479 Resources

Analyst Report

Updated TAG Cyber Security Annual is a list of cyber security vendors. This is Volume 3 of 3

Analyst Report

IDC Report: The Business Value of Subscriber Visibility for Mobile Network Operators

Analyst Report

EMA Research highlights the synergy between Gigamon and ICEBRG and the joint value proposition for customers and channel and technology partners

Analyst Report

451 Research Report: Gigamon moves up the network security stack with ICEBRG acquisition

Analyst Report

Gigamon offers a next-generation network packet broker for security

Analyst Report

SSL/TLS Decryption: An Enterprise Network Service

Analyst Report

451 Group Report-Network Visibility and Monitoring

Analyst Report

IHS Report

Analyst Report

(German) IHSM Network Monitoring Switches for Gigamon

Analyst Report

(French) IHSM Network Monitoring Switches for Gigamon 2017

Analyst Report

(French) ESG Research Insights State of Network Security

Analyst Report

(German) Forrester Economic Impact of Gigamon

Analyst Report

(French) Forrester Economic Impact of Gigamon

Analyst Report

Vanson Bourne Survey

Analyst Report

Forrester Total Economic Impact Report

Analyst&Industry Report

This CSO Magazine’s interview with Gigamon CISO, Simon Gibson, shows how a new, more intelligent approach to network security builds resilience into technology operations.

Analyst&Industry Report

Read SC Magazine’s original research article to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done.

Analyst&Industry Report

2018 Cyberthreat Defense Report

Analyst&Industry Report

"Countering Escalating Cyberthreats with a New Security Architecture” is a whitepaper from CSO about how next-generation network packet brokers tackle threats, reduce costs, decrease complexity and deliver operational agility.

Analyst&Industry Report

Market Focus: Encrypted Data Is Still At Risk

Analyst&Industry Report

Organizations need to gain a clear understanding of their network environment so that they will be agile enough to address potential issues before their business becomes the target of an attacker and a costly breach.

Analyst&Industry Report

(Italian) Forrester Economic Impact of Gigamon IT

Analystenbericht

Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats

Analystenbericht

Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture

Application Note

Adaptive Packet Filtering

Application Note

Subscriber Aware Visibility for Mobile Carriers

Application Note

GTP Correlation Stateful Subscriber Aware Filtering

Application Note

SSL Decryption

Application Note

FlowVUE Active Subscriber Aware Flow Sampling

Application Note

NetFlow Generation

Book

Security Inside Out

Book

(Traditional Chinese) eBook: Security Inside Out

Business Brief

(Simplified Chinese) Increase Effectiveness Cybersecurity

Business Brief

(Korean) Increase Effectiveness Cybersecurity

Business Brief

Learn how to strengthen the testing of new security tools and streamline the deployment of security products.

Business Brief

Control Costs

Business Briefs

Increase Effectiveness Cybersecurity

Case Study

(Chinese) KBC Banking Insurance Group Simplifies Monitoring Forensics

Case Study

Amica Insurance

Case Study

BICS

Case Study

(Japanese) BICS

Case Study

PERS Reduces Security Cost Increases Visibility

Case Study

Cardinal Health Streamlines Costs and Increases Network Security Efficiencies with Gigamon

Case Study

The College of William & Mary

Case Study

Cost-effective Monitoring Solution

Case Study

DoD Subcontractor Leverages Gigamons Solutions

Case Study

European Broadcasting Union Improves Service Delivery

Case Study

Leading UK Network Carrier Chooses Gigamon to Get the Most Out of Monitoring Tools

Case Study

Gigamon Resolves Security Issues for Large Cable Firm

Case Study

Gigamon Helps Government Agency Meet Cybersecurity Requirements

Case Study

Intercontinental Exchange

Case Study

Johns Hopkins Medical Institution Improves Network Health with Gigamon Visibility Solution

Case Study

KBC Banking Insurance Group Simplifies Monitoring Forensics

Case Study

Gigamon Ensures Privacy of Traffic in Multi-Tenant Network and Enables Near Real-time Changes for Outsourcing Firm

Case Study

National Center for Supercomputing Applications

Case Study

Gigamon Solves Network Monitoring Tool Connectivity Problem

Case Study

Portsmouth Hospital Application and Network Monitoring

Case Study

Research and Development

Case Study

Canada’s Leading Full-Service Communications Provider, SaskTel, Chooses Gigamon to Ensure Customer Satisfaction

Case Study

Seattle Cancer Care Alliance Selects Gigamon for Pervasive Visibility Across Virtual and Physical Infrastructure

Case Study

TDC Group Works with Gigamon to See and Manage Its Data in Motion

Case Study

University of Glasgow Scales its Intrusion Detection System to Support 30,000 Users

Case Study

University of Kansas Health System

Case Study

University of Wisconsin-Madison Chooses Gigamon for Large-Scale Data Center Monitoring

Case Study

Vela Trading Technologies

Case Study

Health System Increases Efficiency and Scalability with Structured Cabling and Network Visibility

Case Study

Zain Mobile Network Operator Scales Montoring Systems

Case Study

Global Service Provider Uses Gigamon to Enable Data Center Security Infrastructure

Data Sheet

It is no longer a question of if your organization will be breached but when it will be breached. The Gigamon® Certified Professional (GCP) certification program has been designed to validate a participant’s knowledge regarding the use of Gigamon products to help secure enterprise networks.

Data Sheet

This course will help you get the best utilization from your security tools investments by implementing the Gigamon Inline Bypass Threat Prevention Solution

Data Sheet

The Gigamon Education Services Program delivers innovative training, development and certification opportunities supporting Gigamon solutions.

Data Sheet

The Gigamon Certified Professional (GCP) teaches security, network and cloud professionals Gigamon fundamentals.

Data Sheet

Gigamon GigaSECURE Cloud for AWS

Data Sheet

Intelligent network traffic visibility that enables enterprises to extend their security posture to Microsoft Azure.

Data Sheet

(French) GigaVUE-HC3

Data Sheet

(French) GigaVUE-HC2

Data Sheet

(French) GigaVUE-HC1

Data Sheet

Gigamon Product Comparison Chart

Data Sheet

GigaSMART

Data Sheet

(Japanese) GigaSMART

Data Sheet

GigaTAP G-TAP Network Tap

Data Sheet

G-TAP M Series

Data Sheet

GigaVUE-FM Fabric Manager

Data Sheet

(Japanese) GigaVUE-FM Fabric Manager

Data Sheet

(Korean) GigaVUE-FM Fabric Manager

Data Sheet

GigaVUE-HC1

Data Sheet

GigaVUE-HC2

Data Sheet

(Japanese) GigaVUE-HC2

Data Sheet

(Korean) GigaVUE-HC2

Data Sheet

GigaVUE-HC3

Data Sheet

(Chinese) GigaVUE-HC3

Data Sheet

GigaVUE HD Series Big Data

Data Sheet

(Korean) GigaVUE HD Series Big Data

Data Sheet

GigaVUE-OS on Third-Party White Box

Data Sheet

GigaVUE TA Series Traffic Aggregation

Data Sheet

(Korean) Data Sheet: GigaVUE TA Series Traffic Aggregation

Data Sheet

GigaVUE-VM Virtual Machine

Data Sheet

(Japanese) GigaVUE-VM

Data Sheet

(Korean) GigaVUE-VM

Data Sheet

G-TAP A Series Optical Network

Data Sheet

GigaVUE TA Series Traffic Aggregation

Deployment Guide

Blue Coat SSL Visibility and FireEye HA

Deployment Guide

Check Point 4800 with Gigamon Inline Deployment Guide

Deployment Guide

Deploying Blue Coat and FireEye Inline with Gigamon

Deployment Guide

Cisco FirePOWER with Gigamon Inline Deployment Guide

Deployment Guide

Imperva with Gigamon

Deployment Guide

Deploying Gigamon with Splunk

Deployment Guide

Multi-Product Security Architecture Example

Deployment Guide

Palo Alto Networks NGFW with Gigamon Inline Deployment Guide

Deployment Guide

Gigamon Visibility Platform and RSA NetWitness for Amazon AWS

Deployment Guide

Visibility Platform For AWS

Dummies Guide

Download the Security Delivery Platforms for Dummies e-book to transform how security and monitoring tools are deployed on the network.

Executive Summary

(Korean) CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Executive Summary

(Traditional Chinese) CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Executive Summary

(Japanese) CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Executive Summary

(Simplified Chinese) CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Executive Summary

CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Executive Summary

Defender Lifecycle Model

Executive Summary

Vanson Bourne Survey EMEA Executive Summary

Executive Summary

Vanson Bourne Survey Executive Summary

Feature Brief

(Korean) Inline Bypass

Feature Brief

(Traditional Chinese) SSL/TLS Decryption

Feature Brief

(Traditional Chinese) Why Security Tools Need Inline Bypass

Feature Brief

(Simplified Chinese) Why Security Tools Need Inline Bypass

Feature Brief

Why Security Tools Need Inline Bypass

Feature Brief

(French) SSL TLS Decryption

Feature Brief

Adaptive Packet Filtering

Feature Brief

Application Session Filtering

Feature Brief

FabricVUE Traffic Analyzer

Feature Brief

FlowVUE Application

Feature Brief

GTP Correlation

Feature Brief

NetFlow and Metadata Generation

Feature Brief

Role-Based Access Control

Feature Brief

SSL/TLS Decryption

Five Reasons for an Elemental Shift in Security

Securing an IT infrastructure — across physical, virtual and cloud environments — has become more daunting and complex than ever.

Gartner Report: Align NetOps and SecOps Tool Objectives With Shared Use Cases

Many organizations struggle with IT Convergence between the network and security teams. In this report, Gartner highlights the growing importance of a shared layer of instrumentation that can feed various tools owned by Network Operations (NetOps), Security Operations (SecOps) or even shared tools by both teams. This is important because security teams are often dependent on other teams such as the infrastructure/network ops teams in order to drive and implement automation in the security stack.

Gigamon Foundation Course Data Sheet

The Gigamon Foundation course is the first building block in learning how to implement and configure the GigaSECURE Security Delivery Platform in your enterprise.

Gigamon G-TAP Stencils

Gigamon G-Tap Stencils

Gigamon helps organizations address GDPR

How Gigamon helps organizations address GDPR

Gigamon Inline Bypass

Gigamon’s GigaSECURE Security Delivery Platform next-generation network packet broker allows you to do more, cost less and keep up with increasing network traffic – delivered by Inline Bypass.

Gigamon Professional Services

Gigamon Professional Services provide subject matter experts (SMEs) to assist with the application of industry best practices regarding implementing GigaSECURE® Security Delivery Platform, a next--generation network packet broker purpose-built for security and network monitoring.

Gigamon Quick Start PoC

Gigamon Quick Start PoC

GigaSECURE Cloud Overview

Learn how GigaSECURE Cloud helps you acquire, optimize and distribute the right traffic to the right security and networking tools in the public cloud.

GigaTalks AWS Cloud with Mike Clayville

We sat down with Mike Clayville from Amazon Web Services to discuss our latest announcement, visibility into the public cloud.

Guide

GigaVUE-FM REST API User’s Guide

Guide and Cookbook

This deployment guide provides instructions for deploying Inline SSL on GigaVUE-OS 5.3 within an enterprise network.

Guide and Cookbook

Getting started guide for GigaSECURE Cloud for Microsoft Azure

Guide and Cookbook

Application Session Filtering

Guide and Cookbook

AWS Quick Start POC Configuration Guide

How to Cut Costs with Gigamon

Can the GigaSECURE Security Delivery Platform really help you cut costs? Find out what Forrester thinks.

IHS Markit Report 2017

Infografik

Der fünfte jährliche Cyberthreat Defense Report der CyberEdge Group enthüllt, wie IT-Sicherheitsexperten die Sicherheitssituation ihrer Unternehmen, die Herausforderungen beim Schaffen effektiver Schutzmaßnahmen gegen Cyberbedrohungen und die Pläne für die Bewältigung dieser Herausforderungen einschätzen. Im Folgenden finden Sie einige der wichtigsten Ergebnisse des diesjährigen Berichts.

Infographic

AWS Visibility into Public Cloud

Infographic

ESG Survey shows retail Companies need stronger Security as they increase production workloads in the public cloud.

Infographic

ESG Survey shows Healthcare organizations need better cloud security tools.

Infographic

ESG Survey shows financial firms need to ensure security across their entire multi-cloud environment.

Infographic

ESG Survey shows the need for strong security and monitoring within multi-cloud deployments.

Infographic

(Korean) CyberEdge Group’s fifth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Infographic

(Traditional Chinese) CyberEdge Group’s fifth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this year’s report.

Infographic

(Japanese) CyberEdge Group’s fifth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this year’s report.

Infographic

(Simplified Chinese) CyberEdge Group’s fifth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this year’s report.

Infographic

CyberEdge Group’s fifth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this year’s report.

Infographic

Amp Network Threat Detection With Metadata

Infographic

Build New Business Models. Become Subscriber Aware.

Infographic

Forrester TEI Report

Infographic

IN-Network Security Trends

Infographic

See What Matters

Infographic

Security Delivery Platform

Infographic

Dealing with the Growth in SSL Traffic

Infographic

TAPs Vs SPANs

Infographic

Vanson Bourne: Lack of Visibility is a Leading Obstacle to Securing Enterprise and Cloud Networks

Infographic

Your Business Infrastructure Needs Active Visibility

Infographique

Le cinquième rapport annuel de défense contre les cybermenaces du Groupe CyberEdge révèle la façon dont les professionnels de la sécurité des TI perçoivent les dispositifs de sécurité de leurs organisations, les défis qu’ils rencontrent lors de l’élaboration des défenses efficaces contre les cybermenaces et leurs plans afin de surmonter ces difficultés. Poursuivez votre lecture à propos de certaines trouvailles essentielles retrouvées dans ce rapport annuel.

Product Brief

Gigamon GigaSECURE Cloud for Microsoft Azure

Product Brief

Gigamon GigaSECURE Cloud for AWS

Product Brief

GigaBPS Bypass Protection Module for HC2

Product Brief

(Japanese) GigaBPS for HC2

Product Brief

GigaPORT-X12-TS

Product Brief

GigaSMART

Product Brief

(Korean) GigaSMART

Product Brief

GigaVUE Fabric Manager

Product Brief

GigaVUE-HC1

Product Brief

GigaVUE-HC2

Product Brief

(Japanese) GigaVUE HC2

Product Brief

GigaVUE-HC3

Product Brief

GigaVUE HD Series

Product Brief

(Japanese) GigaVUE-HD Series Big Data

Product Brief

GigaVUE-OS

Product Brief

GigaVUE-OS on a White Boxes

Product Brief

GigaVUE-VM

Product Brief

G-TAP

Product Brief

G-TAP A Series

Product Brief

G-TAP BIDI

Récapitulatif

Ce cinquième rapport annuel sur la défense contre les cybermenaces du CyberEdge Group jette un regard pénétrant sur la manière dont les professionnels perçoivent ces cybermenaces et planifient leurs mesures de protection.

Solution Brief

(Korean) Threat Prevention

Solution Brief

(Traditional Chinese) Threat Prevention

Solution Brief

Threat Prevention

Solution Brief

Enhanced Monitoring for VMware Infrastructure

Solution Brief

Network Monitoring for Virtual Server Environments

Solution Brief

(Japanese) Pervaisve Visibility for Financial Institutions

Solution Brief

Pervasive Visibility for the Enterprise

Solution Brief

Pervasive Visibility Platform

Solution Brief

Software-Defined Visibility

Solution Brief

Tenant Traffic Visibility for OpenStack/KVM Powered Clouds

Solution Guide

Active Visibility for VMware NSX SDDC

Solution Overview

Handout GigaSECURE Cloud for AWS Architecture

Solution Overview

Active Visibility For Multi-Tiered Security

Solution Overview

Gigamon Visibility Platform for AWS

Technology Overview

Gigamon Resilient Inline Protection GRIP

Technology Partner Solution Brief

Gigamon gigasmart and Thales nshield efficient and cost effective web security

Technology Partner Solution Brief

Benefits Gigamon and Endace

Technology Partner Solution Brief

(Simplified Chinese) Comprehensive Security with Imperva SecureSphere WAF and the Gigamon GigaSECURE Security Delivery Platform

Technology Partner Solution Brief

Argyle Data Gigamon

Technology Partner Solution Brief

Atigeo Gigamon

Technology Partner Solution Brief

Benefits of Gigamon and Cisco FirePOWER for AWS

Technology Partner Solution Brief

Pervasive Visibility Enabling Pervasive Security with Fortinet and Gigamon

Technology Partner Solution Brief

Improve Network Analysis and Security with Real-Time Relevant Data Retrieval from Napatech and Gigamon

Technology Partner Solution Brief

Intelligent and Automatic Protection of Business Applications with Positive Technologies and Gigamon

Technology Partner Solution Brief

Real-time, Automated Detection and Remediation of Known and Unknown Threats with Seceon and Gigamon

Technology Partner Solution Brief

Pervasive Network Visibility as a Service with Talaia Networks and Gigamon

Technology Partner Solution Brief

Real-time, Network-based APT Detection, Logging and Investigation That Won’t Impact Network Performance

Technology Partner Solution Brief

Checkpoint Gigamon Optimize Security With Network Visibility

Technology Partner Solution Brief

Cisco Firepower and Gigamon - Effective And Efficient

Technology Partner Solution Brief

Corvil

Technology Partner Solution Brief

Datiphy

Technology Partner Solution Brief

E8 Security

Technology Partner Solution Brief

Empirix

Technology Partner Solution Brief

Extrahop

Technology Partner Solution Brief

Detect Modern Instrusions with Fidelis Cybersecurity and Gigamon

Technology Partner Solution Brief

Fireeye Web Mps Cyber Security

Technology Partner Solution Brief

Flowmon

Technology Partner Solution Brief

Cyphort

Technology Partner Solution Brief

Gigamon Flowtraq

Technology Partner Solution Brief

Gigamon and Interset Use Behavioral Analytics, Machine Learning, and Big Data to Pinpoint Real Threats in Real Time

Technology Partner Solution Brief

Gigamon Niara

Technology Partner Solution Brief

Gigamon Enhances Operational Efficiency and High Availability of Palo Alto Networks Next Generation Firewalls

Technology Partner Solution Brief

GuardiCore and GigaSECURE

Technology Partner Solution Brief

Guavus Gigamon

Technology Partner Solution Brief

Security Intelligence from IBM Security and Gigamon

Technology Partner Solution Brief

Understand Customers' True Online Experience with IBM Watson Customer Experience Analytics and the Gigamon Visibility Platform

Technology Partner Solution Brief

Comprehensive Security with Imperva SecureSphere WAF and the Gigamon GigaSECURE Security Delivery Platform

Technology Partner Solution Brief

Detect Attacks with JASK

Technology Partner Solution Brief

Improve Network Performance Management and Anomaly Detection with Kentik Detect and the Gigamon Visibility Fabric

Technology Partner Solution Brief

Lancope and Gigamon – Uncompromised NetFlow-based Security Visibility

Technology Partner Solution Brief

Quickly and Accurately Detect, Block, and Respond to Advanced Malware

Technology Partner Solution Brief

LightCyber and Gigamon - Attacker Profiling and Visibility

Technology Partner Solution Brief

Optimize Business Application Delivery with LiveAction’s LiveNX and Gigamon’s Visibility Fabric

Technology Partner Solution Brief

Pervasive Visibility from Gigamon and LogRhythm Facilitates Rapid Threat Detection and Response

Technology Partner Solution Brief

Lumeta and Gigamon – Correlating NetFlow with Threat Intelligence

Technology Partner Solution Brief

Managed Methods Visibility Monitoring Cloud App Usage

Technology Partner Solution Brief

Netquest WAN

Technology Partner Solution Brief

Speed Malware Incident Response with Better Traffic Insight and Context from Gigamon and Plixer

Technology Partner Solution Brief

Protectwise Gigamon

Technology Partner Solution Brief

Detect Live Network Traffic in Your RedSeal Model

Technology Partner Solution Brief

Reservoir Labs and Gigamon for Intrusion Detection

Technology Partner Solution Brief

Riverbed Gigamon

Technology Partner Solution Brief

Securing the Hybrid Cloud with RSA and Gigamon

Technology Partner Solution Brief

Savvius Gigamon

Technology Partner Solution Brief

Scadafence Gigamon

Technology Partner Solution Brief

SentryWire

Technology Partner Solution Brief

Sevone Netflow Monitoring

Technology Partner Solution Brief

Sinefa

Technology Partner Solution Brief

solebit

Technology Partner Solution Brief

Splunk Gigamon

Technology Partner Solution Brief

Stealth Security

Technology Partner Solution Brief

Tenable Gigamon Detect Assets Vulnerabilities Threats

Technology Partner Solution Brief

Trend Micro

Technology Partner Solution Brief

Vectra Gigamon

Technology Partner Solution Brief

Velocimetrics Gigamon

Technology Partner Solution Brief

Viavi Performance Mgmt

Technology Partner Solution Brief

Visibility for Breach Detection with Holonet Security and Gigamon

Technology Partner Solution Brief

VMware Gigamon

Technology Partner Solution Brief

VoIP Quality with Voipfuture

Test Drive

GigaSECURE Cloud for AWS Test Drive

Test Drive

GigaSECURE Cloud for Azure

Test Drive

Gigamon Visibility Platform for AWS with RSA NetWitness

Try-and-Buy

90 Free Trial of GigaSECURE

Use Case

4 Hour Remote Professional Services Use Case

Use Case

Gigamon Protects Mobile Core by Implementing Distributed Traffic Intelligence

Use Case

Resident Support Engineer Professional Services

Use Case

Tier-1 Provider Gains Clear Business Advantage

Use Case

Wireless Provider Reduces Support Costs with Gigamon Visibility Fabric Architecture

Use Case

Wireless Provider Uses Gigamon to Scale for VoWiFi/VoLTE Traffic

User and Support Documentation

Services Solutions User Guide

User and Support Documentation

Partner Program Overview

User and Support Documentation

Gigamon Service Offering Overview

User and Support Documentation

Product Support and Software Maintenance Agreement

User Support Documentation

5 Year Limited Warranty

User Support Documentation

Quick Start Check List

User Support Documentation

End User License Agreement

User Support Documentation

EULA Supplemental Terms GIMOVisibility App for Splunk

User Support Documentation

Gigamon Accessory Policy

User Support Documentation

Gigamon Limited Warranty Hardware and Software

User Support Documentation

Gigamon Policy Related To Secondary Market Products

User Support Documentation

Gigamon Software Release Policy

User Support Documentation

Limited Warranty Hardware and Software

User Support Documentation

Return Material Authorization RMA Policy

Video

Under Armour and Gigamon Co-Present at Cisco Live 2017

Videos

GigaSECURE Security Delivery Platform: a next-generation network packet broker purpose-built for security.

Videos

Moving to the cloud isn’t as easy as it seems. Network and security teams are challenged with: Compliance, detection of anomalies and increased cost and complexity. Learn how GigaSECURE Cloud addresses these issues.

Videos

See Shehzad Merchant, Gigamon CTO deliver a keynote on “Buying Down Risk in Federal Networks” at this year’s Cybersecurity Summit in Washington, DC.

Videos

Jim Frey of Kentik discusses the benefits of the Gigamon and Kentik joint solution.

Videos

Bob Anderson of ReversingLabs discusses the benefits of the Gigamon and ReversingLabs joint solution.

Videos

Rick Miles of RedSeal discusses the benefits of the RedSeal and Gigamon joint solution.

Videos

Sean Dastouri discusses the Microsoft and Gigamon partnership

Videos

Adam Wright of Flowmon discusses the benefits of the Flowmon and Gigamon joint solution.

Videos

Chris Siakos of Sinefa discusses the benefits of the Gigamon and Sinefa joint solution.

Videos

Stephanie Weagle discusses the benefits of the Corero and Gigamon joint solution.

Videos

Doug Hurd of Cisco discusses the benefits of the Cisco and Gigamon joint solution.

Videos

Why Change Threat Prevention

Videos

Active Visibility Solutions for High Volume Traffic Monitoring

Videos

Automating Visibility Inside Cisco Live Network - Gigamon and JDSU

Videos

The Case for Network Metadata

Videos

Discover the Benefits of Visibility in 2 Minutes

Videos

Extending Operational Intelligence - GigaSECURE® Gigamon Visibility App Splunk

Videos

Flow Mapping Explained

Videos

Gigamon Founding Story

Videos

Gigamon GigaSMART SSL Decryption for Visibility into Emerging Threat Sources

Videos

Network TAPS - How They Work

Videos

Security Delivery Platform: Transforming Security Through Visibility

Videos

Software Defined Visibility (SDV) - Automated Visibility Fabric Gigamon

Videos

Triple Challenge: IP Voice / 100Gb / Virtualization

Videos

Benefits of the Gigamon and Blue Coat Joint Solution

Videos

Benefits of the Gigamon and ExtraHop Solution

Videos

Benefits of the Gigamon and FireEye Joint Solution

Videos

Benefits of the Gigamon and IBM Security Joint Solution

Videos

Benefits of the Gigamon and LightCyber Joint Solution

Videos

Benefits of the Gigamon and LogRhythm Joint Solution

Videos

Benefits of the Gigamon and Bluvector Solution

Videos

Benefits of the Gigamon and Cisco Joint Solution

Videos

Benefits of the Gigamon and Guavus Joint Solution

Videos

Benefits of the Gigamon and Plixer Joint Solution

Videos

Benefits of the Gigamon and Check Point Joint Solution

Videos

Benefits of the Gigamon and ExtraHop Joint Solution

Videos

Benefits of Gigamon Lightcyber Joint Solution

Videos

Benefits of Gigamon Plixer Joint Solution

Videos

Benefits of Gigamon Protectwise Solution

Videos

Benefits of Gigamon Riverbed Joint Solution

Videos

Benefits of Gigamon RSA Joint Solution

Videos

Benefits of Gigamon RSA Joint Solution

Videos

Benefits of Gigamon Savvius Joint Solution

Videos

Benefits of Gigamon Vectra Joint Solution

Videos

Benefits of Gigamon Viavi Observer Platform Joint Solution

Videos

Benefits of Gigamon Viavi Xsight Joint Solution

Videos

Nick Matthews of AWS explains the benefits of the Gigamon Visibility Platform for AWS.

Videos

Dark Reading Interview with Gigamon CTO Shehzad Merchant

Videos

Black Hat 2015 Darkreading Interview With CTO Merchant

Videos

The Certificate Has Issuer, Issued To and Validity.

Videos

Cybersecurity Improving Odds in Defender Favor

Videos

Cybersecurity Today Why No Single Vendor Can Do it All

Videos

Derisking VoLTE Deployments

Videos

Enabling Security Tools With Better Visibility of Encrypted Traffic

Videos

Gigamon & Plixer: Network Traffic Analytics

Videos

Gigamon Cisco Joint Solution

Videos

Gigamon Guavus Joint Solution

Videos

Gigamon Liveaction Joint Solution

Videos

Gigamon Logrhythm Joint Solution

Videos

Gigamon Plixer Joint Solution

Videos

Gigamon Riverbed Joint Solution

Videos

Gigamon Riverbed Joint Solution Overview

Videos

Gigamon RSA Netwitness Joint Solution

Videos

Gigamon See What Matters

Videos

Gigamon Viavi Joint Solution

Videos

Gigamon Vmware Joint Solution

Videos

Growth of Encrypted SSL and TLS Traffic

Videos

IT Trends Changes How Enterprises Approach Security

Videos

Need for Active Visibility from Gigamon

Videos

New Approaches to SSL Decryption Architectures

Videos

Open Qs Poc Prep

Videos

Right to Encrypt or Decrypt

Videos

Visibility 100 Gigabit Ethernet Networks

Videos

This new solution would allow the customers’ security operations and network operations teams to centrally secure and monitor their on-prem and off-prem workloads, thereby providing comprehensive visibility regardless of workload location. The solution would provide the enterprise administrator with different deployment options, regardless of whether the tools are located in the cloud or on-prem.

Videos

Only Gigamon helps you to manage, secure and understand the data traversing your public cloud environments.

Videos

Sesh Sayani presents a Gigamon Visibility Platform for AWS Q&A.

Videos

Visibility Virtualized Data Centers

Videos

Triple Challenge Animation

Videos

Triple Challenge Animation (Japanese)

Videos

Triple Challenge Sub Titles JP

Videos

Visibility for Small Enterprise Remote Sites

Videos

Visibility Into Virtualized Environments

Videos

Visibility Into VoLTE

Videos

Why Visibility Matters in Every Security Strategy

Vidoes

Jaymin Patel discusses the benefits of the Virtual Instruments and Gigamon joint solution.

Visio

Gigamon GigaVUE-HC2 Stencils

Visio

Gigamon GigaVUE -HC1 Stencils

Visio

Gigamon GigaVUE-HC3 Stencils

Visio

Gigamon GigaVUE-FM Stencils

Visio

Gigamon GigaVUE-HB1 Stencils

Visio

Gigamon GigaVUE-HD Series Stencils

Visio

Gigamon GigaVUE-TA Series Stencils

Webinar

Sicherheit neu überdenken

Webinar

Repenser la sécurité

Webinar

Rethinking Security

Webinar

Learn how the GigaSECURE Security Delivery Platform strengthens new security tool testing and streamlines deployment.

Webinar

Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility.

Webinar

By providing security tools with summary takes of the packet data traversing networks, metadata can become a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy.

Webinar

"Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. See how to use metadata generation to leverage your security tools more efficiently and improve your security posture."

Webinar

Sign up for this technical webinar to see how Gigamon reduces tool load and maximizes tool efficiency and effectiveness in your infrastructure. You’ll learn how to minimize CapEx and OpEx costs through better use of tools, remove the complexity of adding inline and monitoring tools to modern networks, maximize your investment in security and monitoring tools.

Webinar

Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded. Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.

Webinar

Current network security architectures are rapidly becoming inefficient. Dangerous malware, data breaches and ransomware often go unseen in enterprise networks, putting the business and their customers at risk. Join this webinar to discover a better way to defend your network against cyber threats. Learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.

Webinar

Join the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis.

Webinar

Learn why prescriptive approaches to threat detection won't work and how to make better use of your existing tools to improve security without sacrificing performance.

Webinar

Organizations continue to move to the public cloud in large numbers, but they often do not understand the implications of the shared responsibility model. The question is: “who is responsible for security of the cloud versus security in the cloud”? This webcast will address this question, look at SLAs for mission-critical workflows to the cloud, as well as how to assure compliance and accelerate the on-boarding of critical applications.

Webinar

Managing the increasing volumes of network data across expanding physical, virtual and cloud networks is a growing challenge for Enterprise IT organizations. Likewise, the increase in malware, data breaches and ransomware challenges SecOps teams. In this webcast, we’ll examine how to reduce time-to-threat detection by analyzing metadata traffic, using proactive, real-time traffic monitoring vs. reactive forensics, to protect increasingly complex networks.

Webinar

As the volume and variety of network data increases, security tools in high-speed networks are unable to keep pace with the explosion of encrypted threats, from malware incursion to data exfiltration. In this webcast, we’ll examine how to eliminate tool overload and high latency as well as how a “decrypt once and inspect many” approach to managing SSL traffic effectively detects hidden threats and provides greater security infrastructure resiliency.

Webinar

Join us for a technical deep dive into Giga VUE-Fabric Manager, or GigaVUE-FM, and see how you can benefit from a single-pane of-glass view of all the physical and virtual nodes across the Gigamon Visibility Platform. Giga VUE-FM also provides a simple-to-use Graphical User Interface (GUI) to orchestrate the patented Flow Mapping® traffic policies, visualize network topology and identify visibility hot spots.

Webinar

Sign up for this technical webinar to learn how Gigamon Flow Mapping® maximizes tool utilization and efficiency by ensuring that the right data is sent to the right tools.

Webinar

Sign up for this technical webinar to learn how to use intelligent Flow Mapping® to get traffic visibility into virtual workloads. See how you can reduce the management and monitoring overhead of virtual machine traffic, better leverage your existing tools, and eliminate traffic blind spots.

Webinar

Existing security tools cannot see traffic that doesn’t cross a physical network (i.e. workloads talking across a hypervisor). However, virtual environments don’t require a big investment in new tools if you can bring more data to the tools you already have. Sign up for this technical webinar and learn how to leverage your existing tools to secure virtual environments.

Webinar

"Sign up for this technical webinar to learn how to effectively implement and optimize inline security tools in order to maximize your organization’s security posture. You will discover how to make your inline tool deployment experience much more flexible and reliable while decreasing the overall complexity of your security stack."

Webinar

"Customers choose Gigamon because we enable them to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of the organization. See why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments."

Webinar

Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Watch now to learn how your colleagues plan to defend against cyberthreats!

Webinar

Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)2 to see how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.

Webinar

Achieving Pervasive Visibility Across AWS GovCloud

Webinar

Best Practices: Securing, Analyzing and Mitigating Threats to Your AWS Applications

Webinar

Destination: GigaSecure is Here

Webinar

How to quickly detect and stop hidden cyber attackers in the public cloud

Webinar

How to Use Network Visibility to Bolster Security Effectiveness

Webinar

Leveraging a Security Delivery Platform for Stronger Security

Webinar

Pervasive Visibility Enabling Comprehensive Security

Webinar

SANS 2016 IT Security Spending Strategies Survey

Webinar

The Visibility Platform: See What Matters™

Webinar

Triple Challenge of Network Transformation

Webinar

Understanding and Addressing the Challenges of Managing SSL/TLS Encrypted Traffic

Webinar

Visibility Your Way - Quanta + Gigamon Overview

Webinar

What You Need to Know about Network Transformation, Security and Visibility

White Paper

White paper authored by Zeus Kerravala about understanding the role of the network packet broker.

White Paper

Ce livre blanc présente la façon dont la fonctionnalité de bypass inline de la plateforme de sécurité GigaSECURE® facilite le déploiement des initiatives de sécurité en permettant aux outils de prévention des menaces d’évoluer et de rester en phase avec les réseaux haute vitesse. Avec la Plateforme de sécurité GigaSECURE, les entreprises peuvent améliorer à moindre coût leur posture de sécurité sans avoir à sacrifier les performances réseau.

White Paper

Disrupt the Machine to Human Fight

White Paper

Rethinking Network Security Deployment

White Paper

See how an architectural approach secures more data on faster networks.

White Paper

Learn how to effectively extend your security posture to the cloud.

White Paper

Download the IDG Tech Dossier, “A Security Delivery Platform Benefits the Entire Organization,” to see how to improve security while reducing costs.

White Paper

Harnessing the Power of Metadata for Security

White Paper

Nine Metadata Use Cases: How to Use Metadata to Make Data-Driven Decisions

White Paper

Improve Network Visibility with Advanced Inline SSL/TLS Decryption Solutions

White Paper

Intelligent Traffic Management for Service Monetization and Operational Efficiency for MSPs

White Paper

The GigaSECURE® Security Delivery Platform inline bypass functionality helps facilitate the rollout of security initiatives by enabling inline threat prevention tools to scale and keep pace with high-speed networks. With the GigaSECURE Security Delivery Platform, businesses can cost-effectively improve their security posture without sacrificing network performance.

White Paper

"Ce livre blanc envisagera les problèmes de sécurité introduits par des volumes de données plus importants sur des réseaux plus rapides, la façon dont une approche architecturale peut résoudre ces problèmes et introduira la Plateforme de sécurité GigaSECURE®, le collecteur de paquets réseau de nouvelle génération leader, conçu pour que les outils de sécurité fonctionnement plus efficacement à travers les environnements physiques, virtuels et cloud. De fait, IHS Markit1 a désigné Gigamon comme l’entreprise leader du marché et le fournisseur le plus réputé dans ce secteur avec la première part de marché dans plusieurs industries : 36 % au total, et 59 % dans le secteur Gouvernement."

White Paper

BluVector SOC Automation of Threat Investigation

White Paper

(French) Harnessing the Power of Metadata for Security

White Paper

(French) POV: GDPR Compliance

White Paper

POV: GDPR Compliance

White Paper

Analysis of Executive Order Memorandum Directing the Use of a Cybersecurity Framework

White Paper

End-to-End Visibility and Security for Your Cisco Infrastructure

White Paper

Application Session Filtering

White Paper

(Japanese) Application Session Filtering

White Paper

Big Data Big Visibility

White Paper

Differentiating Your Healthcare Institution While Improving Profitability

White Paper

Enterprise System Reference Architecture for the Visibility Platform

White Paper

(Korean) Enterprise System Reference Architecture for the Visibility Fabric

White Paper

(Japanese) Enterprise System The Visibility Fabric

White Paper

Intelligent Flow Mapping

White Paper

(Japanese) Gigamon Intelligent Flow Mapping

White Paper

How to Segregate & Load Balance 10Gbps Traffic to 1Gbps Tools

White Paper

Monitoring, Managing, and Securing SDN Deployments

White Paper

Multicasting, Tap and Traffic Aggregation for Telecom

White Paper

Multi-Point Correlation for Mobile Operators

White Paper

The Need for Active Visibility

White Paper

NetFlow Generation Security Value Proposition

White Paper

Understanding Network TAPs – The First Step to Visibility

White Paper

Pervasive Visibility Platform – A New Approach to Visibility

White Paper

Preventing Data Center Downtime

White Paper

(German) Rethinking Network Security Deployment

White Paper

(French) Rethinking Network Security Deployment

White Paper

(Italian) Rethinking Network Security Deployment

White Paper

(Japanese) Rethinking Network Security Deployment

White Paper

The Road to SDN is Paved with Visibility and Many Good Intentions

White Paper

A Security Delivery Platform Benefits the Entire Organization

White Paper

Service Provider System Reference Architecture for the Visibility Fabric

White Paper

(Korean) White Paper: Software-Defined Visibility: The New Paradigm for IT

White Paper

Software-Defined Visibility (SDV): The New Paradigm for IT

White Paper

TAP vs SPAN

White Paper

Top 10 Security Issues for 2015-2016

White Paper

De-risking New Service Provider Technology Deployments

White Paper

Visibility into the Cloud and Virtualized Data Center

White Paper

Gigamon Security Mandate Response To Cyberthreats

White Paper

Esg Research Insights Gigamon State of Network Security

Zusammenfassung

Der fünfte jährliche Cyberthreat Defense Report (Bericht zum Schutz vor Cyber-Bedrohungen) der CyberEdge Group bietet tiefe Einblicke dazu, wie Fachleute im Bereich IT-Sicherheit Cyber-Bedrohungen empfinden und wie sie diese bekämpfen wollen.

No Results

Try again ...