Sep 30, 2021

Armis & Gigamon Provide Visibility and Security for Every Asset in Any Environment

Unified_Asset_Inventory_Hero-735×460

The complexity of managing and securing unmanaged and cloud assets isn’t getting any easier. All the while, cyber threats continue to grow in number and sophistication across every industry, making simple, comprehensive device visibility and security even more essential. 

Leading cybersecurity analysts agree. According to Gartner®, “Application, cloud, data, endpoint, network and infrastructure security technologies must work together to keep ever-changing organizations secure. A dynamic and adaptable architecture is necessary to support end-users located anywhere in the world in connecting from any device, accessing resources on-premises and in the cloud.” And, a new forecast from IDC estimates that there will be 41.6 billion connected IoT devices, or “things,” generating 79.4 zettabytes (ZB) of data by 2025, resulting in a widening threat vector that bad actors are keen to exploit as adoption surges.

Agent-based security products may protect many critical assets on traditional networks, but they can’t secure unmanaged, IoT, OT, and medical devices. These devices are inherently more vulnerable due to a lack of robust security and patching capabilities, making them an attractive attack target for cybercriminals and posing a significant and growing security risk as adoption increases. 

That’s why today, we’re announcing a new joint solution with Gigamon that enables organizations to reduce business risk and increase security through real-time and continuous protection for every asset in virtually any environment. With this new joint solution, agentless security meets unmatched cloud visibility, so organizations are better prepared to manage asset inventory, regulate compliance efforts, enhance threat detection, and more.

Armis® and Gigamon® now work together to provide full visibility into all traffic across hybrid networks. With Gigamon, organizations gain pervasive hybrid cloud visibility, equipping Armis with access to relevant traffic to assure stronger security, compliance, and business continuity.

Armis provides unified asset visibility and security in a single platform purpose-built for this new threat landscape of connected devices. Our platform gives you the most comprehensive inventory of assets you’ve ever seen. It includes detailed device profiles and risk assessments so you can better understand and reduce your attack surface. It also improves threat detection and response by continuously analyzing the behavior of every device, dynamically updating risk scores in real-time, and triggering policy-based actions that can mitigate risks and attacks proactively. 

The Gigamon Visibility and Analytics Fabric™ provides full network traffic visibility and filters, deduplicates, decrypts, and delivers relevant traffic to the Armis platform. Gigamon provides full visibility into all the traffic on hybrid networks and provides the Armis platform with access to the relevant traffic to ensure stronger security, compliance, and business continuity. Together, this joint solution reduces business risk and increases security by providing real-time and continuous protection for cloud assets, and managed, unmanaged, and IoT devices.

This new joint solution will better equip Armis and Gigamon customers to:

  • Get started fast with a quick and easy deployment for immediate time-to-value
  • Gain visibility of unmanaged, IoT, OT, medical devices, and more
  • Reduce business and compliance risk with continuous, real-time device vulnerability and behavioral risk assessments
  • Align NetOps and SecOps teams using comprehensive device and network data
  • Automatically detect and respond to suspicious or malicious device behavior

Our joint solution solves for many business use cases, including: 

Asset Inventory

  • What devices are on my network? Are they authorized and secure? 
  • How do I track and locate devices with unsupported operating systems or manufacturing/FDA recalls? 

Compliance

  • How do I ensure devices aren’t going to be compromised by more vulnerable network devices? 
  • Are there any devices in a guest VLAN? 
  • Internet Remote Sites Public Cloud 
  • Leaf Switches 
  • Virtualized Server Farm 

Device Utilization

  • What workload are my devices carrying, and are they fully or properly utilized? 
  • Analysis of utilization data for budgetary and planning purposes 

Threat Detection  

  • How do I find devices with vulnerabilities or that may have already been compromised? 
  • How do I identify devices exhibiting suspicious or malicious behaving? 

Zero-Trust Micro-Segmentation

  • How do I proactively classify and securely segment devices on my network based on their roles or what they should be allowed to do? 

The joint Armis/Gigamon solution is available now. Learn more about it at www.armis.com/gigamon, or schedule a live demo of the Armis platform at www.armis.com/demo

Get Updates!

Sign up to receive the latest news

path-12-path-12-path-12-mask