by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 30, 2014
A ccording to the General government had a record number of data breaches in 2012 (most recent data available). The growth in cybersecurity incidents throughout government is certainly not due to a lack of effort, tools or desire; federal agencies and departments do their best to fully comply with all cybersecurity mandates and use a host of effective monitoring, analytics and performance management tools. So if it's not the fault of the tools, the networks themselves or the people who run them, what's the problem? It's network visibility. Even the best tools are only as effective as the data they can see. In many cases, networks also may have just a handful of connection points to get the data to the tools. Not only does that limit the visibility to where the data was accessed, but it puts network managers in the unenviable spot of having to choose which tool will receive data at which time. The deluge of Big Data---much of it irrelevant to the mission of the tool---can limit visibility as well and can waste tool compute resources. At the same time, federal networks are growing so big, so fast, with many sure to reach 10Gb, 40Gb or even 100Gb in the next few years. Because most network tools are processor-bound, they can't keep up with these higher speeds. GIGAMON I IBILI FAB IC I A GAME CHANGE A Visibility Fabric is an intermediate layer of hardware and software that sits between the network infrastructure of switches and routers and an agency's network security monitoring tools. By running everything through a Visibility Fabric, each tool becomes much more Flow MappingTM technology to identify a centralized fabric management console. Filtering, replication, and deduplication ensure that only the data to that tool. It works just as seamlessly with virtualized networks and cloud environments as it does with physical network environments. MONI O ING CHALLENGE Many agency networks face the challenge of too few mirror or SPAN ports through which to get data from mirror/SPAN ports fast enough. While monitoring tools are involved, most agencies are using many tools to keep today's networks running. The Gigamon Visibility Fabric solves this problem by enabling agency networks to connect SPAN ports to a network port via a then use the technology to replicate The Department of Health and Human Services' Computer Security Incident Response Center (CSIRC) is just one of Gigamon's Visibility Fabric. The CSIRC needed a way to connect the many network monitoring and analysis tools it was using to protect the network. At the same time, the solution had to be 10Gb networks and prepare for future network growth. MEE ING C BE ECU I AND CON INUOU MONI O ING MANDA E To address the issue, the CSIRC implemented a Gigamon Visibility Fabric solution built on modular GigaVUE fabric nodes with patented Flow MappingTM. The resulting and exiting the inline security tools can to out-of-band monitoring tools. As a result, network administrators now have geographically dispersed locations. In addition to offering robust functionality, Gigamon is in process with FIPS 140-2. HHS is just one of dozens of agencies who are relying implementation of security tools to meet the requirements of Continuous Diagnostics and Mitigation (CDM). The Defense Information Systems Agency (DISA) is implementing a similar cyber initiative, selecting Gigamon to be a foundational component of its Joint Regional Security Stack (JRSS). Gigamon's Visibility Fabric is a strategic choice by DISA, as JRSS will be a critical element in the Department of Defense's Joint Information Environment (JIE) architecture. With pervasive network visibility, agencies will be will be able to not only meet cybersecurity mandates, but avoid downtime, maximize investments, and ensure that their networks are ready for whatever future growth and challenges will bring. • A new approach to intelligent network monitoring Game GAME CHANGING ECHNOLOG O MEE AGENC MI ION SPONSORED CONTENT THE INTELLIGENT NETWORK For more information, please visit www.gigamon.com/gov or contact email@example.com
March 15, 2014
April 15, 2014