The PRWIRE Press Releases https:// 2021-07-29T23:04:20Z Radware reports Q2 blocked DDoS attack volumes rise 40 percent-plus 2021-07-29T23:04:20Z radware-reports-q2-blocked-ddos-attack-volumes-rise-40-percent-plus SYDNEY, July 30, 2021—Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, today announced results from its Q2 2021 DDoS Attack Report. The report revealed that second quarter blocked DDoS attack volumes were up more than 40 percent compared to the same period in 2020. The report provides an overview of DDoS attack trends by industry, as well as across applications and attack types.Notable Takeaways• On average, a company had to detect and block nearly 5,000 malicious events and a volume of 2.3TB per month during the second quarter of 2021.• During Q2 of 2021, the average number of blocked malicious events per company was up more than 30 percent and the average blocked volume per company increased by more than 40 percent compared to the second quarter of 2020.• During the first half of 2021, a company located in the Americas or Europe, the Middle East and Africa (EMEA) had to repel, on average, twice as much volume compared to a company located in in Asia-Pacific (APAC). The Americas and EMEA accounted for about 80 percent of the blocked attack volume during that same period.“While large ransomware attacks are capturing headlines, companies need to pay attention to other cyber threats,” said Pascal Geenens, director of threat intelligence for Radware. “From an increase in DDoS extortion campaigns and DDoS hit-and-run assaults, to a hactivist group targeting financial organisations in the Middle East, the second quarter saw a concerning amount of cyber activity compared to the activity levels we saw during the same quarter last year. “The results of this report should serve as a strong reminder to enterprises that no company is immune from being a target.”Tech most attacked According to Radware’s report, the most attacked industry in the quarter was technology, with an average of almost 3,000 attacks per company, followed by healthcare (2,000 attacks per company) and finance (1,350 attacks per company). Attacks in retail, communications and telecommunications averaged between 600 and 1,000 per company. Gaming averaged more than 400 attacks per company, while an average of approximately 280 attacks targeted government and utility organisations. In terms of blocked volume, retail endured the highest volumes in the second quarter, followed by gaming, telecommunications and technology, which blocked the second, third and fourth highest volumes respectively.Radware’s attack report also revealed there were notable burst attacks during the second quarter of 2021. These targeted companies in finance and technology. These ‘hit-and-run’ DDoS assaults use repeated short bursts of high-volume attacks and were particularly aggressive in their amplitude (attack size) and frequency (number of bursts per unit of time). One attack showed multiple consistent 80Gbps bursts, lasting two to three minutes and repeating every four minutes. This resulted in 12 attack bursts of 80Gbps within a 45-minute timeframe.Ransom Denial-of-Service campaigns resurgeThe second quarter saw a renewed DDoS extortion campaign by an actor posing as Fancy Lazarus. By the end of May, Radware had numerous emergency on-boardings of its cloud security services from organisations that received these ransom letters. Ransom denial-of-service (RDoS) attacks, in which the victim receives a letter with a demand to pay a ransom or become the target of a DDoS attack, have been a persistent component of the DDoS threat landscape since August of 2020.During the second quarter of 2021, companies, on average, blocked almost 2,000 scan events by unsolicited vulnerability scanners. According to the attack report, of those scans, 40 percent were performed by potentially malicious scanners looking to actively exploit known vulnerabilities and attack an organisation. Vulnerability scanners are automated tools that allow organisations to check if their networks and applications have security weaknesses that could expose them to attacks.“Organisations are being challenged by well organised threat actors,” Geenens said. “The window between the disclosing and weaponising of new vulnerabilities is getting very slim. In some cases, we observed less than 24 hours between a manufacturer publishing a patch and malicious activity trying to exploit the vulnerability.”Radware’s full Q2 DDoS Attack Report can be found here along with charts and graphics. Data for the report is based on a sample set of Radware devices deployed in Radware’s cloud scrubbing centers and on-premise managed devices in Radware hybrid and peak protection services.About RadwareRadware® (NASDAQ: RDWR), is a global leader of cyber security and application delivery solutions forphysical, cloud, and software defined data centers. Its award-winning solutions portfolio secures thedigital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. Radware’s solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com. What Is TLS 1.2 and why should we still care? 2021-07-22T01:38:58Z what-is-tls-1-2-and-why-should-we-still-care The internet is the most ambitious communication and data transference technology ever created, but Gigamon cautions that with its advance come several challenges.“As we improve our ability to share large amounts of information between computers, servers and other digital devices, the risk of that data falling into unauthorised hands increases significantly,” says George Tsoukas, Gigamon’s ANZ Country Manager.To prevent eavesdroppers, hackers and other cyber criminals from accessing sensitive data as it moves through the internet, various cryptographic protocols have been introduced. The most famous of these are Secure Socket Layers (SSL) and Transport Layer Security (TLS).SSL has long been defunct, replaced by TLS and its subsequent versions. And with TLS 1.0 and 1.1 deprecated as of the end of 2020, organisations and web hosts wishing to ensure data safety need to move to support TLS 1.2 across all of their deployments. But what is TLS 1.2, and how does it work? To answer that, let’s first take a quick look at the history of cryptographic protocols.SSL 1.0, 2.0, and 3.0Back in 1995, when the internet was still figuring itself out, Netscape decided to address growing concerns over security by creating a form of encryption that would allow data to travel safely without the risk of being intercepted. SSL 1.0 was flawed, and never saw general release, but SSL 2.0 followed shortly afterwards, and was then superseded by the much improved SSL 3.0.This final SSL version became the standard for internet encryption for nearly two decades. Unfortunately, as technology improved, so did the capabilities of various online threat actors. In late 2014, the Google Security Team detected a major security flaw in SSL 3.0, necessitating a new approach to communication encryption. TLS was the solution.TLSOriginally envisioned as another SSL protocol upgrade, TLS instead grew into something unique enough to deserve its own designation. And while TLS 1.0 was different enough from SSL as to make interoperability impossible, it was designed with a mechanism allowing it to fall back on SSL 3.0 when needed — at reduced security effectiveness.TLS 1.0 was followed by TLS 1.1, improving its security offering and addressing a number of newly discovered weaknesses in the previous version. And TLS 1.1 was an effective cryptographic protocol for several years. But as with all of the previous protocols, eventually it became outdated and incapable of supporting modern cryptographic algorithms. TLS 1.2 addressed these issues while also including increased protection against newly discovered security vulnerabilities.What Is TLS 1.2?TLS 1.2 is simply an upgraded form of TLS 1.1. It was released in 2008, offers improved security, and was designed for both high performance and improved reliability. To accomplish this, it relies on a combination of symmetric and asymmetric cryptography.More specifically, TLS 1.2 replaces the MD5/SHA-1 combination in the digitally signed element with a single hash, ensuring increased security in negotiation during the handshake. At the same time, it provides improvements to both the client’s and the server’s ability to designate algorithms for the hash and the signature. TLS 1.2 also supports increased authentication encryption and adds TLS extensions and AES cipher suites. TLS 1.2 was a definite improvement over its predecessors. But, as anyone who works with technology knows, you can’t stop progress.In 2018, the Internet Engineering Task Force (IETF) finalised and published TLS 1.3, making it the most advanced and secure cryptography protocol available. TLS 1.3 improved web performance and security by increasing TLS handshake speed, improving load times, and removing obsolete and insecure TLS 1.2 cipher suites, such as the RSA key exchange algorithm, the RC4 stream cipher, the CBC mode cipher, and others. Simply put, TLS 1.3 is designed to secure against every known TLS 1.2 vulnerability and simplify the configuration process. So, with TLS 1.3 currently the obvious best choice for online data encryption, why should you still care about TLS 1.2?The TLS 1.2 deadlineBy the end of 2020, TLS versions 1.0 and 1.1 were no longer supported. That means that websites that don’t support TLS 1.2 or higher are now incapable of creating secure connections. Attempting to access those sites using a mainstream web browser (such as Google Chrome, Apple Safari, Mozilla Firefox or Microsoft Edge) will return a “Secure Connection Failed” error message. Similarly, e-commerce sites required to accept credit card payments and remain PCI compliant must use TLS 1.2 or higher.The overwhelming majority of websites currently support TLS 1.2 and will not be affected by the loss of TLS 1.0 and 1.1. That said, there may still be a handful of sites that have not yet upgraded. By delaying support for TLS 1.2, these sites put themselves, and their clients, at significant risk.Dangers of not upgrading to TLS 1.2TLS 1.2 isn’t simply the obvious next step for Transport Layer Security, it’s an actual solution to serious security threats. In recent years, both TLS 1.0 and 1.1 have become vulnerable to various advanced cryptographic threats, including BEAST and POODLE. Both of these threats allow attackers to take advantage of TLS security weaknesses to recover potentially sensitive data. These are by no means the only threats facing outdated TLS protocols. Organisations that resist upgrading put themselves and their users at risk of data theft.Beyond the dangers of insecure data, non-1.2-compliant sites will also suffer significant traffic loss. As visitors attempt to use standard browsers to access these sites, they will encounter the aforementioned error message, essentially deflecting them away from accessing the desired content. This means that these sites will be unable to interact with potential customers, or negatively impact on an organisation’s credibility. Those who see ‘Secure Connection Failed’ are much less likely to trust that particular site, or the organisation behind it, in future sessions. Outdated TLS versions have also been linked to lower rankings in Google search-engine results pages.Finally, e-commerce sites that do not have TLS 1.2 support risk up to $US100,000 in non-compliance fines and will likely be unable to process payments.How to upgrade to TLS 1.2Unfortunately, there is no single button or process to ensure TLS 1.2 compatibility; depending on the platform and software solutions currently in use, the process may be extremely simple or unnervingly complex.Start by identifying which systems may need to be upgraded and which don’t. Reviewing local software, legacy systems, and online stores and payment gateways may reveal TLS vulnerabilities. Platforms and connections that may need to be upgraded to TLS 1.2 include internet information services, web servers, e-commerce applications, and .Net Framework. Thankfully, e-commerce third-party support will likely have already been upgraded.Working closely with IT and security teams is vital, as is creating a detailed migration plan. Upgrading to support TLS 1.2 is essential, particularly as TLS 1.0 and 1.1 are deprecated. But for the best possible protection, upgrade to TLS 1.3 and regularly patch and upgrade TLS software to ensure protection against new threats.As internet information technologies evolve, so do the threats that they face. The coordinated move to TLS 1.2 is an effective solution to help ensure optimal data security, both for organisations and customers.Gigamon has a number of tools that help to keep information secure, specifically when it comes to SSL/TLS decryption. Learn how our bundled GigaSMART® SSL/TLS Decryption apps will help you to efficiently decrypt and re-encrypt traffic and meet privacy and compliance requirements — meaning not only greater security, but fewer headaches for everyone.### Radware reveals hacktivists flying under the radar 2021-07-19T00:57:08Z radware-reveals-hacktivists-flying-under-the-radar An in-depth survey of hacktivists by Radware has revealed new information on their activities. The data security specialist says that while some well-established threat actors are carrying out major ransomware attacks that capture news headlines, other cyber actors warrant companies’ close attention.These attackers may be less sophisticated and more grass roots, but they are no less determined and motivated to cause widespread disruption. And unlike their bigger ransomware counterparts, they are not seeking financial gain.A new example: #OpsBedil is a hacktivist operation currently targeting verticals like financial, transportation and education, as well as government agencies in the Middle East. They have built a new forum which is growing quickly. Threat actors behind DragonForce Malaysia created the domain DragonForce.io on June 11th, 2021. Although less than 30 days old, the forum claims to have over 10,000 members and 3,000 discussion threads.Anyone can join the forum learn about what targets they have hit and what damage they have done. And anyone wants to join in, they can. The forum also reports on what targets they want to hit and what tools they can use. There are no rules about conducting malicious activity.In some cases, all you need is a mobile device. While the organisers seem to lack the skill and ability to conduct sophisticated and large-scale DDoS attacks, the DoS tools they suggest still have their place in the DoS threat landscape. While well-known and rudimentary, these tools still are very effective when leveraged against unprotected assets.Their attacks ranged from simple defacement campaigns, DDoS attacks to data leaks and were documented in detail on DFM’s forum and Telegram channel.https://hackersalmanac.radware.com/ Hacktivists flying under the radar 2021-07-16T00:30:53Z hacktivists-flying-under-the-radar Radware has issued information on the following:# While some well-established threat actors are carrying out major ransomware attacks that capture news headlines, other cyber actors warrant companies’ close attention.# These attackers may be less sophisticated and more grass roots, but they are no less determined and motivated to cause widespread disruption. And unlike their bigger ransomware counterparts, they are not seeking financial gain.# One new example: #OpsBedil is a hacktivist operation currently targeting verticals like financial, transportation and education, as well as government agencies in the Middle East. They have built a new forum which is growing quickly. # The threat actors behind DragonForce Malaysia created the domain DragonForce.io on June 11th, 2021. Although less than 30 days old, the forum claims to have over 10,000 members and 3,000 discussion threads.# Anyone can join the forum learn about what targets they have hit and what damage they have done. And anyone wants to join in, they can. The forum also reports on what targets they want to hit and what tools they can use. There are no rules about conducting malicious activity.# In some cases, all you need is a mobile device. While the organisers seem to lack the skill and ability to conduct sophisticated and large-scale DDoS attacks, the DoS tools they suggest still have their place in the DoS threat landscape. While well-known and rudimentary, these tools still are very effective when leveraged against unprotected assets.# Their attacks ranged from simple defacement campaigns, DDoS attacks to data leaks and were documented in detail on DFM’s forum and Telegram channel.Full information here: https://hackersalmanac.radware.com/ Gigamon wins 2021 Fortress Cyber Security Awards 2021-06-24T23:51:47Z gigamon-wins-2021-fortress-cyber-security-awards SYDNEY —June 25, 2021—The Business Intelligence Group announced that Gigamon, the leader in cloud visibility and analytics, has won the 2021 Fortress Cyber Security Award in the Leadership category, recognising Josh Day, Director of Applied Threat Research (ATR), for his commitment and guidance in the fight against cyberattacks. Gigamon was also named a winner in the Threat Detection category for its ThreatINSIGHT ™ solution. The industry awards program sought to identify and reward the world’s leading companies and products that are working to keep data and electronic assets safe among a growing threat from hackers.Josh Day guides the ATR team in their mission to dismantle adversary impact through novel threat research and enhanced capability. Previously serving in the United States Air Force and working with the National Security Agency (NSA), he led and conducted computer network operations, working with national-level agencies. This experience has given Day a distinctive perspective when hunting for adversaries in customer networks. “Josh is a vital part of Gigamon ATR and his invaluable experience and leadership has helped to guide the team’s efforts in assisting our customers to swiftly and efficiently dismantle impending threats,” said Shehzad Merchant, Chief Technology Officer at Gigamon.“In his role, he has successfully developed and formalised cross-team processes for strategic detection sprints in the midst of a fully-remote workforce, helping us to ensure ThreatINSIGHT detection logic is able to keep pace with the changing landscape – including leading the team’s roll out of new detections within 48 hours of the public disclosure of the SolarWinds compromise – all after just returning from his paternity leave. “We are grateful for Josh’s continued dedication to Gigamon and willingness to support both his team and Gigamon customers.” Recently, Gigamon announced ThreatINSIGHT Guided-SaaS network detection and response (NDR), the industry’s first Guided-SaaS NDR solution of its kind, combining purpose-built technology with security expert guidance to improve Security Operations Center (SOC)/incident response (IR) effectiveness and reduce analyst burnout. Given today’s rapidly evolving threat landscape, the cloud-native solution addresses visibility gaps not covered by security information and event management (SIEM) and endpoint detection and response (EDR) solutions. The solution provides threat activity detection, and the data and context needed for effective cybersecurity response during high-pressure situations.“Receiving this recognition further validates the role Gigamon and ThreatINSIGHT play in securing our customers’ networks with the technology and expertise required to combat the evolving threat landscape,” said Michael Dickman, Chief Product Officer at Gigamon. “Recent attacks have shown that network-based threat detection is an absolute necessity. We are pleased to see our Guided-SaaS NDR approach embraced by market experts because of how effectively we help InfoSec teams detect and de-escalate high-risk situations with guided workflows and responder expertise by their side.” “We are so proud to name Gigamon as a winner in the 2021 Fortress Cyber Security Awards program,” said Maria Jimenez, Chief Nominations Officer, Business Intelligence Group. “As our society continues to evolve and become more reliant on networks and data, companies like Gigamon are critical at providing the protection and trust consumers demand.”For information about Gigamon please visit www.gigamon.com. For information about the annual Fortress Cyber Security Awards, please visit https://www.bintelligence.com/fortress-cyber-security-awards.About GigamonGigamon helps the world’s leading organizations run fast, stay secure and innovate. We provide the industry’s first Guided-SaaS NDR (network detection and response) solution which closes the Security Operations Center (SOC) visibility gap, removes unnecessary distractions and provides expert advisory guidance when it matters most. With visibility into network traffic across their entire hybrid cloud infrastructure, organizations eliminate security blind spots while benefiting from Gigamon security expert guidance, helping improve SOC effectiveness and reducing burnout of their security teams. Gigamon has been awarded over 90 technology patents and enjoys world-class customer satisfaction with more than 4,000 organizations, including over 80 percent of the Fortune 100 and hundreds of government and educational organizations worldwide. Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visit www.gigamon.com and follow us on Twitter. and LinkedIn.About Business Intelligence Group The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other industry award programs, these programs are judged by business executives having experience and knowledge. The organization's proprietary and unique scoring system selectively measures performance across multiple business domains and rewards those companies whose achievements stand above those of their peers. For more information, visit www.bintelligence.com. Gigamon Media Inquiriespublic.relations@gigamon.com Business Intelligence Media InquiriesMaria Jimenez, Chief Nominations OfficerBusiness Intelligence Groupcontact@fortresswards.com +1 909.529.2737 Bitglass study finds security gaps remain pervasive across BYOD initiatives 2021-06-16T00:44:57Z bitglass-study-finds-security-gaps-remain-pervasive-across-byod-initiatives SYDNEY, June 16. Bitglass, the total cloud security company, today announced findings from its 2021 BYOD Security Report that show the rapid adoption of unmanaged personal devices connecting to work-related resources (aka BYOD) and why organisations are ill-equipped to deal with growing security threats such as malware and data theft. The study, a joint venture with Cybersecurity Insiders, surveyed hundreds of cybersecurity professionals across industries to better understand how COVID-19’s resulting surge of remote work has affected security and privacy risks introduced by the use of personal mobile devices. The insights in this report are especially relevant as more enterprises shift to permanent remote work or hybrid work models, connecting more devices to corporate networks and, as a result, expanding the attack surface.“As mobility and remote work environments keep growing, so do challenges ranging from managing device access to handling urgent mobile security concerns,” said Holger Schulze, founder, Cybersecurity Insiders. “Our research uncovered a plethora of evidence that shows organisations are not paying enough attention securing unmanaged personal devices and why the time is now for them to think differently when it comes to securing BYOD.” Key Findings from the Bitglass 2021 BYOD Security Report: BYOD is here to stay The shift to remote work amid the pandemic resulted in 47 percent of organisations reporting an increase of personal devices being used for work. As a result, a total of 82 percent of organisations said they now actively enable BYOD to some extent. While the use of personal devices has helped businesses improve employee productivity and, while also reducing costs, challenges associated with managing device access and mobile security remain. Securing BYOD to prevent data loss/theft is a top concern The most critical concern respondents expressed was data leakage or loss (62 percent). Other apprehensions included users downloading unsafe apps or content (54 percent), lost or stolen devices (53 percent), and unauthorised access to company data and systems (51 percent). Enterprises are running blind when it comes to securing BYOD devices against modern security threats. For example, 22 percent of organisations indicated they can confirm that unmanaged devices have downloaded malware in the past 12 months. However, nearly half (49 percent) indicated they are not sure or could not disclose whether the same could be said for them. This lack of visibility can be detrimental to the overall business.Many organisations are securing BYOD with old tools vs modern threatsA total of 41 percent of organisations reported relying on endpoint malware protection for BYOD—an approach that is not ideal for personal devices which are hard to control and manage. Over a quarter (30 percent) of firms said they don’t protect against malware for BYOD at all. While cloud-based malware protection tools are often a far better fit, only 11 percent of organisations surveyed are currently using these measures. “As enterprises begin to shift to hybrid work environments, personal devices will provide the flexibility and remote access that employees require. This new way of working, however, will undoubtedly stretch the resources of security teams,” said Anurag Kahol, CTO, Bitglass. “This is why there has never been a more important time for enterprises to seriously rethink their approach to secure all forms of communication amongst users, devices, apps, or web destinations.” Methodology Cybersecurity Insiders surveyed 271 cybersecurity professionals, conducted in April 2021, to gain deep insight into mobile BYOD security threats faced by organisations and the solutions to prevent and remediate them. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organisations of varying sizes across multiple industries.About Bitglass Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction.Its Polyscale Architecture boasts an industry-leading uptime of 99.99% and delivers unrivalled performance and real-time scalability to any location in the world. Based in Silicon Valley with offices worldwide, the company is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. ANZ media contactDavid FrostTouchdown for Bitglass+61 (0) 408 408 210dfrost@touchdownpr.com Radware alert: Fancy Lazarus DDoS extortion group is back with new campaign focused on unprotected assets across all industries 2021-06-14T23:52:28Z radware-alert-fancy-lazarus-ddos-extortion-group-is-back-with-new-campaign-focused-on-unprotected-assets-across-all-industries SYDNEY, June 15, 2021—Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, published a cybersecurity alert warning that Fancy Lazarus, a well-known distributed denial of service (DDoS) extortionist, has resurfaced with a new campaign focused on organisations with unprotected assets across all sizes of companies in all industries. Less than a year ago, a Ransom DDoS threat actor posing as ‘Fancy Bear’ and ‘Lazarus Group’ was targeting specific industries such as finance, travel and e-commerce organisations and was blind to whether these organisations had DDoS protection or not. This earlier campaign turned out to be one of the most extensive and longest-running DDoS extortion campaigns in history.Lately, Radware has identified an increase in emergency onboardings from new customers that have had DDoS ransomware threats. In recent weeks, Radware has been monitoring an increase of activity from a threat actor calling himself Fancy Lazarus targeting organisations with assets that were supposedly not adequately protected and inviting them to pay a ransom rather than endure devastating DDoS attacks. In their letters, the extortionists give their victims seven days to buy the Bitcoin and pay the ransom before they start their DDoS attacks. Each day after the deadline passes without payment increases that fee. The ransom demand varies between targets and seems to be adjusted to a target’s reputation and size. The ransom demand is also less expansive compared to the huge demands of 10 and 20 bitcoin (currently, about $370,000 and $740,000 at time of writing) witnessed from last summer’s campaigns. Demands now generally vary between 0.5 Bitcoins ($18,500) and five Bitcoins ($185,000) and increase by the same amounts for every day the deadline is missed.“This is the first time we are seeing the bad actors selectively target organisations and favour those with unprotected assets for their ransom letters,” said Pascal Geenens, Director of Threat Intelligence, Radware. “This implies that malicious actors are leveraging Border Gateway Protocol routing information to detect whether targets are protected by always-on cloud protection services. In addition, we’re seeing that ransom DDoS, which traditionally was an event limited in time with yearly spikes, is now becoming a persistent threat, and should be considered an integral part of the DDoS threat landscape.”Reports from victims impacted by follow-through attacks of this extortion campaign confirm this observation. Most Internet Service Providers (ISP) and Cloud Service Provider (CSP) victims were equipped with DDoS mitigation services to protect their customers. However, it appears that not all of them were prepared for large, globally distributed attacks targeting their DNS servers or saturating their internet links. Very large and globally distributed DDoS attacks can be effectively mitigated only by stopping malicious traffic closest to its source and never allowing multiple geographically distributed traffic streams to flock. Only globally distributed and anycasted protection services are effective against these kinds of DDoS attacks. Geenens added: “The recent uptick in criminal activity should be a strong reminder to enterprises, ISPs and CSPs of any size and industry to assess the protection of their essential services and internet connections and plan against globally distributed DDoS attacks aimed at saturating links. This is especially in the case of service providers and their DNS services. We believe hybrid DDoS solutions provide the best of both worlds with on-premises protection against all types of DDoS attacks while automatically diverting to a cloud DDoS Service when the attack risks saturating the internet link.”About RadwareRadware® (NASDAQ: RDWR), is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. Radware’s solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.Radware encourages you to join our community and follow us on: Facebook, LinkedIn, Radware Blog, Twitter, YouTube, and Radware Mobile for iOS and Android,.Media contact :RadwareJoel Arabiajoel.arabia@radware.com Gigamon launches ThreatINSIGHT guided-SaaS NDR to improve SOC effectiveness and reduce analyst burnout 2021-06-11T00:09:02Z gigamon-launches-threatinsight-guided-saas-ndr-to-improve-soc-effectiveness-and-reduce-analyst-burnout SYDNEY – June 11, 2021 – Gigamon, the leader in cloud visibility and analytics, today announced ThreatINSIGHT Guided-SaaS NDR (network detection and response), which was purpose built to improve SOC (Security Operations Center) effectiveness and reduce analyst burnout. ThreatINSIGHT Guided-SaaS NDR, which redefines how SaaS-based security solutions are delivered, arrives at a critical juncture in threat defence as exponential growth in infrastructure complexity, and ever-increasing cyber threat activity, is negatively impacting InfoSec team’s ability to efficiently do their jobs, ultimately contributing to high burnout rates.ThreatINSIGHT alleviates the three most common problems that continue to plague SOC analysts and incident responders. They are often working in the dark without foundational visibility to observe adversary movement, leading 69% of IT and security practitioners to cite network visibility as the top reason for SOC ineffectiveness. They continually face the distraction of burdensome tool maintenance, prompting 43% of SOC analysts to indicate that maintaining, tuning and providing updates to their security tools is their core responsibility. Finally, they are often operating alone, without expert support, which is a factor CISOs must consider when addressing why 70% of their SOC analysts report burnout due to high-pressure environments. Gigamon ThreatINSIGHT removes these burdens that otherwise prohibit teams from focusing on effectively identifying adversary activity across the MITRE ATT&CK framework. In addition, during high-pressure, active incidents, customers benefit from access to expert-level guidance from the experienced security analysts and incident responders on the Gigamon Technical Success Managers (TSM) team. “Security analysts are consistently overwhelmed, stressed, and understaffed, leaving the majority pretty much unable to anticipate, recover from, or adapt to new attacks (without reaching burnout, which is common),” wrote analyst Allie Mellen from Forrester in a recent series of blog posts. “Security tools must support security teams in doing their jobs better, from the people side, the process side, and the technology side.”[1]With Gigamon ThreatINSIGHT Guided-SaaS NDR, teams are more effective with less stress as a result of:Visibility. ThreatINSIGHT ensures SOC analysts are never in the dark by delivering guided visibility to adversary network activity, not observable by EDRs and SIEMs. Network traffic provides the essential foundation for incident response including visibility to lateral movement, command and control, and other steps along the MITRE ATT&CK framework. ThreatINSIGHT can observe and identify adversary activity on any device or network, across any type of traffic, including encrypted traffic, thereby eliminating the SOC visibility gap.Focus. ThreatINSIGHT minimises distractions by guiding security professionals to high-confidence detections crafted by the Gigamon Applied Threat Research (ATR) team. By continuously delivering QA’d and tuned advanced machine learning, behavioural analytics, and proprietary threat intelligence for true positive adversary detection, clients are not distracted with laborious false-positive tuning. Expertise. ThreatINSIGHT guides SOC analysts via product and people. The solution guides investigative workflows built by our expert responders, on top of a powerful and flexible Insight Query Language. TSMs, included as part of the service, are security analysts and incident responders themselves who provide best practices and threat knowledge to directly assist clients when they need it most.“As hybrid cloud and hybrid workforces become the new normal and as threat actors continually increase their sophistication, the job of security analysts and incident responders becomes even more complex,” said Michael Dickman, Chief Product Officer at Gigamon. “The rise in recent ransomware attacks is a strong reminder that security teams need defence-in-depth with visibility, focus, and expertise. Now, with the world's first Guided-SaaS NDR, customers no longer have to fight this battle alone, or without full visibility of their adversary. InfoSec teams now have the tools and expertise to respond with speed and confidence.”For more information on the efficiency and effectiveness of ThreatINSIGHT, read the ESG Technical Review to learn how ESG independently validated the efficacy of Gigamon ThreatINSIGHT.About GigamonGigamon helps the world’s leading organizations run fast, stay secure and innovate. We provide the industry’s first Guided-SaaS NDR (network detection and response) solution which closes the Security Operations Center (SOC) visibility gap, removes unnecessary distractions and provides expert advisory guidance when it matters most. With visibility into network traffic across their entire hybrid cloud infrastructure, organisations eliminate security blind spots while benefiting from Gigamon security expert guidance, helping improve SOC effectiveness and reducing burnout of their security teams. Gigamon has been awarded over 90 technology patents and enjoys world-class customer satisfaction with more than 4,000 organisations, including over 80 percent of the Fortune 100 and hundreds of government and educational organisations worldwide. Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visit www.gigamon.com and follow us on Twitter. and LinkedIn.Media Inquiries:GigamonEmail: public.relations@gigamon.com Radware announces Hacker’s Almanac: details threat landscape, tactics, techniques used by cyber criminals 2021-06-09T00:13:00Z radware-announces-hackers-almanac-details-threat-landscape-tactics-techniques-used-by-cyber-criminals SYDNEY, June 9, 2021—Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, today announced Part One of its 2021 Hacker’s Almanac eBook. Preparing for the next generation of cyber-attacks requires organisations to stay ahead of the threat landscape. Radware’s Hackers Almanac is designed to address this challenge by, in Part I, generating awareness about current threat actors. Part II will cover tactics, techniques and procedures (TTPs) used by cyber criminals, while Part III will cover intelligence and mitigation strategies. The latter two will be available later this year.Part One Key Topics include:• Nation States: This section provides an overview of six important nation-state groups and examples of recent operations that underscore their objectives, typical targets and initial access tactics.• Organised Crime: This section delves into the latest regarding various underground ‘cyberattack-as-a-service,’ industrial espionage, financially motivated groups behind the recent waves of ransom DDoS attacks, and more.• Hacktivists: Through examples of recent operations, this section highlights the likely motivations that hacktivists have launching their assaults.• Hackers: Classifying hackers can be complex, with actors occupying multiple threat groups at the same time. This section defines the difference between black, white and grey hackers.• Disgruntled Insiders and Customers: This section provides examples of how attacks performed under an intense emotional state can result in serious damage, and why this class typically relies on cybercrime-as-a-service to conduct their actual attacks.“One of the key takeaways of this year’s Hacker’s Almanac is how cyber crime has become a huge business,” said Pascal Geenens, director of threat intelligence for Radware and co-author of the e-book. “The business of cyber crime via underground forums continues to flourish complete with supply chain, middlemen and sales, distribution channels and customer service best practices. “Another almanac highlight is detailed information on six important nation-state groups that influence, disrupt and compromise the political or economic stability of other nations.”Interested parties can obtain the Hacker’s Almanac here: https://hackersalmanac.radware.com/About RadwareRadware® (NASDAQ: RDWR), is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. Radware’s solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.Media contact:Joel Arabia, +1 201-4945988, joel.arabia@radware.com US cyber security company Anomali partners with Australian threat intelligence provider Cybermerc to strengthen cyber defences 2021-05-25T23:16:42Z us-cyber-security-company-anomali-aligns-with-australian-threat-intelligence-provider-cybermerc-to-strengthen-cyber-defences CANBERRA, May  25, 2021. Anomali, the  international leader in intelligence-driven cyber solutions, has announced a partnership with Australian threat intelligence company Cybermerc. Their merged solutions will strengthen Aushield Defend, Australia’s national threat investigation and sharing platform, which protects organisations against the  latest cyber threats. “The entire APAC region is  inundated with  cyber attacks. Businesses are  keenly aware of how  damaging threats like  Olympic Destroyer can  be  and know that  Advanced Persistent Threats, backed by  hostile nations such as  North Korea, are  always looking for  ways to penetrate networks,” said Stree Naidu, Anomali’s General Manager for Asia Pacific and Japan (APJ). “I’m excited to be aligning with  a company known and trusted for  defending Australian networks against the  most sophisticated cyber attacks.” Canberra-based Cybermerc is committed to lifting the  cyber capability of all  Australian organisations. The company’s mission is to build a collective cyber defence by connecting Australian government, industry and academia. Aushield Defend provides an enhanced intelligence feed of analysed data from a wide range of sources, including Cybermerc’s own sovereign security technologies. Defend provides organisations with information on the  latest attacks, key risks and the Indicators of Compromise (IoC) needed to protect Australian networks. The recipient of two rounds of federal funding through the  AustCyber Project Fund, Aushield Defend brings government, business and industry together to share intelligence and protect against cyber threats. Cybermerc’s Director of Aushield, Andrew Slater, says: “Australian organisations have been defending themselves in isolation. Cyber security is  not  a ‘me’ and ‘you’ problem – it is  an ‘us’ problem and we can  be  far more effective together...we can be  secure together. “Aushield Defend evolves the traditional cyber threat intelligence consumption model by generating intelligence of the  latest attacks and constantly updating security devices, creating a defensive cyber collaboration across the  country.” Cybermerc leverages machine-learning and Artificial Intelligence to strengthen Aushield Defend and provide defence grade cyber security detection and protection to Australian Small to Medium businesses and enterprise organisations at an affordable price point. About Anomali Anomali is  the  leader in intelligence-driven cybersecurity. More  than 1,500 public and private sector organizations rely  on  Anomali to see  and detect threats more quickly, reduce the  risk of security breaches, and improve the  productivity of security operations Anomali solutions serve customers around the world in nearly every major industry vertical, including many of the  Global 2000. As  an early threat intelligence innovator, Anomali was founded in 2013 and is  backed by  leading venture firms.  Paladin Capital Group, In-Q-Tel, Institutional Venture Partners, and General Catalyst. Learn more at ***.anomali.com.       News  Contact Joe  Franscella APAC-news@anomali.com Larissa Crandall of Gigamon featured on CRN’s 2021 Women of the Channel list 2021-05-25T03:31:22Z larissa-crandall-of-gigamon-featured-on-crns-2021-women-of-the-channel-list SYDNEY, May 25, 2021 — Gigamon, the leader in cloud visibility and analytics, today announced that CRN®, a brand of The Channel Company, has named Larissa Crandall, VP of Worldwide Channel & Alliances, to the highly respected Women of the Channel list for 2021. This annual list recognises the unique strengths, vision and achievements of female leaders in the IT channel. The 2021 Women of the Channel list acknowledges women from all over the IT channel, including vendors, distributors and solution providers.The women honoured on this year’s list pushed forward with comprehensive business plans, marketing initiatives and other innovative ideas to support their partners and customers, helping them through the uncertainty brought on by the global COVID-19 pandemic. CRN celebrates these exceptional women for their leadership, dedication and channel advocacy. With over 21 years as a channel sales executive in the high-tech industry, Crandall has extensive experience transforming global partner ecosystems. While at Gigamon, she has played a key role in doubling the channel team while pivoting strategy to a channel-first approach. Last year, the Gigamon channel business grew more than 35%, resulting in an increase in revenue, channel-initiated business and ecosystem alignment. Crandall led the creation of the Gigamon Playbook, training and enablement programs, as well as the development of go-to-market (GTM) solutions to accelerate revenue during turbulent times.“CRN’s 2021 Women of the Channel list acknowledges accomplished, influential women whose dedication, hard work, and leadership accelerate channel growth,” said Blaine Raddon, CEO of The Channel Company. “We are proud to honor them for their many accomplishments and look forward to their continued contributions to the IT channel.”“We’re honoured to have one of the strongest channel leaders within the Gigamon team, driving our Channel-first strategy. Larissa has received many awards in the past and, this year, has been selected to join the ranks of the ‘Women in the Channel’ leaders, said Paul Hooper, Chief Executive Officer at Gigamon. “In addition to leading our channel to outstanding levels of performance, she is also the Executive Sponsor of GigaWomen, a key employee resource group which advocates for women in sales leaderships roles and within technology in general. We are incredibly fortunate to have Larissa as part of our team.” As a proven team-builder and employee advocate, Crandall’s sponsorship of the GigaWomen group is a testament to her ability to help develop lifelong career allies. Crandall empowers the group to share their wealth of knowledge and experience throughout every aspect of their professional journey. As a testament to her leadership skills, this marks the fifth consecutive year that Crandall has made the CRN Women of the Channel List. She was also named to the 2021 CRN’s Channel Chief’s List, for the second consecutive year, and was included in CRN’s Power 100 – Top Most Powerful Women of the Channel in 2018 and 2019.The 2021 Women of the Channel list is featured in CRN Magazine and online.About Gigamon Gigamon helps the world’s leading organizations run fast, stay secure and innovate. We provide the industry’s first elastic visibility and analytics fabric, which closes the cloud visibility gap by enabling cloud tools to see the network and network tools to see the cloud. With visibility across their entire hybrid cloud network, organizations can improve customer experience, eliminate security blind spots, and reduce cost and complexity. Gigamon has been awarded over 90 technology patents and enjoys world-class customer satisfaction with more than 4,000 organizations, including over 80 percent of the Fortune 100 and hundreds of government and educational organizations worldwide. Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visit www.gigamon.com and follow us on Twitter and LinkedIn.About The Channel Company The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers, and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelcompany.com Follow The Channel Company: Twitter, LinkedIn, and Facebook.The Channel Company Contact:Jennifer HoganThe Channel Companyjhogan@thechannelcompany.com Netpoleon Solutions launches in NZ and hires regional manager 2021-05-25T00:45:19Z netpoleon-solutions-launches-in-nz-and-hires-regional-manager AUCKLAND, May 25. Cyber security value-added distributor Netpoleon began operating in New Zealand recently and has appointed Jeremy Chua as its regional manager. Previously Jeremy was Asia Pacific Sales Director for multiple global digital forensics investigation solutions vendors. He has extensive experience in the cyber security sector, in the incident response and investigation space.In those roles, he grew the brands’ footprint and awareness successfully throughout the region. Jeremy also created the regional channels foundations that are still current today.Netpoleon Australia’s Director, Paul Lim, based in Melbourne, said: ”We are delighted to have Jeremy join the team. His self-starter’s background, industry knowledge and strong relationships in the cyber security circle mean that Netpoleon is better placed to promote our solutions and offer channel partners greater results.”Based in Auckland, Jeremy’s key objective will be create alliances with channel partners and offer value added solutions and services to the channel eco-system.He says: “I understand the cyber security landscape and its challenges, from both the providers’ and users’ standpoint. I spend time listening to various parties’ difficulties and offer value-added solutions. “Since I do not believe in a one-size-fits-all approach to cyber security, my new role will allow me to expand on my consultative 2-tier approach.”He added: “I am looking forward to getting to know Netpoleon’s customers and partners to offer them more robust and flexible options in the market .”Netpoleon NZ will be representing and extending vendors through Netpoleon Australia, including Thales, Silverfort, Guardicore and Anomali.### Radware reports DDoS attacks up 31 pc in Q1 2021 vs. Q4 2020 - huge attacks triple 2021-05-21T01:28:15Z radware-reports-ddos-attacks-up-31-pc-in-q1-2021-vs-q4-2020-huge-attacks-triple Radware’s® DDoS Attack Report, finds that while the number of attacks held steady in Q1 (down 2% from Q4 2020, attack volumes increased by 31%.  The largest recorded attack in Q1 of 2021 was 295Gbps, up from 260Gbps in Q4 of 2020. In fact, the occurrence of major attacks of 10Gbps or more tripled in Q1 2021 vs. December 2020.  Radware’s new quarterly report series, provides an overview of attack activity experienced by a sample of the data security vendor’s customers during the first quarter of the calendar year 2021.   The report analyses DDoS attack activity by industries, attack vectors, DDoS attacks on applications and on-premise vs. cloud.  The report finds that in addition, while DDoS attacks have traditionally impacted public assets, damaging an organisation’s reputation through public exposure, healthcare is different.  Those back-end infrastructure attacks are occurring more frequently during weekday business hours, with little activity over weekends or holiday periods.  This impacted on day-to-day operations such as the connectivity to cloud-based applications by employees or the remote access for those still working from home.   Pascal Geenens, Director of Threat Intelligence for Radware, said: “The first half of Q1 was characterised by large attacks on finance and a continuation of the 2020 ransom DDoS campaign.  “By the end of 2020, the extortionists started circling back to earlier victims who did not pay ransom in earlier attempts, reusing their attack research and increasing the pace of their campaign to benefit from the surging Bitcoin value.” Several global organisations had branches/remote offices impacted during this period, with actors leveraging new tactics to impact the productivity of organisations by targeting internet connectivity and remote access. To overcome the pandemic, organisations began relying on remote operations, teleworking and remote access infrastructure. As a result, DDoS actors found new opportunities and began targeting the backend of the communication infrastructure of organisations. With limited bandwidth, attackers can achieve more impact and disrupt a branch or an organisation's operations.  Interrupting or affecting the performance of the remote access infrastructure had an increased impact on the organisations' productivity during the pandemic. Attacking the public assets of organisations provides increased visibility, but typically these assets are better protected and harder to bring down. Public-facing assets remained an essential target throughout Q1 of 2021 for actors attempting to impact an organization's reputation or send a political message.  Select Industry Findings Healthcare was dominated by biotechnology and pharmaceutical attacks in the first half of Q1 of 2021, while the activity moved to a smaller number of attacks targeting hospitals in the second half of the quarter. The public assets of large biotechnology organisations were the primary targets and resulted in the most significant attacks for the healthcare vertical for the quarter. Attacks on finance changed from infrequent, high-volume attacks in December and January to smaller, more frequent global attacks in March, impacting more offices and branches of multinational organisations. Government experienced high attack activity in October 2020, but the largest volumes were noted in February and March 2021.  How a single click led to Waikato hospitals chaos 2021-05-20T00:09:13Z how-a-single-click-led-to-waikato-hospitals-chaos HAMILTON, May 20. Doctors, surgeons, nurses and administrative staff at Waikato Hospital were taking notes using pen and paper on Wednesday morning, following a cyber attack. The ransomware attack on Tuesday crashed Waikato District Health Board’s IT systems including computers and phones, affecting Waikato's four hospitals. It is believed to have resulted after an employee clicked through to a malware link. “Thankfully no lives have been lost, but the anxiety, disruption and lost income costs will be substantial,” said Wayne Neich from cyber security firm Bitglass ANZ.  He cautioned: “We must wait for root cause analysis to understand exactly what happened, but it’s a timely reminder for all involved in healthcare and other critical industries.”  Bitglass offers the following advice on what all organisations, including those in healthcare, can do to protect themselves: Password123 It takes on one employee using an insecure password across multiple accounts, to make is easier for cyber criminals to steal corporate information wherever that password is used.  In light of this, organizations should mandate unique passwords of sufficient length and complexity for ever user’s SaaS accounts. Additionally, requiring employees to change their passwords regularly - perhaps every other month - can provide an additional layer of security. Authenticate or else Whether it occurs through employee carelessness, a breach from a hacker, or a combination of the two, credential compromise is a threat to organizations. As detecting rogue accounts can be a challenge, multi-factor authentication should be employed to verify that accounts are being used by their true owners.  Before allowing a user to access sensitive data, organizations should require a second level of verification through an email, a text message, or a hardware token (a unique physical item carried by the user). Data on the go The rise of BYOD (bring your own device) has given individuals access to corporate data from their unmanaged mobile devices and, consequently, exposed organizations to new threats. In light of this, enterprises must secure BYOD, but do so in a way that is simple to deploy and doesn’t harm device functionality or user privacy.  Typically this is done through data-centric, agentless security. With these tools, organizations can secure data on unmanaged mobile devices in a timely, secure, non-invasive fashion. Put the pro in proactive Often, as more and more data moves to the cloud, organizations fail to monitor and protect it accordingly. They adopt after-the-fact security that can allow months of data exfiltration before detecting any threats or enabling remediation.  However, in a world with regulatory compliance penalties, well-informed consumers, and hackers who can steal massive amounts of data in an instant, a reactive posture is not adequate.  Organizations should adopt proactive cloud security platforms that enable real-time detection of malicious activity. Failure to utilize tools that respond to threats the moment they occur can prove disastrous for an organization’s security, finances, reputation, and livelihood. More malware - more problems With all of the cloud applications and devices storing, uploading, and downloading data, malware has a number of attack surfaces it can use to infect organizations. If a single device uploads a contaminated file to the cloud, it can spread to connected cloud apps and other users who download said file.  While protecting endpoints from malware is necessary, it is no longer sufficient. Today, organizations must deploy anti-malware capabilities that can defend from threats at upload, threats at download, and threats already resting in cloud applications. Defences must lie in wait wherever data moves. To further protect an organisation from malware threats launched from an email phishing attack, ensure that the organization’s secure web gateway (SWG) is configured to block Zero Day phishing attacks by enabling Block ‘Uncategorised’ About Bitglass Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction. Its Polyscale Architecture boasts an industry-leading uptime of 99.99 percent and delivers unrivaled performance and real-time scalability to any location in the world. Based in Silicon Valley with offices worldwide, the company is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. Contact Wayne Neich, Bitglass ANZ wneich@bitglass.com +61 408 920 304   Gigamon partners with New Relic to provide unified observability and solve the cloud visibility gap 2021-05-18T23:19:00Z gigamon-partners-with-new-relic-to-provide-unified-observability-and-solve-the-cloud-visibility-gap Gigamon partners with New Relic to provide unified observability and solve the cloud visibility gap SYDNEY– May 19, 2021 – Gigamon, the leader in cloud visibility and analytics, today announced the integration of New Relic, the leader in observability, with Gigamon Hawk, the industry’s first elastic visibility and analytics fabric for all data-in-motion across the hybrid cloud. By providing a clear, complete and consistent view of what’s happening across hybrid infrastructure, Hawk is empowering IT professionals to close the cloud visibility gap.Infrastructure complexity has grown exponentially with the acceleration of digital transformation, resulting in a foundational gap in visibility across the underlying hybrid cloud environment. With unified visibility across the hybrid and multi-cloud landscape, leveraging a single, simple interface and automated orchestration, Gigamon Hawk closes this gap, radically simplifying cloud adoption. “Integrating New Relic One, the cloud-based observability platform, with Gigamon Hawk empowers customers to harness the power of observability to simplify hybrid cloud deployment and maintain their security posture,” said Raj Ramanujam, VP Alliances and Channels at New Relic. “This unique combination is essential to reducing risks faced while undergoing digital transformation.”Gigamon Hawk is the industry’s first elastic visibility and analytics fabric, which closes the cloud visibility gap by enabling cloud tools to see the network and network tools to see the cloud. With visibility across the entire hybrid cloud network, organisations can improve customer experience, eliminate security blind spots, and reduce cost and complexity. “The cloud visibility gap is a threat to business continuity for every organisation today, and the partnership between Gigamon and New Relic is crucial for organisations to reap the benefits of cloud adoption, without the associated risks,” said Michael Dickman, Chief Product Officer at Gigamon. “Hawk and its unique capabilities can offer such assurance by successfully eliminating security and compliance gaps and providing IT teams full visibility of their cloud environments.”To learn more about Gigamon Technology Partners and their role in such critical Gigamon cloud solutions visit: https://www.gigamon.com/partners/technology-partners.html. About New RelicThe world’s best engineering teams rely on New Relic to visualize, analyze, and troubleshoot their software. New Relic One is the most powerful cloud-based observability platform built to help organisations create more perfect software. Learn why developers trust New Relic for improved uptime and performance, greater scale and efficiency, and accelerated time to market at newrelic.com.About GigamonGigamon helps the world’s leading organisations run fast, stay secure and innovate. We provide the industry’s first elastic visibility and analytics fabric, which closes the cloud visibility gap by enabling cloud tools to see the network and network tools to see the cloud. With visibility across their entire hybrid cloud network, organisations can improve customer experience, eliminate security blind spots, and reduce cost and complexity. Gigamon has been awarded over 90 technology patents and enjoys world-class customer satisfaction with more than 4,000 organisations, including over 80 percent of the Fortune 100 and hundreds of government and educational organisations worldwide. Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visit www.gigamon.com and follow us on Twitter. and LinkedIn.Media Inquiries:GigamonEmail: public.relations@gigamon.com