Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

11 results found

Partner POV | What Is Lateral Movement in Cybersecurity?

Lateral movement in cybersecurity allows attackers to stealthily navigate networks post-breach, escalating privileges and accessing sensitive data. This technique transforms minor breaches into major threats. Understanding and preventing lateral movement through deep network visibility, Zero Trust, and least privilege access is crucial for safeguarding organizational assets.
Partner Contribution
•Apr 21, 2026

Partner POV | Hybrid Cloud Security: The CISO Perspective

CISOs are grappling with the effectiveness of their security efforts as a gap between perceived and actual security postures widens. AI-powered attacks are a growing concern, affecting 41% of organizations. Only half of CISOs feel prepared to identify threats in hybrid cloud environments, and real-time visibility, especially in encrypted and lateral traffic, is crucial to business success.
Partner Contribution
•Jul 20, 2024

Partner POV | Agentic AI and Cybersecurity: Threats and Opportunities

Agentic AI, a double-edged sword in cybersecurity, autonomously adapts and learns, creating both formidable defenses and sophisticated threats. As it revolutionizes threat detection and response, it also poses risks of autonomous malware and AI-driven attacks. Balancing innovation with control is crucial to harness its potential safely.
Partner Contribution
•Nov 17, 2025

Partner POV | Advancing Deep Observability: Gigamon AI Vision Comes to Life

Gigamon unveils its AI-driven strategy, integrating GenAI into its Deep Observability Pipeline with AI Traffic Intelligence and GigaVUE-FM Copilot. These innovations enhance security and management of hybrid cloud infrastructures, addressing visibility gaps and evolving threats. As AI reshapes operations, Gigamon empowers teams with clarity, context, and control for operational excellence.
Partner Contribution
•Jun 27, 2025

Partner POV | Network-Derived Telemetry Deemed 'Essential.' Who Knew?

Gartner's new reference architecture elevates network-level telemetry to a strategic necessity, emphasizing its role in enhancing service-level observability and security. By integrating network-derived insights, organizations can make faster decisions, reduce risks, and ensure resilient digital services, transforming telemetry from an afterthought to a foundational architectural element.
Partner Contribution
•Apr 20, 2026

Partner POV | The AI Security Illusion: When Confidence Outpaces Proof

AI is reshaping cybersecurity, creating a gap between perceived and actual security. Despite increased investments, breach rates rise, with AI involved in 83% of incidents. The 2026 Hybrid Cloud Security Survey reveals the need for deep observability to bridge this gap, urging organizations to move from assumptions to evidence.
Partner Contribution
•May 12, 2026

Partner POV | Post-Quantum Cryptography: What It Is and How It Works

Quantum computers threaten current encryption, necessitating post-quantum cryptography (PQC) to secure data against future quantum attacks. Organizations must transition to PQC, leveraging algorithms like Kyber and Dilithium, to protect sensitive information. Proactive adoption ensures long-term security, safeguarding data from the impending quantum era.
Partner Contribution
•Jan 29, 2026

Partner POV | Power of Three With Gigamon, ExtraHop, and WWT

The Gigamon-ExtraHop-WWT alliance provides robust solutions for network visibility, security, and compliance, particularly in complex and regulated environments, while supporting customers through infrastructure transitions.
Partner Contribution
•Jan 9, 2025

Partner POV | The Visibility Gap Undermining OT and IOT Security

Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026

Partner POV | The CISO's Strategy for Staying Ahead in the Age of AI

Drawing insights from 211 CISOs surveyed globally, Gigamon highlights the growing complexity of hybrid cloud environments, the rising concerns around public cloud and internal AI deployments, and the urgent need for deep observability.
Partner Contribution
•May 22, 2025

Partner POV | PCI DSS Compliance Checklist and Guide

Explore the essential steps and requirements for achieving PCI DSS compliance, crucial for safeguarding sensitive credit card data.
Partner Contribution
•Apr 1, 2025

Gigamon

Gigamon® delivers an AI-powered Deep Observability Pipeline that provides network-derived telemetry to cloud, security, and observability tools. With AI-driven insights across packets, flows, and application metadata, organizations gain complete visibility into all data in motion to detect threats concealed in encrypted and lateral traffic, resolve network and application performance issues, and validate compliance while reducing operational cost and complexity. Gigamon is trusted by 4,000+ organizations, including 83 of the Fortune 100 and hundreds of public sector agencies and educational institutions.

36 Followers

At a glance

18Total
11Articles
5Videos
1Blog
1Event
What's related
  • Security
  • AI Security
  • Cloud
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Automation
  • Data Security
  • Observability & AIOps
  • Security Operations
  • Awards & Recognitions
  • WWT Presents
  • AI & Data
  • GenAI
  • Network Security
  • Zero Trust
  • Blog
  • Cisco Live
  • Cloud Strategy and Adoption
  • Cyber Resilience
  • Meet the Chief

What's related

WWT
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies