Application Metadata Intelligence provides deep visibility and context into applications — including usage, content and behavior — so you can get ahead of emerging security threats or customer-experience issues.
Gigamon Metadata Empowered Partners
Gigamon Application Metadata Intelligence offers out-of-the box integration with a growing list of security and network analytics solutions.
Click on the videos below to see how some of our Gigamon Empowered technology partners are taking in rich application metadata to help reduce investigative cycle times when troubleshooting critical performance and security issues.
“Gigamon provides up to 100 unique fields that WitFoo Precinct is able to parse. Application Metadata Intelligence provides a clear audit trail of network connections, web browsing and DNS patterns.”
- WitFoo
“With Gigamon Application Metadata and tools like AI Hunter, you finally have the power to get the right data into security analyst’s hands so they can make intelligent decisions without having to choose between limited IPFIX/NetFlow or full packet capture.”
- Active Countermeasures
“Application Metadata provides rich application data that helps enable IT to ‘triangulate’ performance bottlenecks and potential security threats.”
See how we deliver best of breed monitoring and security solutions with our ecosystem partners.
GigaSMART® offers a number of other essential traffic intelligence services required for active visibility into infrastructure blind spots, including:
NetFlow Generation
Delivering basic Layer 2–4 network traffic data to analysis tools.
Advanced Flow Slicing
Eliminates these issues by slicing payloads and packets from long data flow.
Source Port Labeling
Provides context to packets and allows tools to properly assess network behavior and threats based on where they are.
Adaptive Packet Filtering
Identifies patterns across any part of the network packet, including the packet payload.
SSL/TLS Decryption
Creates a secure channel between the server and the end user's computer or other devices as they exchange information.
Packet Slicing
Truncates packets while preserving the portion of the packet (the protocol headers) required for network analysis.
Advanced Load Balancing
Divides and distributes traffic among multiple tools, so network and security visibility can scale.
De-duplication
Targets, identifies and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.
Masking
Provides customizable data protection by overwriting specific packet fields with a set pattern.
Tunneling
Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or hosted in a public cloud.
Application Visualization
Provides a complete view of the applications running on your network automatically.
Application Filtering Intelligence
Extends Layer 7 visibility to thousands of common and proprietary applications.
Application Metadata Intelligence
Empowers your security information and event management and network performance monitoring tools.
GTP Correlation
Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.
5G Correlation
Intelligently forward subscriber sessions to specific tools by filtering on subscriber, user device, RAN or network slice IDs.
FlowVUE Flow Sampling
Provides subscriber IP-based flow sampling.
SIP/RTP Correlation
Enables enterprises and service providers to monitor VoIP traffic.
We're here to help you find the right application visibility solution for your business.
By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.