load Balancing Azure Load Balancing Azure SQL Database Virtual Network Visibility tier Tool tier Availability Zone Region Web tier Elastic Load Balancing App tier Elastic Load Balancing Amazon RDS Visibility tier Tool tier Amazon CloudWatch On-Premises Data Center Azure API Management Tool Tier GigaVUE-FM TunnelingTunneling
  • 30. 30©2018 Gigamon. All rights reserved. Agenda Industry Challenges We Are Facing1 A Look At The Inline Problem A Better Way Real World Results 2 3 4
  • 31. 31©2018 Gigamon. All rights reserved. Based on 2017 Fortune list and customer data from Q1 2018, Fortune is part of Time Inc. Top Lists based on FY2016 data. “Top 50 Banks in the World," Banks around the World. June 30, 2016. Retrieved from: http://www.relbanks.com/worlds-top-banks/assets Laura Lorenzetti, "The 10 biggest health-care companies in the Fortune 500," Fortune, June 20, 2015. Retrieved from: https://gigamon.my.salesforce.com/00O14000008ef5s Data Set: Top US Government Agencies by Contract Spending (FY 2016), GovWin from Deltek. Accessed Feb. 7, 2017. Samantha Sharf, "The World's Largest Tech Companies: Apple Beats Samsung, Microsoft And Alphabet," Forbes, May 26, 2016. Retrieved from: http://www.forbes.com/sites/samanthasharf/2016/05/26/the-worlds-largest-tech-companies-2016-apple-bests-samsung-microsoft-and-alphabet/#ed4f6fc89ee4 "Stores Top Retailers 2016," Kantar Retail, National Retail Federation, 2016. Retrieved from: https://nrf.com/resources/annual-retailer-lists/top-100-retailers/stores-top-retailers-2016 "The World's Biggest Public Companies," Forbes, June 2, 2016. Retrieved from: https://en.wikipedia.org/wiki/List_of_telephone_operating_companies Who Deploys Gigamon? MANY OF THE WORLD’S LEADING ORGANIZATIONS INCLUDING:
  • 32. 32©2018 Gigamon. All rights reserved. As of Feb 2017 Gigamon Customers SERVICE PROVIDERFEDERAL TECHNOLOGY GENERAL ENTERPRISE / MISC RETAIL / SERVICES FINANCE HEALTHCARE /INSURANCE ENTERPRISE
  • 33. 33©2018 Gigamon. All rights reserved. SERVICE PROVIDERFEDERAL TECHNOLOGY GENERAL ENTERPRISE / MISC RETAIL / SERVICES FINANCE HEALTHCARE /INSURANCE ENTERPRISE Customer data as of Q1 2018 Gigamon Customers 2,800+ End Customers
  • 34. 34©2018 Gigamon. All rights reserved. 34 Case Study • Reduced Cost: $20M+ in TCO savings with GigaSECURE architecture • Mitigated Risk to ‘Build with Confidence’: Helped bank identify network assets and proactively solve deployment issues upfront • Faster Time to Response: Reduced a 5-day P1 incident by 95% preventing reputation loss, avoiding bad publicity and increasing customer experience RESULTS • Key security initiatives (IPS, APT, Email Protection) to protect customers and meet security compliance requirements were costing significant CAPEX • Big concerns about adding prevention tools inline due to network resiliency concerns and environment complexity • Limited network visibility for security detection and threat hunting initiatives, leading to poor ROI / outcomes with existing toolsets CHALLENGE • Two-part solution: • Ph. 1: Leverage Inline Bypass for prevention tools in core network • Ph. 2: Feed data from data centers, edge to to out-of-band detection tools SOLUTION Overview • Large international bank serving 13 million customers • Decided to in-house security after many years of outsourcing challenges
  • 35. 35©2018 Gigamon. All rights reserved. 35 Case Study • Maximize uptime: Deployed IPS with minimal production changes • Increased operational agility with decreased risk: Ability to switch between IPS and IDS modes instantaneously • Investment protection: Roadmap for future expansion with GigaSMART functionality such as SSL, de-duplication, NetFlow RESULTS • High cost and potential impact from traffic volume of IDS/IPS deployment in new data center • Desire to deploy Cisco Firepower and FireEye NX but resistance to deploy inline • Wanted future-proof solution, fault tolerant with High Availability • 18 month project initially with 7 SIs bidding! CHALLENGE • GigaSECURE Security Delivery Platform architecture • 26 GigaVUE-HC2, 40 bypass modules including • Gigamon Resilient Inline Protection • GigaVUE-FMSOLUTION Overview • Global bank serving 18.9 million customers with total assets of £800 billion • Headquarters in the UK
  • 36. 36©2018 Gigamon. All rights reserved. 5 YEARS TCO CAPEX OPEX CAPEX OPEX CAPEX OPEX IPS $3,100,000 $3,100,000 $1,330,000 $1,330,000 $1,770,000 $1,770,000 4xIPS to 2xIPS APT $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xAPT to 2xAPT WAF $4,000,000 $4,000,000 $2,000,000 $2,000,000 $2,000,000 $2,000,000 4xWAF to 2xWAF APM / NPM $2,000,000 $2,000,000 $1,000,000 $1,000,000 $1,000,000 $1,000,000 2xAPM/NPM to 1xAPM/NPM SIEM $2,000,000 $700,000 $1,000,000 $500,000 $1,000,000 $200,000 Traffic capacity can be reduced Cloud Tools $4,000,000 $2,000,000 $2,000,000 $7,770,000 $8,970,000 $16,740,000 Savings (USD)With GigamonWithout Gigamon Equipment Remarks / Assumption Total Savings (CAPEX + OPEX) Total Savings Estimated Cost Saving Based on 5 Years TCO
  • 39. Local Customer Use Case Inline Bypass Solution Daniel Ong Channel Account Manager Gigamon
  • 40. 40©2018 Gigamon. All rights reserved. Major Banking Group in Thailand CISCO ACI VISIBILITY • Rapid visibility for better security – Improved visibility on ACI (40G) network. • Increased network availability and security. • Holistic security architecture – Easy to manage SPAN traffic request. • Ready for troubleshooting at any time.RESULTS • Can’t monitor traffic (VXLAN) between Spine and Leaf of Cisco ACI (40G). • Can’t terminate ER SPAN tunnel to consolidate traffic. • Need to send out huge traffic to the right tool at the right time. • Limited visibility and lack of control.CHALLENGE • GigaTAP and GigaSMART: Header Striping • Send specific protocol to tools for analysis. • IP tunnelling to monitor across two site. • GigaSTREAM aids in load sharing traffic into multiple tools according to current and planned tools throughput. SOLUTION
  • 41. 41©2018 Gigamon. All rights reserved. DC & DR Deployment Major Banking Group in Thailand CISCO ACI VISIBILITY
  • 42. 42©2018 Gigamon. All rights reserved. Chemical Industry Customer in Thailand INLINE BYPASS SOLUTION • Integrated full Inline Bypass solution for NGFW and ATP. • Intelligent traffic delivery – Able to specific traffic direction by load sharing solutions.RESULTS • No solution for bypass module on ATP appliance. • Lack of load balancing solutions between NGFW and ATP appliance. • Security tools impact network uptime.CHALLENGE • HC1 appliance with Inline Bypass Modules. • 1 Gbps copper solution. SOLUTION
  • 43. 43©2018 Gigamon. All rights reserved. Inline Diagram with Active-Active NGFW Chemical Industry Customer in Thailand INLINE BYPASS SOLUTION
  • 46.
  • 47. Power Your Tools to Prevent Threats See what matters.™ Koay Choon Ping Sales Engineer, South East Asia Gigamon
  • 48. 48©2018 Gigamon. All rights reserved. BACKGROUND: • Founded in 2004 • Headquarters: Santa Clara, CA, U.S. • Global Offices: 20 countries • 799 employees • Over 2,500 customers Gigamon Visibility Platform provides pervasive visibility into data in motion across your entire network, enabling stronger security and network performance. See what matters.™ PERFORMANCE: • World’s #1 Visibility Platform • Named #1 Network Monitoring Equipment (NME) Vendor Worldwide by Market Share* • Key Verticals: Federal, Financial Services, Healthcare, Retail, Technology, Service Providers • $311M Revenue in FY16, +40% Year-over-Year ©2017 Gigamon. All rights reserved. Corporate Overview *Source: IHS Markit Report, Network Monitoring Equipment, May 19, 2017
  • 49. 49©2018 Gigamon. All rights reserved. Internet Public Cloud ✕ Significant blind spots ✕ Extraordinary costs ✕ Contention for access to traffic ✕ Inconsistent view of traffic ✕ Blind to encrypted traffic ✕ Too many false positives Challenges with Ad Hoc Security Deployments User Behavior Analytics Advanced Persistent Threat Email Threat Detection SIEM Next-Generation Firewall Data Loss Prevention SIEM Data Loss Prevention User Behavior Analytics Next-Generation Firewall Advanced Persistent Threat Email Threat Detection Data Loss Prevention Next-Generation Firewall Email Threat Detection Advanced Persistent Threat SIEM User Behavior Analytics Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm It is time the balance of power shifted from attacker to defender! VISIBILITY LIMITED TO A POINT IN TIME OR PLACE
  • 50. 50©2018 Gigamon. All rights reserved. Internet Public Cloud: AWS Security Delivery Platform: “See Everything” A Foundational Building Block To Effective Security Data Loss Prevention Data Loss PreventionData Loss Prevention IPS (Inline) IPS (Inline) IPS (Inline) Email Threat Detection Email Threat Detection Email Threat Detection Forensics Forensics Forensics Intrusion Detection System Intrusion Detection System Intrusion Detection System Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Anti-Malware (Inline) Anti-Malware (Inline) Anti-Malware (Inline) Intrusion Detection System Data Loss Prevention Email Threat Detection IPS (Inline) Anti-Malware (Inline) Forensics  All tools still connected  Fewer network touch points  Enhanced tool efficiency  Decreased OPEX costs Physical, Virtual and Cloud Metadata Engine (NetFlow / IPFIX) Application Session Filtering SSL Decryption Inline Bypass
  • 51. 51©2018 Gigamon. All rights reserved. Gigamon Data-in-Motion Visibility Platform Any Network Data Center, Hybrid and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites Tools & Applications Security | Experience Management | Performance Monitoring | Analytics Tools and Applications
  • 52. 52©2018 Gigamon. All rights reserved. Network & Application Performance Management Gigamon Partner Ecosystem Security and Vulnerability Management Service Provider InfrastructureInfrastructure
  • 54. 54©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon Eliminate SPAN Port Contention Few Span Ports, Many Tools Customer is unable to use all tools! Customer has complete visibility for all tools! Switch with two SPAN session limitation Intrusion Detection System (IDS) Application Performance Management VoIP Analyzer Packet Capture Application Performance Management Intrusion Detection System (IDS) Packet Capture VoIP AnalyzerSwitch with two SPAN ports
  • 55. 55©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon Limited Access to Environment Limited Tool Ports, Many Switches Limited Connectivity to Full Environment Pervasive Access – Can Connect to All Points in the Environment Analysis tool with only 2 NICs Switch 1 Switch 2 Switch 3 Switch 4 Switch 5…n Analysis tool with only 2 NICs Switch 1 Switch 2 Switch 3 Switch 4 Switch 5…n
  • 56. 56©2018 Gigamon. All rights reserved. Without Gigamon Run Multiple POCs in Parallel Accelerate Certification Of New Tools Customer performs each Proof-of-Concept (POC) serially at different times using different data Customer is able to run multiple POCs concurrently using same data With Gigamon POC #1 – Vendor X Tool POC #2 – Vendor Y Tool POC #3 – Vendor Z Tool 1 month 2 month 3 month POC #1 Vendor X Tool POC #2 Vendor Y Tool POC #3 Vendor Z Tool 1 month 2 month 3 month Tool tested w/ NW Segment – 4 weeks Tool tested w/ same NW Segment – 4 weeks Tool tested w/ same NW Segment – 4 weeks
  • 57. 57©2018 Gigamon. All rights reserved. GigaVUE® Matches Your Network to Your Tools Without Gigamon With Gigamon Change Media and Speed 10, 40 Or 100Gbps Traffic To 1Gbps or 10Gbps Tools 10Gb 1Gb Customer migrates to a 10Gb network and 1Gb monitoring tools become useless Customer able to extend the life of their 1Gb network and security tools VoIP Analyzer Application Performance Management Intrusion Detection System (IDS) Packet Capture Intrusion Detection System VoIP Monitor Application Performance Management Packet Capture
  • 58. 58©2018 Gigamon. All rights reserved. • Maximize tool efficacy • Increase scale of security monitoring • Add, remove, and upgrade tools seamlessly • Consolidate multiple points of failure into a single, bypass- protected solution • Integrate inline, out-of-band, flow-based tools and metadata via a Security Delivery Platform Active Security Remediation with Inline Bypass SCALING INLINE SECURITY WITH INLINE BYPASS T1 T2 T3 E.g. WAN router E.g. Firewall E.g. IPS E.g. WAF E.g. ATD E.g. Core switch T1 T2 T3T3T3 IPS WAF ATDATDATD T1 IPS
  • 59. 59©2018 Gigamon. All rights reserved. • L2-L4 Map rules – tcp port, ip subnet, vlan, etc. • Map priorities applies – Use this to your advantage • Customized inspection for each map – Web: NGFW + IPS + WAF – Email: NGFW + ATD – Database: NGFW + IPS + ATD – Unspecified: NGFW + IPS Inline Map Definition Flexible Inline Arrangements BASIC CONCEPT: TRAFFIC SLICES  INLINE MAPS Web Email Database Unspecified Traffic Slices for Inspection
  • 60. 60©2018 Gigamon. All rights reserved. Intent-based, Drag-and-Drop Configuration
  • 61. 61©2018 Gigamon. All rights reserved. Introducing Inline SSL Solution FIRST INLINE SSL SOLUTION INTEGRATED IN A VISIBILITY PLATFORM Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Malware and its actions lay hidden in the night Then came Gigamon Inline SSL and all was light
  • 62. 62©2018 Gigamon. All rights reserved. SSL Decryption Out-of-Band SSL Decryption using Security Delivery Platform IDS at the Perimeter Anti-Malware for Web Apps APM at the Server Rack DLP at Remote Sites Router Firewall with SSL Proxy Switch Router Firewall with SSL Proxy Switch Router Router HQ Database IDS APM DLPAnti- Malware SSL Decryption SSL Decryption SSL Decryption TAP TAP WorkstationsFirewall with SSL Proxy LAN SSL Decryption Server Rack Branch
  • 63. 63©2018 Gigamon. All rights reserved. Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. SSL Decryption on Gigamon Products Encrypted Traffic Decrypted / Unencrypted Traffic Internet Servers Corporate Servers Clients NGFW IPS Network Forensics Anti-malware Active, Inline Appliance(s) Passive, Out-of-Band Appliance(s) • Corporate servers • Enterprise has server keys • RSA key exchange • Supported Since 2014 1 • Corporate servers • Diffie-Hellman (DH) key exchange • Emerging TLS 1.3 standard • Need to be inline to decrypt SSL 2 • Internet Servers or SaaS services • Enterprise does not have server keys • Need to be inline to decrypt SSL 3 ? Clients Internet 1 RSA 2 DH, PFS 3 RSA/DH
  • 64. 64©2018 Gigamon. All rights reserved. Inline Tool Group (decrypted traffic) Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Gigamon Inline SSL Visibility Solution Highlights • Servers and clients located internally or externally • Private keys not needed • RSA, DH, PFS can be used • Supports inline and out-of-band tools Out-of-Band Tool (decrypted traffic) SSL Session Leg 1 (encrypted) SSL Session Leg 2 (encrypted) 1 2 2 3 Web Monitor Tool (decrypted traffic) Encrypted traffic Decrypted traffic
  • 65. 65©2018 Gigamon. All rights reserved. • Maximize tool efficacy • Increase scale of security monitoring • Add, remove, and upgrade tools seamlessly • Consolidate multiple points of failure into a single, bypass- protected solution • Integrate inline, out-of-band, flow-based tools and metadata via a Security Delivery Platform Active Security Remediation with Inline Bypass SCALING INLINE SECURITY WITH INLINE BYPASS T1 T2 T3 E.g. WAN router E.g. Firewall E.g. IPS E.g. WAF E.g. ATD E.g. Core switch T1 T2 T3T3T3 IPS WAF ATDATDATD T1 IPS
  • 66. 66©2018 Gigamon. All rights reserved. Inline tool (decrypted traffic) Respecting Data Privacy: URL Categorization Internet Webroot • Supports up to 83 Web categories (Finance, Government…) • Flexible policies based on multiple parameters (IP, Ports, VLAN, domain, categories) • Whitelists and blacklists with over 5000 domain names Banking Website (e.g. Citi) Health care Website (e.g. Aetna) File sharing Website (e.g. Dropbox)
  • 67. 67©2018 Gigamon. All rights reserved. Gigamon Inline SSL Deployment Benefits of Gigamon Inline SSL Approach The GigaVUE-HC2 is capable of adding a single inline security tool, but it does not unlock the true potential of the unit. Scalable GigaSMART® • Inline SSL Decryption
  • 68. 68©2018 Gigamon. All rights reserved. Benefits of Gigamon Inline SSL Approach Adding new inline tools One single GigaVUE-HC2 is capable of adding multiple tools
  • 69. 69©2018 Gigamon. All rights reserved. Benefits of Gigamon Inline SSL Approach Adding new network segment One single GigaVUE-HC2 is capable of protecting multiple network links
  • 70. 70©2018 Gigamon. All rights reserved. Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Benefits of Gigamon Inline SSL Approach Increase inline SSL throughput The GigaVUE-HC2 is a true Security Delivery Platform that provides all this functionality in a scalable, modular form factor • Bypass protection • Multiple inline tools • Multiple network links • Traffic Intelligence Scalable GigaSMART® • Inline SSL Decryption
  • 71. 71©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon NetFlow/IPFIX Generation Challenges: • High impact on routers and switches for generating NetFlow records • Routers / switches generate sampled NetFlow which is inadequate for security • Some routers do not support NetFlow, others have proprietary flow methods • Without NetFlow, you can only instrument parts of your network for Deep Packet Inspection (DPI) Generating NetFlow Information: • With NetFlow, you know where you need to DPI. • Enable end-to-end security enforcement with visibility into every flow • Ideal to detect Command and Control communications • Validated with I ndustry-leading SIEM and NetFlow forensics collectors
  • 72. 72©2018 Gigamon. All rights reserved. Without Gigamon With Gigamon Metadata Engine Volume, types and amount of data overwhelm SIEMs Metadata Engine Benefits: • High Performance • Cost Savings • Full visibility, better security
  • 73. 73©2018 Gigamon. All rights reserved. * Planned Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Metadata Enhancements Uncover Denial of Service & compromise of internal web servers HTTP Response Codes Discover malicious communications to C&C servers using DNS transactions DNS Discovery DNS C&C Bots Analyze HTTPS certificates to discover bad/suspicious certificates HTTPS Certificate Anomalies
  • 74. 74©2018 Gigamon. All rights reserved. Example Use Case for GigaVUE-HC2 Intrusion Prevention Systems Email Inspection Data Loss Prevention NetFlow Collector GigaStream™ Intrusion Detection System NetFlow Generation SSL Decryption Internet Edge Routers Core Switches Out-of-Band Malware
  • 75. Visibility into Private Cloud VMware ESX and NSX
  • 76. 76©2018 Gigamon. All rights reserved. Network Traffic Visibility For Cross Network Workloads Challenges VM VM VM VM VM VM VIRTUALIZE • SPAN on Switch Ports • Physical TAPs Switch TRADITIONAL VISIBILITY • Blind spots for Inter-Host VM traffic • Blind spots for Intra-Host VM traffic (blade center) VIRTUAL VISIBILITY CHALLENGES SERVER SERVER Switch Security and Application Monitoring are forcing considerations!!! SERVER SERVER Hypervisor Hypervisor
  • 77. 77©2018 Gigamon. All rights reserved. 1. Security no longer an after-thought during virtualization 2. Increasing VM density with mission-critical workloads 3. Visibility into VM-VM traffic needed for Security and Application Performance Monitoring (APM) 4. Creating new virtual instances of tools affects workload performance 5. Automated visibility after VM migration Virtual Visibility: More Important Than Ever 5 REASONS WHY YOU MUST CARE HYPERVISOR SERVER VIRTUAL IDS VM1 VIRTUAL ANTI- MALWARE VIRTUAL APM VM HYPERVISOR SERVER GigaVUE-VM IDS ANTI-MALWARE APM VIRTUAL SWITCH VIRTUAL SWITCH
  • 78. 78©2018 Gigamon. All rights reserved. GigaVUE-VM Light Footprint Virtual Machine, Not Kernel Module
  • 79. 79©2018 Gigamon. All rights reserved. GigaVUE-VM: Virtual Workload Monitoring Enhanced for Software Defined Data Centers (SDDC) • vCenter integration • Bulk GigaVUE-VM onboarding • Virtual traffic policy creation • Automatic migration of monitoring policiesGigaVUE-FM Private Cloud SERVER I SERVER II Application Performance Network Management Security Virtual Traffic Policies Tunneling Internet Production Network Tools and Analytics
  • 80. 80©2018 Gigamon. All rights reserved. GigaVUE-VM VM3 Hypervisor vSwitch • Integration with vCenter to detect vMotion • Automated re-deployment of rules that follow the VM Visibility in Motion Automated Monitoring Policy Management Hypervisor vSwitch VM1VM1VM1VM1VM1 VM2 GigaVUE-FM vMotion InitiatevMotion Notify GigaVUE-VM Monitor VM1 UpdateUpdate Application Performance Network Management Security
  • 81. 81©2018 Gigamon. All rights reserved. • Logical (virtual) networks that are decoupled from underlying physical network • All intelligence moved to the virtual edge (inside a server) • Creation of overlay (virtual network) that is separate from underlay (physical network) • Benefits: – Create virtual networks independent of physical network topology – Ability to rapidly make network changes based on application/tenant needs Gigamon Value Prop: Preserve and extend monitoring tools by offloading new encapsulations or by providing tenant-level visibility. Network Virtualization: VMware NSX Multi-Tenant Networks Existing Physical Network Virtual Networks “Network hypervisor” (NSX) Internet
  • 82. 82©2018 Gigamon. All rights reserved. Dynamic ‘Traffic Visibility Service’ Insertion Internet Security/Monitor Admin “Copy Packet” GigaVUE-FM Tools and Analytics Application Performance Network Management Security Monitoring Policy
  • 83. 83©2018 Gigamon. All rights reserved. REST APIs Software-Defined Visibility Internet SDDC / Cloud Monitoring – Tenant and Application Visibility SSL Decryption NetFlow / IPFIX Generation Application Session Filtering Adaptive Packet Filtering Header Stripping APM Anti-Malware IDS DLP Network Forensics APT Centralized Tools Application Performance Network Performance Customer Experience Security Monitoring De-cap VXLAN Virtual Traffic VXLAN=6000 SSL Decrypted NetFlow / IPFIX TAPs GigaVUE-VM Filtered and Sliced Virtual Traffic NSX APIs, Gigamon Service Insertion vCenter APIs, Events vCenter NSX Manager GigaVUE-FM 2. Apply “Visibility” Policy GigaVUE-VM vRealize Automation (vRA) 1. Deploy new Tenants and Applications 2. Apply “Visibility” Policy
  • 84. 84©2018 Gigamon. All rights reserved. Partner Solution Categories and Integration Options Solution Category Integration Options SDDC Operations and Visibility Port Mirroring, NSX-API, NetX Automated Traffic Visibility for VMware powered SDDC
  • 86. 88©2018 Gigamon. All rights reserved. Public Cloud Visibility Challenges and Gigamon Solution Gigamon Visibility Platform Database Web Tier App Tier Load Balancer Tool Tier Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Load Balancer RDS Web Tier App Tier ELB ELB Tool Tier Region AZ VPC Database Web Tier App Tier Load Balancer Load Balancer Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Visibility Tier GigaVUE-FM Tool Tier X Inability to access all traffic X Discrete vendor monitoring agents per instance X Impacts workload and virtual network performance X Static visibility with heavy disruption  Minimize agent overload  Aggregate, select, optimize, and distribute traffic  Customize orchestration and single-pane-of-glass visualization  Elastic Visibility with ATS as workloads scale-out Load Balancer Subnet Database Availability Zone (AZ)ToolInstances
  • 87. 89©2018 Gigamon. All rights reserved. Economic Benefits of Using Single Gigamon Agent vs. Multiple Agents Compares 1 Gigamon agent to 1- 8 tool agents Assumptions • Average traffic bandwidth of 250Mbps per Amazon EC2 instance monitored • Starting Amazon EC2 instance of type c4.large
  • 88. 90©2018 Gigamon. All rights reserved. Network & Application Performance Management Visibility Platform for AWS: Cloud Validated Tools Security and Vulnerability Management Infrastructure Open Source
  • 90. 92©2018 Gigamon. All rights reserved. Multi-cloud: Hybrid Cloud Visibility PRESERVE TOOL INVESTMENT Web tier App tier Azure Load Balancing Azure Load Balancing Azure SQL Database Virtual Network Visibility tier Tool tier Availability Zone Region Web tier Elastic Load Balancing App tier Elastic Load Balancing Amazon RDS Visibility tier Tool tier Amazon CloudWatch On-Premises Data Center Azure API Management Tool Tier GigaVUE-FM TunnelingTunneling
  • 91. 93©2018 Gigamon. All rights reserved. Multi-cloud: Centralized Visibility and Security PRESERVE TOOL INVESTMENT On-Premises Data Center Security, Performance Management, and Analytics Tools Applications Web tier Web tier SecOps VPC GigaVUE-FM Amazon CloudWatch Visibility tier Visibility tier Tool tier Web tier App tier Visibility tier Azure API Management AWS Direct Connect Azure ExpressRoute Applications
  • 93. Q&A Session Mona Yam Regional Sales Director Gigamon Sittipong Nateeprasittiporn Product Manager nForce Secure Co.,Ltd.
  • 94. Closing Remarks Mona Yam Regional Sales Director Gigamon