Download presentation
Presentation is loading. Please wait.
Published byRalf Mills Modified over 8 years ago
1
The Battle for Network Security - Putting Visibility in Your Armory WELCOME! Ken Kellstrom Regional Sales Director – Army
2
2 © 2016 Gigamon. All rights reserved. Gigamon Federal at a Glance FIPS 140—2 Department of Defense Approved Product List (UC-APL) DISA STIG NIAP Common Criteria (in evaluation) IPv6 Trade Agreement Act Compliant (TAA) Federal Certifications GSA Schedule 70 NASA SEWP Army CHESS DHS FirstSource Others Contracts 50+ Agencies Use Gigamon: Department of Defense Civilian Agencies Intelligence Community Major Federal Systems Integrators Customers
3
3 © 2016 Gigamon. All rights reserved. The CIO’s Dilemma SecureOperateDefend 123 AFFORDABLY! SecureOperateDefend
4
4 © 2016 Gigamon. All rights reserved. Intrusion Detection System Anti-Malware (Inline) Email Threat Detection Forensics IPS (Inline) Data Loss Prevention vv ForensicsData Loss Prevention Intrusion Detection System IPS (Inline) v Anti-Malware (Inline) Email Threat Detection Significant blind spots Extraordinary costs Contention for access to traffic Inconsistent view of traffic Blind to encrypted traffic Too many false positives Legacy Approaches Have Limited Visibility THERE IS SO MUCH TO PROTECT AND SO MANY PATHS TO MONITOR Data Loss Prevention IPS (Inline) Email Threat Detection v Anti-Malware (Inline) vv ForensicsIntrusion Detection System Internet Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm
5
5 © 2016 Gigamon. All rights reserved. GigaSECURE ® from Gigamon THE INDUSTRY’S FIRST SECURITY DELIVERY PLATFORM Internet Routers “Spine” Switches “Leaf” Switches Virtualized Server Farm Intrusion Detection System Data Loss Prevention Email Threat Detection IPS (Inline) Anti-Malware (Inline) Forensics Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach: physical and virtual Scalable metadata extraction for improved forensics Security Delivery Platform All tools still connected Fewer network touch points Enhanced tool efficiency Decreased OPEX costs Security Delivery Platform Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Inline bypass for connected security applications A complete network-wide reach: physical and virtual Scalable metadata extraction for improved forensics GigaVUE-VM and GIgaVUE ® Nodes NetFlow / IPFIX Generation Application Session Filtering SSL Decryption Inline Bypass
6
6 © 2016 Gigamon. All rights reserved. "Fly AWAY" Tactical GigaVUE 420 Mgmt 1G Tools 1G Copper TAP 1G MM SR TAP 1G SM LR TAP SFP+ Blank for 10G Tools SR LC Connector for 10G Tools Front View Rear View
7
7 © 2016 Gigamon. All rights reserved. Today: Over 35 Security Partners On Board
8
8 © 2016 Gigamon. All rights reserved. Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.