Security Experts:

Johnnie Konstantas's picture

Johnnie Konstantas

Johnnie Konstantas heads Gigamon’s security solutions marketing and business development. With 20+ years in telecommunications, as well as data and cybersecurity, she has done a little bit of everything spanning engineering, product management and marketing for large firms and fledglings. Most recently, she was the VP of Marketing at Dato, a company pioneering large-scale machine learning. She was also VP Marketing at Altor Networks (acquired by Juniper), an early leader in virtualization security and at Varonis Systems. Past roles have included product management and marketing for Check Point, Neoteris, NetScreen and RedSeal Systems. Johnnie started her career at Motorola, designing and implementing large-scale cellular infrastructure. She holds a B.S. in Electrical Engineering from the University of Maryland.

Recent articles by Johnnie Konstantas

  • When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
  • While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
  • To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.
  • As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
  • Enterprises should establish security policies with regard to traffic inspection, and implement the right mix of SSL decryption and traffic inspection systems that don’t introduce latency or business disruption.
  • For the NSA, one of the hardest things to hack against is a network with out-of-band TAPs—which enable the continuous monitoring of network activity by sending copies of packets to security inspection and analytics devices.
  • DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
  • Visibility into all inter-SDN traffic gives security and performance management technologies the best statistical chance of surfacing embedded malware and anomalous patterns.
  • While complex threats are an easy place to lay blame, lack of visibility is the real culprit. Turning your eyes inward to detect where compromises occurred sooner rather than later has the potential to limit your risks substantially.
  • On the whole, with only about 1000 machines infected today out of millions worldwide, the probability to exposure remains low, but just to be sure this old Flame doesn’t come knocking, there are precautions you can take as part of your security update regimes.
  • How can you defend against a new generation of threats and attackers that are leveraging automation and outpacing alerting mechanisms and manual-access controls?
  • IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
  • Second in a series on evaluating new firewalls. This week Johnnie explains how the highest security for your environment is to have technology that can sustain its protections through network growth and scale.
  • If you are ready to upgrade your firewalls you will have tons of choices but you’ll also need to conduct considerable research and gain an understanding of what those choices mean in terms of benefits and trade offs for your network.
  • 4G/LTE networks are based on entirely new infrastructure. Naturally, 4G/LTE all IP infrastructure will extend the attack surface. While technologies like firewalls, intrusion detection sensors, encryption tools and subscriber protection suites can ameliorate some of the risks, the question now is: What’s available to you from your provider and for your chosen device?
  • Is a purpose-built virtualization security solution the cure to VM stall? It certainly helps allay the security and ROI concerns that are part of the reticence to deploy.
  • According to a recent survey, participants appear to be searching for solutions that bridge the gap between physical and virtual security. In fact, 80% said they consider integration with a physical firewall to be a critical feature for virtualized security.
  • We know by now that virtualized data centers and cloud deployments require more than the traditional physical security measures. To protect your data center, you must run antivirus scans on your virtual machines (VMs). It’s the right thing to do. It’s more so a question of how to do this right thing the right way.
  • Enterprises use smartphones and mobile devices in some manner to improve mobility and productivity, as do government agencies and even small-to-medium sized businesses. These organizations must protect their network and their users – and their devices, whether corporate owned or a user’s personal mobile device – from loss, theft and exploit.
  • The private sector usually leads the way in technological advancement, but might we be witnessing a shift, where the government could begin to outpace the private sector? Has Vivek Kundra’s effort to reduce waste, improve efficiency, and save $18.8 billion through data center consolidation landed the U.S. Government on the cutting edge of technology?
  • New guidance on virtualization from the PCI Council is here. So what if you’re a business readying to deploy a private cloud, where you’ll be storing cardholder data? Or what if you’re thinking of a move to a public cloud? What can you take from the new guidance?
  • When it comes to any security—though especially cloud security—there are several areas in which protections have to be applied. While we may not ever know exactly what happened at Sony, we can conclude that the right way to reduce the chances of such a breach happening again is to install as many layers of access protection and traffic visibility as possible.
  • Cybercrime is no joke, but rather, one of this century’s most serious threats. While every organization faces this threat, some are at greater risk than others.
  • The biggest trend in the healthcare industry in recent years has been the epic government-mandated move to electronic medical records (EMRs). This effort promises to bring long-term cost savings, improved efficiencies and productivity, and, ultimately, enhanced patient care.
  • University IT departments aren’t shy about investigating and participating in the latest and greatest technology trends—including virtualization and cloud computing.