Traffic Intelligence

There’s a reason we’re the leader. It’s all in the intelligence.

Designed for Intelligence from Start to Finish

Gigamon has designed a truly comprehensive traffic intelligence solution – from the physical appliance to the operating system to the application layer.

Starting at the physical layer, GigaVUE® Visibility Appliances collect, filter and process network traffic at high speeds from across your infrastructure. The underlying software operating system, GigaVUE-OS, helps to efficiently distribute traffic and secure your infrastructure while the industry-leading GigaSMART® traffic intelligence applications optimize traffic monitoring and analysis.

With GigaSMART traffic intelligence, you can selectively deliver the right traffic to the right security and network traffic monitoring tools, both inline and out of band. Gigamon offers a next-generation network packet broker (NPB) that uses traffic intelligence to deliver optimized traffic to the tools. The resulting benefit: Improve the overall ROI of your security and monitoring tools, deploy security initiatives faster and stop tool sprawl.

Effectively Expose Hidden Threats in Encrypted Traffic

Secure your networks against data breaches and encrypted malware with SSL/TLS decryption powered by GigaSMART® technology.

GigaSMART® is a comprehensive set of technologies that extend the intelligence and value of the Gigamon Platform by enhancing the monitoring of your network infrastructure and improving security and network traffic monitoring tool performance. The GigaSMART applications increase ROI of your inline and out-of-band security and monitoring tools. A range of applications are available, including:  

  • De-duplication, Packet Slicing and Application Session Filtering: Eliminate unnecessary traffic analysis of irrelevant data.
  • Masking: Hide confidential data to help meet compliance requirements.
  • SSL Decryption: Offload the processor-intensive task of SSL decryption from your tools so they can focus on specialized security and monitoring functions.
  • Metadata and NetFlow IPFIX Generation: Feed high-fidelity metadata to your security information and event management systems (SIEMs), network monitoring and application performance tools to dramatically improve productivity.

GigaVUE-OS enables the appliance to do more than just send aggregated traffic to tools. It provides:

  • Flow Mapping®: Sends network traffic through a set of user-defined map rules to the tools and applications that secure, monitor and analyze your network.
  • GigaStream®: Load balances traffic across monitoring and security tools to reduce tool oversubscription.
  • Logical Bypass: Detects failures proactively and forwards traffic either to other tools or to the network.

GigaVUE Visibility Appliances range in capacity to address the increasing volumes of data and network speeds.  Features support and complement an integrated and intelligent approach to security and network monitoring with:

  • Inline Bypass: Helps to maintain security and performance in the event of a failure. In addition, removing, upgrading or adding tools has little to no impact on network performance and no longer requires waiting on maintenance windows.
  • GigaSMART: Provides traffic intelligence applications through a physical module or built-in functionality on the visibility appliance.
GigaVUE Visibility Appliances photo


Harnessing the Power of Metadata

Learn how Metadata Generation separates signals from noise and reduces time-to-threat detection.


Rethinking Network Security Deployment

A structured and architectural approach gives security solutions access while enabling them to scale cost effectively.


Intelligent Flow Mapping

Select, modify and replicate traffic and forward it to security and monitoring tools.

Training: GigaSMART

Learn how to further optimize security and monitoring tool effectiveness with GigaSMART applications.

Excited man photo

Inline Bypass: Remove the Single Point of Failure from Your Network

Maintain network performance by deploying an inline bypass protection solution which acts as a fail-safe access port for inline security tools.

Have Questions?

We're here to help you find the right solution for your business.

Related Pages

Visibility Analytics and Fabric


Visibility and Analytics Fabric

Deliver a smarter, more proactive approach to monitoring and security.




Optimize traffic sent to your tools.

Flow Mapping


Flow Mapping

Granular filtering and forwarding.

digital transformation


Drive Digital Transformation

Don't let application complexity impact your business.