Ecosystem Partners overview

Technology / Ecosystem Partners

Active visibility for best-of-breed monitoring and security

Ecosystem Partners

Our Ecosystem Partners solve customer problems with best of breed monitoring solutions for network security, troubleshooting, application analysis, forensics review and SOX compliance. Partners attach their solutions to Gigamon Traffic Visibility Fabric to get unobstructed access to any or all segments of the physical and virtual network. Gigamon and its partners seek to expand utilization of visibility, monitoring and security technologies and develop new best practices to help our customers.

TOPOLOGIES

Physical

Physical

 
Virtual

Virtual

 
SDN

SDN

 

FABRIC MANAGEMENT

visibility Fabric
 

CENTRALIZED TOOLS

Application Performance Monitoring (APM)
  • Application Performance Monitoring (APM)
  • Network Performance Monitoring (NPM)
  • Security and Vulnerability Management
  • Network Forensics/Big Data Analytics
  • Customer Experience Management Monitoring (CEM)
Pain Point / Challenges Benefits of a Gigamon Visibility Fabric
Duplicate packets reduce
accuracy and reliability
Gathering traffic from multiple collection points almost always results
in duplicates. By removing duplicates, a Visibility Fabric:

  • Off-loads CPU-intensive de-duplication, increasing APM performance
  • Increases performance by eliminating inaccurate utilization, packet,
    and byte counts caused by duplicate packets
  • Increases accuracy of analysis, since more valid packets are kept
Difficult to obtain all necessary
traffic from across the network
Budget restrictions can cause customers to monitor only parts of their network.
By aggregating traffic from across the entire network, a Visibility Fabric:

  • Increases efficiency by allowing monitoring of more of the network leveraging the same analyzers
Analyzer only needs
traffic relevant to APM
Only some traffic on a network link is relevant to an APM analyzer.
By intelligently filtering traffic being sent to the APM, a Visibility Fabric:

  • Increases functional bandwidth, increasing the tool’s efficiency
Latency caused by remote
sites and cloud traffic can
decrease accuracy
Latency caused by distance can distort APM results.
By time stamping the traffic on ingress, a Visibility Fabric:

  • Grooms the traffic to insure that the analyzer can correctly calculate
    metrics for network events, no matter where they occur
Pain Point / Challenges Benefits of a Gigamon Visibility Fabric
Low utilization links are unmonitored Budget pressures or changes from the original network design can leave links unmonitored, reducing the value of the NPM solution. With a Visibility Fabric:

  • All network links can be monitored from a central location, increasing visibility while reducing CAPEX
NPM analyzer becomes oversubscribed With aggregation of network links or network speed upgrades, line-rate traffic can oversubscribe the analysis tool. A Visibility Fabric:

  • Intelligently load balances selected traffic from high volume or high speed links across multiple NPM analyzers
  • Redistributes traffic if a tool fails within a load balanced group
Big Data can make NPM analysis more difficult Big Data environments mean higher speed network links and higher core network speeds, which make it difficult to monitor at the packet level. A Visibility Fabric:

  • Allows full conversations on 40Gb and 100Gb links to be sampled for analysis through use of the GigaSMART® FlowVUE™ application
Pain Point / Challenges Benefits of a Gigamon Visibility Fabric
Failure of an inline tool can bring down the production network If there is even a minor device failure, such as a fan or power supply, the production network will drop the secured link when they fail, or when the device is replaced. A Visibility Fabric:

  • Can be configured to allow the link to stay up even if the appliance fails or loses power
  • Allows the analyzer to be replaced because of failure or maintenance without breaking the production network link and bringing the network down
  • Increases link reliability by supporting hot or secondary standby devices
Higher speed inline tools are unavailable or beyond the budget Upgrades to 10Gb or higher speed line rate can create challenges for inline tools. In some cases, line-rate analyzers are not available, or if they are, the price can be cost-prohibitive and they still may be unable to process full line-rate speeds. With a Visibility Fabric:

  • Lower speed tools can perform in higher speed network environments, extending their lifespan, and increasing tool ROI
  • You can load balance higher speed traffic across multiple lower speed links to ensure tools will not drop packets
Too many links to be monitored Network growth and proliferation mean there is often too much network to fully instrument. By using a Visibility Fabric:
Security requires fast, flexible traffic access In the face of today’s rapidly evolving threat profiles, waiting for a maintenance window can be too late. With a Visibility Fabric:

  • Traffic flows can be viewed and changed immediately, since Flow Mapping® does not impact the production network
Pain Point / Challenges Benefits of a Gigamon Visibility Fabric
Limited storage capacity means traffic is not kept long enough to be effective Collecting packets from multiple points creates duplicates that take up unnecessary space and storing all traffic can include space-eating backups and other unimportant traffic. With a Visibility Fabric:

  • You can remove duplicate packets, reducing space by up to 95% better utilizing capacity so traffic can be retained longer*
Not all traffic is necessary for later viewing Forensic recorders typically capture traffic that is unnecessary for forensics, such as printer service broadcasts, router updates, and other types. By using a Visibility Fabric:

  • You can discard unwanted traffic before it is recorded, allowing a greater amount of relevant traffic to be stored
Storing sensitive traffic risks compliance efforts

*Based on internal Gigamon tests.
Storing credit card numbers and other sensitive data places compliance efforts at greater risk. A Visibility Fabric:

  • Allows sensitive data to be removed before it enters the monitoring environment, helping prevent compliance breaches
Pain Point / Challenges Benefits of a Gigamon Visibility Fabric
Analyzer only needs traffic relevant to CEM Only specific traffic is relevant to a CEM analyzer. By intelligently filtering traffic being sent to the CEM, a Visibility Fabric:

  • Increases functional bandwidth, increasing the tool’s efficiency
Duplicate packets reduce accuracy and reliability Gathering traffic from multiple collection points almost always results in duplicates. By removing duplicates, a Visibility Fabric:

  • Off-loads CPU-intensive de-duplication, increasing CEM performance
  • Increases accuracy of analysis, since more valid packets are kept
CEM analyzer becomes oversubscribed With traffic aggregation and network upgrades to higher speed links, line-rate traffic can oversubscribe a CEM analysis tool. A Visibility Fabric:

  • Intelligently load balances selected traffic from multiple links or high speed links across multiple CEM analyzers or multiple CEM NICs
  • Redistributes traffic if a tool fails within a load balanced group
Monitoring must be agile With easily relocated Cloud services and evolving web presence resources, waiting for a maintenance window to make changes in your monitoring profile is not agile enough. With a Visibility Fabric:

  • You have more control over your monitoring profile, since traffic flows can be changed dynamically, without having to wait for the next change management window

Look closer to view our Ecosystem Partners

FILTER BY

All Ecosystem Partners
  • All Ecosystem Partners
  • Application Performance Monitoring (APM)
  • Network Performance Monitoring (NPM)
  • Security and Vulnerability Management
  • Network Forensics/Big Data Analytics
  • Customer Experience Management Monitoring (CEM)
 

Gigamon works with a variety of infrastructure and technology innovators providing a comprehensive visibility platform to support best-of-breed monitoring, management and security.

APM is the translation of IT metrics into business meaning. APM solutions provide IT with the view of how applications running on the network are performing and where there could be problems.

NPM is the translation of metrics into a unified view of network health that identifies problems are that are occurring in the network. While SNMP and flow protocols may be used to identify if there is a problem, NPM requires packet-level access obtained from TAPs, SPANs, or inline devices to identify what the problem is.

Perimeter inline tools such as a firewall or an Intrusion Prevention System (IPS) actively stop threats before they enter the network. There are two potential concerns around this strategy: any failure of the device will take down the link, and it only addresses perimeter threats. Out-of-band security, such as Intrusion Detection Systems (IDS), monitors for and identifies threats within the network by mirroring network traffic to an out-of-band security appliance.

Forensic/network recorders capture and store all traffic so that it can be analyzed later. This can be used to investigate security attacks, and network or application performance issues. Recorders store a set amount of data, keeping only the most recent traffic.

CEM solutions allow users to track end-user experience and web presence, in order to ensure proper performance.


Gigamon | Partner | Argyle Data
 

Argyle Data is the leader in real-time fraud and security analytics at network speed and Hadoop scale offering solutions for the largest data-driven companies in mobile communications and financial services. Argyle Data offers a real-time fraud and security analytics application built from the ground up on Hadoop using the latest big data, machine learning and anomaly detection technology proven at Facebook and Google. It is able to detect fraud not detected by existing systems, discover fraud in minutes vs. days, discover both new and old fraud attack techniques and dramatically reduce false positives.

Learn more about Argyle Data
Gigamon | Partner | Astellia
 

Astellia is a leading provider of network and subscriber intelligence enabling mobile operators to drive business performance and customer experience. Astellia’s vendor-independent real-time monitoring and troubleshooting solution covers end-to-end 2G, 3G and 4G from radio access to core network. Astellia’s scalable products and expert services address the needs of operators’ full value chain: CEM, network performance, customer care, marketing and commercial.

Learn more about Astellia
Gigamon | Partner | CA Technologies
 

CA Technologies is the market-leading provider of enterprise application management solutions

CA Technologies is an IT management software and solutions company with expertise across all IT environments – from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems.

Learn more about CA Technologies
Gigamon | Partner | CABLExpress
 

CABLExpress® is a manufacturer of high-performance cabling and data center infrastructure products and structured cabling solutions. The CABLExpress Skinny-Trunk® Solution is a comprehensive, high-density fiber optic product line that saves space and installation time while future-proofing a data center's infrastructure.

Learn more about CABLExpress
Gigamon | Partner | Cisco
 

Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.

The concept of solutions being driven to address specific customer challenges has been with Cisco since its inception. Husband and wife Len Bosack and Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices located in different buildings but were unable to due to technological shortcomings. A technology had to be invented to deal with disparate local area protocols; and as a result of solving their challenge - the multi-protocol router was born.

Since then Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors and ecosystem partners and has become the worldwide leader in networking - transforming how people connect, communicate and collaborate.

Learn more about Cisco
Gigamon | Partner |Corning
 

Corning Cable Systems offers a broad range of end-to-end fiber optic solutions for customers' telecommunications networks. Our customer-focused solutions include cables, connectors, and related hardware, and network services that include network design, project management, installation and maintenance, equipment rental and training programs.

Learn more about Corning
Gigamon | Partner | Corvil
 

Corvil is the IT data analytics company for business in the NowTM. The Corvil streaming analytics platform transforms IT data into real-time operational intelligence to provide an order of magnitude improvement in the speed to see, understand and act on business as it’s happening. Corvil provides the full picture of customers, business and IT infrastructure all interacting together in real-time. It does this by making sense of the raw IT data streaming through the network, enriching it with analytics and making it accessible, searchable and consumable. Corvil is built to handle the low-latency, high-performance and big data analytics requirements for the world’s most demanding real-time businesses. It is used to monitor billions of transactions per day and is trusted to provide real-time operational analytics that powers decision and action in the Now.

Learn more about Corvil
Gigamon | Partner |Cyphort
 

Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort’s software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization’s virtual, physical and cloud infrastructure against sophisticated attacks. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in San Jose, California.

Learn more about Cyphort
Gigamon | Partner | Damballa
 

Damballa is a pioneer in the fight against cybercrime. Damballa provides advanced threat protection solutions that hunt for hidden infections in corporate, telecommunications and internet service provider networks. Damballa provides the only network security solution that detects both criminal command-and-control (C&C) behaviors and inbound malware to immediately pinpoint active infections. Patent-pending solutions from Damballa protect networks with any type of server or endpoint device including PCs, Macs, Unix, smartphones, mobile and embedded systems. Protecting over 125 million endpoints worldwide Damballa customers include mid-size and large enterprises in every major market. Privately held, Damballa is headquartered in Atlanta.

Learn more about Damballa
Dynatrace
 

Dynatrace is the new generation of application performance management. Our passion is to enable our 5,700 customers, large and small, to see their applications and digital channels through the lens of end-users. Customers use these insights to master application complexity, gain strategic intelligence, and relentlessly improve their users’ experiences.

Learn more about Dynatrace
Gigamon | Partner | E8 Security
 

E8 Security enables enterprises to defend against targeted cyber attacks and insider threats by detecting behavioral anomalies of compromised systems and user credentials. E8 Security’s unique machine learning-based anomaly detection and analytics technology identifies attackers activities inside the enterprise perimeter without the need for pre-configured rules or signatures. E8 Security’s self-learning technology, automated incident analysis, and risk prioritized intelligence enables faster detection and response to targeted attacks; thus reducing the compromise time window from weeks or days to minutes. Built with Big Data technologies such as Hadoop, Spark, and HBase, E8 Security can scale to petabytes of data, providing a scalable analytics platform for long term data security storage, predictive analytics, and retrospective analysis.

Learn more about E8 Security
Gigamon | Partner | Empirix
 

Empirix is the recognized leader in end-to-end network performance visibility with the unique ability to analyze customer behaviors by application in real time. Empirix helps service providers, mobile operators, contact centers, and businesses master complexities and optimize business processes to reduce operational costs, maximize customer retention, and grow top-line revenue. Through testing, monitoring, analytics and intelligence, Empirix helps companies around the world realize the full value of their technology investments.

Learn more about Empirix
Gigamon | Partner | ExtraHop Networks
 

ExtraHop Networks is a leading provider of network-based application performance management (APM) solutions. The ExtraHop Application Delivery Assurance system performs the fastest and deepest analysis in the industry, achieving real-time transaction monitoring at speeds up to a sustained 10Gbps in a single appliance and application-level visibility with no agents, configuration, or overhead. The ExtraHop system quickly auto-discovers and auto-classifies applications and devices, delivering immediate value out of the box. ExtraHop Networks provides award-winning solutions to companies across a wide range of industries, including ecommerce, communications, and financial services. The privately held company was founded in 2007 by Jesse Rothstein and Raja Mukerji, engineering veterans from F5 Networks and architects of the BIG-IP v9 product. Follow us on Twitter @ExtraHop. For more information, visit www.extrahop.com.

Learn more about ExtraHop Networks:Network Troubleshooting and Application Performance Improvement
Gigamon | Partner |Fire Eye
 

Stealth Malware Security & Botnet Protection Systems:

FireEye provides the only global, anti-botnet protection system to combat botnets and targeted, stealthy malware. FireEye protects organizations against botnets to prevent customer data, intellectual property, and company resources from being compromised and stolen as a result of unauthorized remote control of PCs and servers. Our solutions bring advanced network security together with state-of-the-art virtualization technology to combat targeted malware as well as its criminal attack vector of choice—botnets.

Learn more about Fire Eye: Stealth Malware Security & Botnet Protection Systems
Gigamon | Partner | ForeScout Technologies
 

ForeScout enables its customers to unleash the full power of their network through enterprise-class security and control. ForeScout’s automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because ForeScout security solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by more than 1,000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide.

Learn more about ForeScout Technologies
Gigamon | Partner |Imperva
 

Imperva - The Leader in Data Security

More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user.

Learn more about Imperva - The Leader in Data Security
JDSU
 

JDSU offers Intelligent Data Capture and Analysis

JDSU and Gigamon have collaborated to provide a high-performance network forensics solution and a dynamic and scalable monitoring infrastructure for comprehensive traffic visibility across the network. The joint solution is able to decrease troubleshooting time and improve time to market by combining the intelligent data-capture and high-performance search capabilities from JDSU with the high-availability, high-density Visibility Fabric™ architecture from Gigamon.

Learn more about JDSU
Gigamon | Partner | Lancope
 

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of network telemetry, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.

Learn more about Lancope, Inc.
Lastline
 

Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline’s technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide.

Learn more about Lastline
Gigamon | Partner | LiveAction
 

LiveAction is award-winning software designed to simplify network management. Initially developed to aid the U.S. Department of Defense in the operation of its networks, LiveAction features an innovative visual display, real-time big data analytics for decision making and deep integration with routers and switches for unparalleled network control. LiveAction accelerates troubleshooting with its QoS control, application-aware, and WAN functionality developed in collaboration with Cisco Systems.

Learn more about LiveAction
Logrhythm
 

LogRhythm is the largest and fastest growing independent provider of next generation Security Analytics. The company’s patented, award-winning technology combines enterprise-class SIEM, Log Management and File Integrity Monitoring with Host and Network Forensics, in a highly scalable, fully integrated solution. LogRhythm empowers organizations around the globe to detect today’s most sophisticated cyber threats and breaches faster and with greater accuracy than ever before.

Learn more about Logrhythm
Gigamon | Partner | Lumeta
 

Lumeta’s network situational awareness platform is the authoritative source for enterprise network infrastructure and cybersecurity analytics. Available for both real-time monitoring and point-in-time auditing, Lumeta recursively indexes a network to identify and map every IP connected device, as well as uncover inbound and outbound leak paths. The foundational intelligence provided by Lumeta gives IT management a clear, comprehensive assessment of network vulnerabilities, cyber threat risks and policy violations from network edge to core. Also, Lumeta optimizes other network and security product investments by feeding them accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world.

Learn more about Lumeta Corporation
Gigamon | Partner | NetFort
 

NetFort LANGuardian is software for investigating, monitoring, and reporting on network activity. Organizations of all sizes use LANGuardian for forensics, security, and troubleshooting. Its browser-based interface provides amazing visibility into application, file-share, and web activity on your network. Unlike similar solutions, its ability to integrate with directory services enables LANGuardian to report on the activity of individual users. LANGuardian is quick to install and easy to manage because it gathers information from network traffic and does not require client software.

Learn more about NetFort
NetQuest
 

NetQuest Corporation designs, manufactures and markets innovative monitoring access products for applications in telecommunications service provider, government, and enterprise networks. Founded in 1987 and based in Mount Laurel, New Jersey, NetQuest is privately held and operates under the original management team.

Learn more about NetQuest
Gigamon | Partner | NetworkInstruments
 

Network Instruments is a leader in network and application performance management solutions for enterprises worldwide. Known for uniquely efficient single platform solutions, the company provides products that optimize performance and speed problem resolution, helping ensure delivery of critical applications. Network Instruments delivers these benefits through a seamlessly integrated line of software and hardware systems that are precision engineered for exact monitoring and analysis. Seventy of the Global Fortune 100 companies rely on Network Instruments solutions to guarantee performance across the cloud, virtual, 10 Gb, and 40 Gb environments.

Learn more about NetworkInstruments:Application Aware Network Performance Monitoring Excellence
Gigamon | Partner | NIKSUN
 

NIKSUN is the recognized worldwide leader in making the Unknown Known. The company develops a highly scalable array of real time and forensics-based cyber security and performance management solutions for large enterprises, government & intelligence agencies, service providers and financial services companies. NIKSUN’s award winning enterprise solutions deliver unprecedented flexibility and packet capture power. The company’s patented real-time analysis and recording technology is the industry’s most comprehensive solution for secure and reliable network infrastructure and services. NIKSUN, headquartered in Princeton, New Jersey, has sales offices and distributors throughout the US, Europe, the Mid East and Asia-Pacific.

Learn more about NIKSUN
Gigamon | Partner |Palo Alto Networks
 

Palo Alto Networks™ next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at 20 Gbps network throughput levels. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can, for the first time, embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation.

Learn more about Palo Alto Networks - Application visibility, application control and threat prevention
Gigamon | Partner | Plixer
 

Plixer International, Inc. is a leading threat detection and forensic evidence provider focused at engineering the very best system for uncovering unwanted communication behaviors. Rather than depending on packet signatures, their strategy uncovers unwanted communications by leveraging NetFlow, IPFIX, sFlow and other derivatives. The company was built by network and system engineers who understand the need for scalable distributed collection solutions that meet the dynamic demands of security and network professionals.

Learn more about Plixer
Gigamon | Partner |Reservoir Labs
 

Reservoir Labs is a privately held technology and solutions company headquartered in New York City that’s earned the trust and respect of commercial customers, government customers and top-tier researchers around the globe. Our team of experts conducts thought-leading research, develops novel technologies, and creates highly useful advanced computing and communications products that serve the security and communications needs of Reservoir’s commercial and government customers.

Learn more about Reservoir Labs
Riverbed
 

Riverbed delivers performance for the globally connected enterprise. With Riverbed, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery, without fear of compromising performance.

Riverbed Cascade provides customers with cost-effective, application-aware network performance management that enables end-to-end visibility into the performance of critical business applications. Cascade integrates unified service monitoring with deep packet capture and analysis for proactive alerting and accelerated network troubleshooting. It also discovers and maps application dependencies, which is essential to building accurate service dashboards as well as accelerating planning for consolidation, virtualization, disaster recovery, and cloud projects.

Learn more about Riverbed
RSA
 

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.RSA.com and www.EMC.com

Learn more about RSA
SevOne
 

Founded in 2005, SevOne is headquartered in Wilmington, Delaware, SevOne provides the world’s most scalable performance monitoring platform to the world’s most connected companies. SevOne’s patented architecture, the SevOne Cluster™ leverages distributed computing to effectively collect millions of key performance indicators and to provide proactive alerts when performance deviates from normal. SevOne’s platform provides a single source of truth for future-ready customers including global enterprises, finance and healthcare companies, CSPs, MSPs and MSOs.

Learn more about SevOne
Sideband Networks
 

Sideband Networks delivers Network Intelligence through analytics to solve Live Connectivity Issues. Sideband takes a Live and Dynamic View approach, which is the first step in allowing the Net Ops teams to target intermittent problems that have plagued and evaded them. The Sideband solution uses advanced analytics to see, tag and stop these persistent and intermittent problems. Advanced visibility into layers 2-7 allows Sideband’s technology to intercept problems as they occur, and in some cases, proactively notify the users to avert connectivity failures. By working side-by-side with its customers, Sideband has become a trusted partner and innovation leader in Live Connectivity Intelligence.

Learn more about Sideband Networks
Gigamon | Partner | Sinefa
 

Sinefa is inspiring change in how customers experience the network by enabling service providers to deliver high quality network services. While maintaining pace with data and device explosion. Deployed as software at the network core or as customer premises hardware, Sinefa is architected for multi-tenancy, speed and scale, supporting thousands of subscribers and locations, at multi-gigabit speeds with an ultra-low deployment effort. Through patent pending technologies, cloud-based centralized management and 1 second viewing resolution, Sinefa delivers ground breaking visibility for any fixed, broadband or mobile network.

Learn more about Sinefa
Gigamon | Partner | SolarWinds
 

SolarWinds’ (NYSE: SWI) mission is to provide purpose-built products that are designed to make IT professionals’ jobs easier. We offer value-driven products and tools that solve a broad range of IT management challenges—whether those challenges are related to networks, servers, applications, storage or virtualization. Our company was built by network and systems engineers who know what it takes to manage today’s dynamic IT environments and we strive every day to deliver powerful functionality that is easy to use.

Simply put, we work to: Eliminate the complexity found in traditional enterprise software – making it easier to find, buy, deploy and maintain; connect with our community – using daily interactions with our large, global user community to guide our product development and strategy; and constantly evolve our products – ensuring that our software is on point to meet the most important problems that IT Pros have today, and continues to deliver increasing value over the lifetime of ownership.

Learn more about SolarWinds
Gigamon | Partner | Sourcefire
 

Sourcefire, now part of Cisco, is a world leader in intelligent cybersecurity solutions. Together with Cisco, Sourcefire provides a broad portfolio of integrated solutions that deliver unmatched visibility and continuous advanced threat protection across the entire attack continuum, allowing customers to act smarter and more quickly—before, during, and after an attack. Sourcefire’s innovation in open source security, as well as commercial next-generation network security platforms and advanced malware protection solutions has been trusted for more than 10 years. Sourcefire has earned a reputation for innovation, consistent security effectiveness and world-class research all focused on detecting, understanding and stopping threats.

Learn more about Sourcefire
Gigamon | Partner | Spirent
 

At Spirent Communications we work behind the scenes to help the world communicate and collaborate faster, better and more often. The world’s leading communications companies rely on Spirent to help design, develop and deliver world-class network, devices and services. Spirent’s lab test solutions are used to evaluate performance of the latest technologies. As new communication services and applications are introduced in the market, Spirent provides tools for service management and field test to improve troubleshooting and quality. Spirent also enables enterprises, institutions and government agencies to secure and manage their networks.

Learn more about Spirent
Gigamon | Partner |Splunk
 

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data"—generated by websites, applications, servers, networks, mobile devices and all the sensors and RFID assets that produce data every second of every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records—and more—Splunk turns machine data into valuable insights no matter what business you're in. It's what we call Operational Intelligence.

Learn more about Splunk
Gigamon | Partner |Tealeaf
 

Tealeaf is the leading provider of online customer experience management solutions and the unchallenged leader in customer behavior analysis. Tealeaf's CEM solutions include both a customer behavior analysis suite and customer service optimization suite. For organizations that are making customer experience a top priority, these solutions provide unprecedented enterprise-wide visibility into every visitor's unique online interactions for ongoing analysis and web site optimization. Online executive stakeholders from ebusiness and IT to customer service and compliance are leveraging Tealeaf to build a customer experience management competency across the organization.

Learn more about Tealeaf the leader in Customer Experience Management Solutions
Gigamon | Partner | The Now Factory
 

Today’s acquisition also complements the IBM MobileFirst Analytics portfolio, which is designed to enhance the way organizations analyze mobile device usage to provide exceptional customer experiences.

Using The Now Factory’s software, CSPs can gain real-time insights into their customers by analyzing massive quantities of network and business data. With this type of insight, CSPs can provide an enhanced quality of service to their customers by better managing negative experiences and network outages.

Learn more about The Now Factory:An IBM Company
Gigamon | Partner | Trend Micro
 

Trend Micro Deep Discovery: Your Custom Defense against APTs and targeted attacks. The industry's first advanced threat protection solution that enables businesses and government agencies not only to detect and analyze advanced persistent threats (APTs) and targeted attacks, but also to rapidly adapt their protection and respond to these attacks. Custom Defense integrates software, global threat intelligence, and specialized tools and services to deliver a customized and comprehensive solution for businesses and government.

Learn more about Trend Micro
Gigamon | Partner | Trustwave
 

Trustwave is a leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper® compliance management software and other proprietary security solutions including SIEM, EV SSL certificates and secure digital certificates. Trustwave has helped hundreds of thousands of organizations-ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers-manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit: www.trustwave.com

Learn more about Trustwave
Vasona Networks, Inc.®
 

Vasona Networks, Inc. Works with global mobile network operators to improve RAN performance and deliver better subscriber experiences. The company's pioneering edge application controller, the SmartAIR1000, takes a holistic approach to addressing mobile network data traffic congestion that occurs in each cell, monitoring every application demanding bandwidth. With this visibility, Vasona Networks' RateControl technology allocates bandwidth by precise determination of user needs and experiences. Vasona Networks is based in Santa Clara, California.

Learn more about Vasona Networks, Inc.
Gigamon | Partner | Velocimetrics
 

Velocimetrics delivers comprehensive, real-time business insight to the global financial community. Designed by industry experts to meet the specific monitoring and performance analysis needs of each firm’s complex environments, Velocimetrics provides an independent, transparent and detailed view of the business impact of all activities taking place across each and every system and network as they are happening.

By rapidly detecting potential risks, identifying inefficiencies and exposure to financial loss, Velocimetrics instantly alerts the business to issues that could adversely impact success as a situation is emerging, before it’s too late.

Learn more about Velocimetrics
Gigamon | Partner |VMware
 

VMware, the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware’s approach accelerates the transition to cloud computing while preserving existing investments and improving security and control. With more than 300,000 customers and 25,000 partners, VMware solutions help organizations of all sizes lower costs, increase business agility and ensure freedom of choice.

Learn more about VMware
Gigamon | Partner | Websense
 

Websense, Inc. is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.

Learn more about Websense, Inc.
WildPackets
 

WildPackets is the leading provider of network, VoIP, and application performance monitoring, analysis, and troubleshooting solutions.

WildPackets develops hardware and software solutions that drive network performance, enabling organizations of all sizes to analyze, troubleshoot, optimize, and secure their wired and wireless networks. WildPackets products are sold in over 60 countries and deployed in all industrial sectors. Customers include Chrysler, Motorola, Nationwide, and over 80 percent of the Fortune 1000.

Learn more about WildPackets
Gigamon | Partner | Wireshark
 

Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.

Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.

Learn more about Wireshark
SHARE