About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Gigamon Deep Observability Pipeline Fundamentally Enables the DOD Zero Trust Strategy and Capability Execution Roadmap

Gigamon provides essential visibility into all network traffic, a key zero trust requirement in the new DOD Strategy and Roadmap

Today, Gigamon announced that its Gigamon Deep Observability Pipeline fundamentally enables the implementation of the newly released United States Department of Defense (DOD) Zero Trust Strategy and Capability Execution Roadmap. The DOD’s approach leverages a 7-pillar model, which is implemented through 152 activities, 91 of which must be implemented by 2027. The visibility into network traffic that Gigamon delivers enables or addresses nearly half of the 152 activities across 6 of the 7 pillars, and is an essential component in any successful zero trust implementation.

The DOD model was developed leveraging lessons learned from the zero trust pilot conducted at the Maryland Innovation Security Institute (MISI) at DreamPort, the U.S. Cyber Command’s premier cybersecurity innovation facility (“DreamPort Pilot”).

The DreamPort Pilot originally lacked visibility into network traffic within the environment. To resolve this challenge, the DreamPort team added the Gigamon Deep Observability Pipeline to the architecture to collect network packets for all traffic traversing the environment, including traffic moving laterally within the environment. This kind of traffic, often referred to as “East-West,” is a common blind spot because organizations have historically focused only on analyzing traffic at the network perimeter. The ability to see all traffic enabled the DreamPort Pilot to eliminate blind spots, which an adversary could exploit, to deliver a successful zero trust implementation. Based on this experience, the DOD Strategy and Roadmap require organizations to have visibility into all network traffic in FY20231.

“The U.S. Department of Defense is significantly moving the needle forward in zero trust efforts worldwide,” says Shane Buckley, president and CEO of Gigamon. “Gigamon is proud that our deep observability pipeline is a foundational capability for the implementation of zero trust architectures, as demonstrated at the DreamPort facility.”

As demonstrated in the DreamPort Pilot, Gigamon and it’s public and commercial partners can help organizations successfully implement Zero Trust Architectures by leveraging visibility into network traffic both at the perimeter and within an environment.

Gigamon Deep Observability Pipeline allows organizations to:

  • Access – Obtain complete visibility, helping eliminate network blind spots across hybrid multi-cloud infrastructure, which is foundational for successful Zero Trust Architectures.
  • Broker Forward network traffic packets or metadata to virtually any security, observability, or monitoring tool running on essentially any platform.
  • Transform Application Filtering Intelligence provides packet deduplication, advanced flow slicing, load balancing, and NetFlow generation. Secure SSL and TLS decryption enables several activities defined in the DOD Zero Trust Execution Roadmap.
  • Analyze Application Metadata Intelligence, with more than 5,000 traffic-protocol and application-related metadata attributes, can be used to feed Zero Trust policy engines2, as well as security information and event management (SIEM) and observability tools. Specifically, metadata generated from network traffic across a hybrid multi-cloud infrastructure can be utilized to satisfy the implementation requirements for logging described in the DOD Zero Trust Execution Roadmap (section 7.1).
  • Manage Unified visibility management and orchestration via GigaVUE-FM fabric manager or native DevOps approach.

To learn more about Gigamon and its support of the DOD’s Zero Trust strategy, visit the website and check out this case study.

About Gigamon

Gigamon® offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination helps enable IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.

© 2022 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the property of their respective owners.

__________________________

1 See Strategy at page 16, Figure 5 (“Capability 7.1 under Visibility and Analytics Pillar: Log All Traffic (Network, Data, Apps, Users”)” and Appendices A, B, C, and D at pages 22, 23, 24, and 25 (“Road Map Capabilities fully implemented in FY2023: 7.1 Log All Traffic (Network, Data, Apps, Users”)) and Roadmap at pages 32 and 45.

2 As recommended by the NIST SP 800-207, section 3.4.1, subsection 3 requirements for data in motion.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.