Today, Gigamon announced that its Gigamon Deep Observability Pipeline fundamentally enables the implementation of the newly released United States Department of Defense (DOD) Zero Trust Strategy and Capability Execution Roadmap. The DOD’s approach leverages a 7-pillar model, which is implemented through 152 activities, 91 of which must be implemented by 2027. The visibility into network traffic that Gigamon delivers enables or addresses nearly half of the 152 activities across 6 of the 7 pillars, and is an essential component in any successful zero trust implementation.
The DOD model was developed leveraging lessons learned from the zero trust pilot conducted at the Maryland Innovation Security Institute (MISI) at DreamPort, the U.S. Cyber Command’s premier cybersecurity innovation facility (“DreamPort Pilot”).
The DreamPort Pilot originally lacked visibility into network traffic within the environment. To resolve this challenge, the DreamPort team added the Gigamon Deep Observability Pipeline to the architecture to collect network packets for all traffic traversing the environment, including traffic moving laterally within the environment. This kind of traffic, often referred to as “East-West,” is a common blind spot because organizations have historically focused only on analyzing traffic at the network perimeter. The ability to see all traffic enabled the DreamPort Pilot to eliminate blind spots, which an adversary could exploit, to deliver a successful zero trust implementation. Based on this experience, the DOD Strategy and Roadmap require organizations to have visibility into all network traffic in FY20231.
“The U.S. Department of Defense is significantly moving the needle forward in zero trust efforts worldwide,” says Shane Buckley, president and CEO of Gigamon. “Gigamon is proud that our deep observability pipeline is a foundational capability for the implementation of zero trust architectures, as demonstrated at the DreamPort facility.”
As demonstrated in the DreamPort Pilot, Gigamon and it’s public and commercial partners can help organizations successfully implement Zero Trust Architectures by leveraging visibility into network traffic both at the perimeter and within an environment.
Gigamon Deep Observability Pipeline allows organizations to:
- Access – Obtain complete visibility, helping eliminate network blind spots across hybrid multi-cloud infrastructure, which is foundational for successful Zero Trust Architectures.
- Broker – Forward network traffic packets or metadata to virtually any security, observability, or monitoring tool running on essentially any platform.
- Transform – Application Filtering Intelligence provides packet deduplication, advanced flow slicing, load balancing, and NetFlow generation. Secure SSL and TLS decryption enables several activities defined in the DOD Zero Trust Execution Roadmap.
- Analyze – Application Metadata Intelligence, with more than 5,000 traffic-protocol and application-related metadata attributes, can be used to feed Zero Trust policy engines2, as well as security information and event management (SIEM) and observability tools. Specifically, metadata generated from network traffic across a hybrid multi-cloud infrastructure can be utilized to satisfy the implementation requirements for logging described in the DOD Zero Trust Execution Roadmap (section 7.1).
- Manage – Unified visibility management and orchestration via GigaVUE-FM fabric manager or native DevOps approach.
To learn more about Gigamon and its support of the DOD’s Zero Trust strategy, visit the website and check out this case study.
About Gigamon
Gigamon® offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination helps enable IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
© 2022 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the property of their respective owners.
__________________________
1 See Strategy at page 16, Figure 5 (“Capability 7.1 under Visibility and Analytics Pillar: Log All Traffic (Network, Data, Apps, Users”)” and Appendices A, B, C, and D at pages 22, 23, 24, and 25 (“Road Map Capabilities fully implemented in FY2023: 7.1 Log All Traffic (Network, Data, Apps, Users”)) and Roadmap at pages 32 and 45.
2 As recommended by the NIST SP 800-207, section 3.4.1, subsection 3 requirements for data in motion.
View source version on businesswire.com: https://www.businesswire.com/news/home/20221213005075/en/