|View printer-friendly version|
Cybersecurity professionals today have come to terms with the inevitability of breaches, and cite two key factors:
- The speed of data traversing networks leaves insufficient time for decision-making on potential threats.
- The continuous growth in the number of attackers and the ecosystem of resources available to break through standard defenses and propagate undetected across most infrastructures.
The traditional security focus – instrumenting networks for prevention and concentrating resources on a perimeter that no longer can be defined – is increasingly ineffective in today's environment. Organizations are hampered by limited visibility, extraordinary costs, growing infrastructure complexity and reliance on manual processes to address incidents.
"At 100Gb network speeds, the inter-packet gap of 6.7 nanoseconds surpasses an organization's ability to perform intelligent application security, threat detection or inspection," said
The Defender Lifecycle Model, with pervasive visibility into data-in-motion as its foundation, changes this dynamic and shifts to an automated machine-to-machine approach. It utilizes a security delivery platform to deliver security services that can learn, detect, predict and contain threats throughout the attack lifecycle. The model integrates machine learning and AI-based technologies, while automating security workflows.
With this new model, security professionals can map out the role of various security products, gain a better understanding of overall security readiness and gaps and ultimately, strengthen their organization's overall security risk posture and efficiencies.
"The GigaSECURE® Security Delivery Platform provides the network visibility and control required for enterprises to implement the Defender Lifecycle Model," said
The industry recognizes the need for integrated and automated security architectures. According to
"Automation is key for organizations to accelerate containment," said
"Effective threat hunting and triage requires continuous visibility across the entire attack surface from cloud and data center workloads to user and IoT devices," said
"Siloed security systems and data cannot accelerate or provide a basis for advanced prevention, detection and remediation activities, nor for process-driven security management," said
- "Perspectives on our Defender Lifecycle Model" with
- Defender Lifecycle Model Executive Brief
- "How to Disrupt the Machine-To-Human Fight: A Defender Lifecycle Model Shifts Control and Advantage Away from the Attacker" white paper
- Defender Lifecycle Model webinar (VOD) with
Legal Notice Regarding Forward Looking Statements
This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Forward-looking statements generally relate to future events or our future financial or operating performance. In some cases, you can identify forward-looking statements because they contain words such as "may," "will," "should," "expects," "plans," "anticipates," "could," "intends," "target," "projects," "contemplates," "believes," "estimates," "predicts," "potential" or "continue" or the negative of these words or other similar terms or expressions that concern our expectations, strategy, plans or intentions. Forward-looking statements in this press release include, but are not limited to, the potential benefits of the new product offerings and solutions, and goals and expectations regarding future performance and opportunity for the Gigamon Visibility Platform and GigaSECURE® technologies and relationships with certain ecosystem partners. Our expectations and beliefs regarding these matters may not materialize, and actual results in future periods are subject to risks and uncertainties that could cause actual results to differ materially from those projected. These risks include our ability to continue to deliver and improve our products and general market, political, economic and business conditions. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the
View original content with multimedia:http://www.prnewswire.com/news-releases/gigamon-announces-a-new-defender-lifecycle-model-300493400.html
Judy Kaneko, Gigamon, M. +1 (669) 600-1602, Judy.firstname.lastname@example.org; Melissa Chadwick, Merritt Group for Gigamon, M. +1 (571) 382- 8513, Chadwick@merrittgrp.com