Market-leading visibility and analytics on all data-in-motion across your hybrid cloud network.
Simplify, secure and scale your hybrid cloud infrastructure to accelerate digital innovation.
Gigamon reseller and integration partners design, implement and optimize best-of-breed and validated joint solutions.
Our global support team is committed to creating experiences of unmatched quality, scalability and efficiency.
Our global customers are empowered to transform their businesses and innovate with the power of complete network visibility and analytics.
Your one-stop hub to explore content resources to stay current on the latest in network visibility and analytics.
We are the first company to deliver a unified visibility and analytics architecture across your hybrid infrastructure to simplify, secure and scale IT operations.
Network Packet Brokers give your tools advanced threat insights.
What is a network packet broker (NPB)? A network packet broker is a technology that implements a range of monitoring tools to access and analyze traffic (also known as “network packets”) across a network. Simply put, NPBs function as ‘brokers’ (or managers) of network traffic. The packet broker collects traffic from multiple network links, filtering and distributing each individual packet to the correct network monitoring tool. By doing so, network packet brokers ensure improved effectiveness from network monitoring and security tools, by delivering improved data from across the network.
While a traditional packet broker can help ensure improved tool effectiveness, a next-generation network packet broker takes things further, ensuring that the right traffic is sent to the right inline and out-of-band prevention tools. Whether a network setup is on-premises, virtual or in the cloud, an intelligent network packet broker provides the perfect visibility foundation. Next-generation network packet brokers support:
“Gigamon is a compelling option for any security-focused network monitoring project due to its ability to inspect network packets, including the encrypted traffic, along with its ability to promote more efficient use of existing security tools via its inline bypass architecture.”
— Rik Turner, Principal Analyst, Infrastructure Solutions Ovum