The Battle for Network Security - Putting Visibility in Your Armory WELCOME! Ken Kellstrom Regional Sales Director – Army.

Slides:



Advertisements
Similar presentations
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
Advertisements

Network Systems Sales LLC
Objective Our objective is to provide tailored business solutions to Airlines, Airports, Civil Aviation Authorities, and other aviation service providers.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
IBM Security Network IPS models, End of Support Dates and Replacement options 1.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
BELKIN BUSINESS INTRODUCTION. Secure DVI-I KVM Switch w/ DCU support 2 P/NDate F1DN104GShipping F1DN104HShipping NIAP Certified EAL 4+ Protection Profile.
The Most Analytical and Comprehensive Defense Network in a Box.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
It’s What You Can’t See That Will Sink You
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Barracuda Load Balancer Server Availability and Scalability.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Senior Network Architect.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Security Alberta  Tim McCreight, CISO – Government of Alberta  Moderator: Moderator: Illena Armstrong, editor-in-chief, SC Magazine.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Federal Acquisition Service U.S. General Services Administration GSA Assisted Acquisition Services Peter Han General Services Administration March 16,
© Intapp, Inc. 1 Cloud Strategies for Law Firms: Enabling Lawyer Productivity, Maintaining Firm Control.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Synchronized Security Revolutionizing Advanced Threat Protection
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
2015 NetSymm Overview NETSYMM OVERVIEW December
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
IS3220 Information Technology Infrastructure Security
Capabilities Briefing Presented to: Corey Ellis Resilient Systems.
Securing Interconnect Networks By: Bryan Roberts.
MOHAMAD NURHAKIM BIN ZAILAN 2TSK1. Wireless Gateways The wireless gateway is a device that allows a computer and other Internet-enabled devices.
FireEye NX In line Solution
Blue Coat Cloud Continuum
IXIA + FIREEYE SECURITY BATTLECARD
Clouding with Microsoft Azure
Network Security Solution
Cisco ASA 5500 Series Transition and Migration Guide for Distributors
Cost-Effective Strategies for Countering Security Threats:  IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
“Introduction to Azure Security Center”
That is why Rabobank has IPv6
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
ISMS Information Security Management System
Firewalls Routers, Switches, Hubs VPNs
Security Delivery Platform for the Micro-segmented Data Center
Unit 8 Network Security.
AT&T Firewall Battlecard
Global One Communications
Decrypted Encrypted Web Server Client-side Secure Tunnel
Presentation transcript:

The Battle for Network Security - Putting Visibility in Your Armory WELCOME! Ken Kellstrom Regional Sales Director – Army

2 © 2016 Gigamon. All rights reserved. Gigamon Federal at a Glance FIPS 140—2 Department of Defense Approved Product List (UC-­APL) DISA STIG NIAP Common Criteria (in evaluation) IPv6 Trade Agreement Act Compliant (TAA) Federal Certifications GSA Schedule 70 NASA SEWP Army CHESS DHS FirstSource Others Contracts 50+ Agencies Use Gigamon: Department of Defense Civilian Agencies Intelligence Community Major Federal Systems Integrators Customers

3 © 2016 Gigamon. All rights reserved. The CIO’s Dilemma SecureOperateDefend 123 AFFORDABLY! SecureOperateDefend

4 © 2016 Gigamon. All rights reserved. Intrusion Detection System Anti-Malware (Inline) Threat Detection Forensics IPS (Inline) Data Loss Prevention vv ForensicsData Loss Prevention Intrusion Detection System IPS (Inline) v Anti-Malware (Inline) Threat Detection Significant blind spots Extraordinary costs Contention for access to traffic Inconsistent view of traffic Blind to encrypted traffic Too many false positives Legacy Approaches Have Limited Visibility THERE IS SO MUCH TO PROTECT AND SO MANY PATHS TO MONITOR Data Loss Prevention IPS (Inline) Threat Detection v Anti-Malware (Inline) vv ForensicsIntrusion Detection System Internet Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm

5 © 2016 Gigamon. All rights reserved. GigaSECURE ® from Gigamon THE INDUSTRY’S FIRST SECURITY DELIVERY PLATFORM Internet Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Intrusion Detection System Data Loss Prevention Threat Detection IPS (Inline) Anti-Malware (Inline) Forensics Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach: physical and virtual Scalable metadata extraction for improved forensics Security Delivery Platform All tools still connected Fewer network touch points Enhanced tool efficiency Decreased OPEX costs Security Delivery Platform Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach: physical and virtual Scalable metadata extraction for improved forensics GigaVUE-VM and GIgaVUE ® Nodes NetFlow / IPFIX Generation Application Session Filtering SSL Decryption Inline Bypass

6 © 2016 Gigamon. All rights reserved. "Fly AWAY" Tactical GigaVUE 420 Mgmt 1G Tools 1G Copper TAP 1G MM SR TAP 1G SM LR TAP SFP+ Blank for 10G Tools SR LC Connector for 10G Tools Front View Rear View

7 © 2016 Gigamon. All rights reserved. Today: Over 35 Security Partners On Board

8 © 2016 Gigamon. All rights reserved. Questions?