
Gigamon announced a joint solution that enables organizations to reduce business risk and increase security through real-time and continuous protection for managed, unmanaged, and IoT devices.
While agent-based security approaches may effectively protect many critical assets on traditional networks, these approaches do little to secure unmanaged, IoT, OT, and medical devices, which are inherently more vulnerable due to a lack of robust security and patching difficulties. As a result, agentless IoT devices have become an attractive attack target for cybercriminals, posing a significant and growing security risk as adoption increases.
That’s why today, the Gigamon Visibility and Analytics Fabric and the Armis Agentless Device Security Platform work together to provide full visibility into all traffic across hybrid networks. With Gigamon, organizations are empowered to gain pervasive hybrid cloud visibility, equipping Armis with access to relevant traffic to assure stronger security, compliance, and business continuity.
"As cloud complexity abounds and cyber threats continue to skyrocket across the enterprise, the need for simple, comprehensive device visibility and security has never been more essential to deliver on everyday business objectives,” said Peter Doggart, Chief Strategy Officer at Armis. "With this new joint solution, agentless security meets unmatched cloud visibility, so organizations are better prepared to manage asset inventory, regulate compliance efforts, enhance threat detection, and more.”
“Elastic visibility and analytics for the hybrid cloud are at the forefront of what we do at Gigamon. Now, coupled with Armis’ industry-leading agentless security platform, organizations will be even better prepared to mitigate malicious cyber activity all the way from unmanaged IoT devices to the public cloud,” said Michael Dickman, Chief Product Officer at Gigamon.
With this new joint solution, Armis and Gigamon customers will be better equipped to:
- Gain visibility of unmanaged, IoT, OT, and medical devices
- Reduce business and compliance risk with continuous, real-time device vulnerability and behavioral risk assessments
- Align NetOps and SecOps teams using comprehensive device and network data
- Automatically detect and respond to suspicious or malicious device behavior
The Latest
UK IT leaders are reaching a critical inflection point in how they manage observability, according to research from LogicMonitor. As infrastructure complexity grows and AI adoption accelerates, fragmented monitoring environments are driving organizations to rethink their operational strategies and consolidate tools ...
For years, many infrastructure teams treated the edge as a deployment variation. It was seen as the same cloud model, only stretched outward: more devices, more gateways, more locations and a little more latency. That assumption is proving costly. The edge is not just another place to run workloads. It is a fundamentally different operating condition ...
AI can't fix broken data. CIOs who modernize revenue data governance unlock predictable growth-those who don't risk millions in failed AI investments. For decades, CIOs kept the lights on. Revenue was someone else's problem, owned by sales, led by the CRO, measured by finance. Those days are behind us ...
Over the past few years, organizations have made enormous strides in enabling remote and hybrid work. But the foundational technologies powering today's digital workplace were never designed for the volume, velocity, and complexity that is coming next. By 2026 and beyond, three forces — 5G, the metaverse, and edge AI — will fundamentally reshape how people connect, collaborate, and access enterprise resources ... The businesses that begin preparing now will gain a competitive head start. Those that wait will find themselves trying to secure environments that have already outgrown their architecture ...
Ask where enterprise AI is making its most decisive impact, and the answer might surprise you: not marketing, not finance, not customer experience. It's IT. Across three years of industry research conducted by Digitate, one constant holds true is that IT is both the testing ground and the proving ground for enterprise AI. Last year, that position only strengthened ...
A payment gateway fails at 2 AM. Thousands of transactions hang in limbo. Post-mortems reveal failures cascading across dozens of services, each technically sound in isolation. The diagnosis takes hours. The fix requires coordinated deployments across teams ...
Every enterprise technology conversation right now circles back to AI agents. And for once, the excitement isn't running too far ahead of reality. According to a Zapier survey of over 500 enterprise leaders, 72% of enterprises are already using or testing AI agents, and 84% plan to increase their investment over the next 12 months. Those numbers are big. But they also raise a question that doesn't get asked enough: what exactly are companies doing with these agents, and are they actually getting value from them? ...
Many organizations still rely on reactive availability models, taking action only after an outage occurs. However, as applications become more complex, this approach often leads to delayed detection, prolonged disruption, and incomplete recovery. Monitoring is evolving from a basic operational function into a foundational capability for sustaining availability in modern environments ...
In MEAN TIME TO INSIGHT Episode 22, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses DNS Security ...
The financial stakes of extended service disruption has made operational resilience a top priority, according to 2026 State of AI-First Operations Report, a report from PagerDuty. According to survey findings, 95% of respondents believe their leadership understands the competitive advantage that can be gained from reducing incidents and speeding recovery ...