Rethink Security

Cybercriminals are always trying something new. Are you?

A More Resilient, Responsive and Secure Infrastructure

Security operations teams now face greater challenges in combatting cyberattacks due to insufficient time for threat inspection, the ever-increasing speed of network data and the vast number of attackers and resources available to breach defenses and propagate undetected across most networks.

Traditional defenses are increasingly ineffective and hampered by limited visibility into network traffic, extraordinary costs and reliance on manual processes to address incidents. A new approach to network security is needed. One that begins with the Defender Lifecycle Model.

Designed to automate and accelerate the identification and mitigation of threats, the Defender Lifecycle Model enhances security across all infrastructures – on premises, virtual and cloud.  

Focused on a foundational layer of visibility into network traffic and four key pillars – prevention, detection, prediction and containment – this model integrates machine learning, artificial intelligence (AI) and security workflow automation to shift control and advantage away from the attacker and back to the defender. In short, it addresses every modern security challenge an organization faces.

How a Next-Gen Network Packet Broker Improves Security

Defender Lifecycle Model

The Defender Lifecycle Model enables organizations to integrate security technologies that prevent, detect, predict and contain threats throughout your network. It's a model that moves the advantage from the attacker back to the defender by integrating machine learning and AI-based technologies and automating security workflows. Security professionals can map out the role of security technologies involved in the threat “kill chain,” gain a better understanding of overall security readiness and strengthen their organization’s overall security risk posture.

Continuous visibility into network traffic is imperative to provide a collaborative, adaptive security posture. The GigaSECURE® Security Delivery Platform provides this necessary visibility by accessing all your network data of interest and sending it to the appropriate security tools to expose potential threats. By deploying GigaSECURE as the foundation for this model, you can reclaim the advantage and shift control.


GigaSECURE empowers the right inline security tools – such as the Cisco Intrusion Prevention System (IPS), the FireEye Advanced Threat Prevention (ATP) solution and the Imperva Web Application Firewall (WAF) – to see, secure and prevent intrusions within growing network traffic and software upgrades. It brings threat traffic to the front of the line, offload decryption and boosts resiliency to help make your network more accurate, efficient and economical.

To maximize threat prevention while maintaining network availability, GigaSECURE offers Inline Bypass Protection.

Inline bypass acts as a fail-safe access port for inline security tools. As of now, inline security tools can be single points of failure in a network. If a tool loses power, has its software fail or is taken offline for updates, traffic can no longer flow through this protective link. And failing inline tools can disrupt the very applications and services they are meant to protect.

Inline bypass removes any failure points by automatically switching traffic via bypass mode – keeping critical network traffic and protection up and running.


For most security teams, there’s simply too little time and too few resources to efficiently gather the information needed to make accurate predictions on potential security threats.  

To effectively detect threats throughout the IT environment, organizations deploy a variety of security and monitoring solutions. But how do you ensure that your tools are receiving the right information? 

Security and monitoring tools must ingest specific types of data to assess the network for threats. For example, security incident and event management (SIEM) systems consume metadata, whereas data loss prevention (DLP), intrusion detection systems (IDS) and advanced threat protection (ATP) tools require packet data.

The Gigamon solution enables security operation teams to both generate metadata and gain packet-level visibility to ensure an effective detection posture across the enterprise.


Security at the Speed of the Network

Address security challenges with the GigaSECURE Security Delivery Platform.


Scaling Inline Threat Prevention Tools

Improve your security posture without sacrificing network performance. 


Clemson University

Learn how Clemson University improved security without jeopardizing the speed and efficiency of its network.

Training: The New Security Model

Traditional network security methods can't keep up with increasing number of threats. Learn how a prevention-based model can protect you from cyberattacks.

Man looking at a phone
BlackHat logo

“The performance of the GigaSECURE Security Delivery
Platform has been exceptional. I don’t even know where the
ceiling is because we haven’t even come close to hitting it.
Everything that we’ve wanted to do with the company’s solution,
we’ve been able to do.”

Neil R. “Grifter” Wyler • Network Operations Center Lead • Black Hat

Have Questions?

We're here to help you find the right application visibility solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Products and Solutions

Visibility Analytics and Fabric


Visibility and Analytics Fabric

Deliver a smarter, more proactive approach to monitoring and security.




Single pane-of-glass orchestration and management.

threat prevention


Threat Prevention

Stop intrusions before they start.


Threat Detection


Threat Detection

Give tools what they need to detect threats.