Sydney, (July 26, 2017) – Gigamon Inc. (NYSE: GIMO), the industry leader in traffic visibility solutions, today introduced a new Defender Lifecycle Model to address the increasing speed, volume and polymorphic nature of network cyber threats.
The new model integrates machine learning, artificial intelligence (AI) and security workflow automation to shift control and advantage away from the attacker and back to the defender.
Cybersecurity professionals today have come to terms with the inevitability of breaches, and cite two key factors:
• The speed of data traversing networks leaves insufficient time for decision-making on potential threats. • The continuous growth in the number of attackers and the ecosystem of resources available to break through standard defenses and propagate undetected across most infrastructures.
The traditional security focus – instrumenting networks for prevention and concentrating resources on a perimeter is increasingly ineffective in today’s environment. Organisations are hampered by limited visibility, extraordinary costs, growing infrastructure complexity and reliance on manual processes to address incidents.
“At 100Gb network speeds, the inter-packet gap of 6.7 nanoseconds surpasses an organisation’s ability to perform intelligent application security, threat detection or inspection,” said Shehzad Merchant, chief technology officer at Gigamon. “Security teams and technology are overwhelmed trying to manage and mitigate an increasing volume and variety of incidents. This machine-to-human fight favors the attacker leaving organisations severely disadvantaged.”
The Defender Lifecycle Model, with pervasive visibility into data-in-motion as its foundation, changes this dynamic and shifts to an automated machine-to-machine approach. It utilises a security delivery platform to deliver security services that can learn, detect, predict and contain threats throughout the attack lifecycle. The model integrates machine learning and AI-based technologies, while automating security workflows.
With this new model, security professionals can map out the role of various security products, gain a better understanding of overall security readiness and gaps and ultimately, strengthen their organization’s overall security risk posture and efficiencies.
“The GigaSECURE Security Delivery Platform provides the network visibility and control required for enterprises to implement the Defender Lifecycle Model,” said Ananda Rajagopal, vice president of products at Gigamon. “The platform provides the intelligence, scale and flexibility to integrate with security tools such as firewalls and intrusion prevention systems to automate and accelerate threat containment and mitigation.”
The industry recognizes the need for integrated and automated security architectures. According to Gartner, “Strategies for business continuity and disaster recovery will fundamentally change as enterprise and information are spread everywhere. Continuous visibility and understanding of systems, services, assets and partners is needed as digital business infrastructure will be in a state of constant flux.”1
Gigamon continues to work with ecosystem partners including Cisco, Imperva, RSA and Vectra Networks to build out integrated security architectures that leverage the GigaSECURE Security Delivery Platform. The collaborative model is critical to help enterprises understand how to automate and eliminate human and process bottlenecks to more effectively stay ahead of threats.
“Automation is key for organizations to accelerate containment,” said Mike Adler, vice president of product for NetWitness Suite at RSA. “The ability to use security analytics to accurately identify advanced cybersecurity threats then to automatically contain these threats across the entire network is valuable to our joint customers.”
“Effective threat hunting and triage requires continuous visibility across the entire attack surface from cloud and data center workloads to user and IoT devices,” said Mike Banic, vice president at Vectra. “With complete network visibility provided by the Gigamon Visibility Platform, Vectra artificial intelligence enables enterprises to scale real-time detection and accelerate responses to cyberattacks.”
“Siloed security systems and data cannot accelerate or provide a basis for advanced prevention, detection and remediation activities, nor for process-driven security management,” said Dan Cummins, senior analyst at 451 Research. “To address current threats and unseen risks ahead, organizations need to move towards a unified, collaborative and data-powered security framework that enables shorter cycle times for incident response and resolution while ensuring network performance and business continuity."
1Gartner, Inc., Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats, Neil MacDonald, Felix Gaehtgens, May 22, 2017.
Additional Resources • “Perspectives on our Defender Lifecycle Model” with Shehzad Merchant blog • Defender Lifecycle Model Executive Brief • How to Disrupt the Machine-To-Human Fight: A Defender Lifecycle Model Shifts Control and Advantage Away from the Attacker” white paper • Defender Lifecycle Model webinar (VOD) with Shehzad Merchant
About Gigamon Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon Visibility Fabric™ and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively. Learn more at www.gigamon.com, the Gigamon blog or follow Gigamon on Twitter, LinkedIn or Facebook. See What Matters
# # # Legal Notice Regarding Forward Looking Statements This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Forward-looking statements generally relate to future events or our future financial or operating performance. In some cases, you can identify forward-looking statements because they contain words such as "may," "will," "should," "expects," "plans," "anticipates," "could," "intends," "target," "projects," "contemplates," "believes," "estimates," "predicts," "potential" or "continue" or the negative of these words or other similar terms or expressions that concern our expectations, strategy, plans or intentions. Forward-looking statements in this press release include, but are not limited to, the potential benefits of the new product offerings and solutions, and goals and expectations regarding future performance and opportunity for the Gigamon Visibility Platform and GigaSECURE technologies and relationships with certain ecosystem partners. Our expectations and beliefs regarding these matters may not materialize, and actual results in future periods are subject to risks and uncertainties that could cause actual results to differ materially from those projected. These risks include our ability to continue to deliver and improve our products and general market, political, economic and business conditions. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 10-K for the period ended December 31, 2016 and most recent Quarterly Report on Form 10-Q. The forward-looking statements in this press release are based on information available to Gigamon as of the date hereof, and Gigamon disclaims any obligation to update any forward-looking statements, except as required by law.
Media Contacts: Sebastian Rice Silverspan +61 417 217 091 email@example.com
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem