Our Technology Alliance Partners solve customer problems with best of breed solutions for network security, performance monitoring, experience management and compliance. Gigamon and our partners seek to provide the most flexible and efficient joint solutions that allow you to maximize the effectiveness of your investment.
(Click the logo to find out more about our Technology Partners)
Featured Technology Partners
Security and Vulnerability Management
Network Performance Management
The world’s best engineering teams rely on New Relic to visualize, analyze and troubleshoot their software. New Relic One is the most powerful cloud-based observability platform built to help organizations create more perfect software. Learn why developers trust New Relic for improved uptime and performance, greater scale and efficiency, and accelerated time to market at newrelic.com.
CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network.
Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates approximately 6 trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches.
Trinity Cyber offers a breakthrough preventive control that neutralizes hacking techniques and transforms malicious content inflight at line speed. Gigamon provides the inline traffic acquisition and filtering that empowers Trinity Cyber’s ability to scan and manipulate full session Internet traffic at the application layer to defeat hacking techniques before they reach their destination.
Google Cloud’s locations underpin all of the important work we do for our customers. From redundant cloud regions to high-bandwidth connectivity via subsea cables, every aspect of our infrastructure is designed to deliver your services to your users, no matter where they are around the world. Google Cloud’s global network of data centers—among the world’s most secure and energy-efficient facilities—run your services 24x7 with the highest possible speed and reliability. Our data centers employ layered security and built-in redundancy and fault tolerance, and strictly limit employee access. With a highly provisioned, low-latency network—the same network that powers products like Gmail, Google Search, and YouTube—your traffic stays on Google’s private backbone for most of its journey, ensuring exceptional user experience and high performance.
Oracle offers suites of integrated applications plus secure, autonomous infrastructure in the Oracle Cloud. For more information about Oracle (NYSE: ORCL), please visit us at oracle.com
Telchemy® is the global leader in analytics technology for real-time applications and multimedia IoT with its VQmon®, Embiot®, DVQattest®, SQprobe® and SQmediator® families of service quality monitoring and analysis products. Telchemy pioneered the use of embedded analytics technology and the application of big data for VoIP and Video performance management, and is positioned to be a leading provider of analytics technology for the emerging IoT market. Founded in 1999, the company has products deployed worldwide and markets its technology both directly and through many leading networking, test and management product companies.
Security Onion Solutions, LLC
We are the builders of Security Onion, a free Linux distribution for threat hunting, enterprise security monitoring, and log management. It includes Suricata, Zeek, Wazuh, Elastic Stack, and many other security tools. Security Onion Solutions offers hardware appliances, support, and professional services centered around the Security Onion platform, and is the only provider of official Security Onion training.
Ocient is a leading hyperscale data analytics solutions company that enables organizations to unlock value from trillions of data records at performance levels and costs previously unattainable. Leading organizations around the world trust Ocient’s team of industry experts to design and deploy complex solutions that fast-track new revenue opportunities, streamline operations, and improve security on 5-10x more data while reducing their storage footprint by roughly 80%. Ocient’s pilot-to-production solutions are rapidly deployed on-prem or in the cloud with little to no resource-intensive integration. Ocient is a carbon-neutral company, headquartered in Chicago, and backed by leading investors including Greycroft, In-Q-Tel and OCA Ventures. For more information, please visit www.ocient.com
Axellio Inc. is a leading innovator in high-performance network packet capture, storage, and analysis solutions. Axellio was spun-out in 2018 from an earlier company with a twenty-year legacy of innovation in enterprise IT high-performance storage solutions for commercial enterprise as well as aerospace and defense agencies. Axellio developed a unique solution for the most challenging problem in network and security operations: how to capture packets both economically and reliably for detailed analysis while providing efficient access to the data.
Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for our customers. Our suites uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world. Over 24,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match.
Armis® is the leading agentless, enterprise-class device security platform designed to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust our real-time and continuous protection to see and control all managed, unmanaged, and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides passive and unparalleled asset inventory, risk management, and detection & response. Armis is a privately held company and headquartered in Palo Alto, California.
Medigate is the industry’s first and leading dedicated medical device security and asset management platform, enabling providers to deliver secure, connected care. Medigate fuses the knowledge and understanding of medical workflow and device identity and protocols with the reality of today’s cybersecurity threats. With Medigate, hospital networks can safely operate all medical devices on their network, enabling deployment of existing and new devices to patients while ensuring privacy and safety.
vArmour is the leading provider of Application Relationship Management. Enterprises around the world rely on vArmour to control operational risk, increase application resiliency and secure hybrid clouds — all while leveraging the technology they already own without adding costly new agents or infrastructure. Based in Los Altos, CA, the company was founded in 2011 and is backed by top investors including Highland Capital Partners, AllegisCyber, Redline Capital, Citi Ventures, and Telstra.
Venafi is the cybersecurity leader of machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating keys and certificates for SSL/TLS, code signing, mobile and SSH.
At a time when companies must deal with a multivendor, multicloud and multidevice ecosystem, Viewtinet provides the most advanced cross solution for all the different data sources in real-time within a single panel view.
Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection and deep operational insights for OT and IoT environments. Customers rely on us to minimize risks while maximizing resilience.
Ordr delivers actionable artificial intelligence (AI)-based systems control engine for the hyper-connected enterprise, providing complete visibility and exhaustive control over every class of connected device and system. The Ordr Systems Control Engine is purpose-built to fully map the device flow genome at massive scale, to continuously inspect, classify and baseline the behavior of every device.
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform delivers the agility, pay-as-you-grow economics and operational simplicity of the public cloud, without sacrificing the predictability, security and control of on- premises infrastructure. Nutanix solutions leverage web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution that delivers any application at any scale. Learn more.
Argyle Data is the leader in real-time fraud and security analytics at network speed and Hadoop scale offering solutions for the largest data-driven companies in mobile communications and financial services. Argyle Data offers a real-time fraud and security analytics application built from the ground up on Hadoop using the latest big data, machine learning and anomaly detection technology proven at Facebook and Google. It is able to detect fraud not detected by existing systems, discover fraud in minutes vs. days, discover both new and old fraud attack techniques and dramatically reduce false positives.
Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats. The company’s real-time, deep learning platform is proven to detect known and unknown network threats with speed, efficacy, and coverage that set a new standard for cyber defense.
Astellia is a leading provider of network and subscriber intelligence enabling mobile operators to drive business performance and customer experience. Astellia’s vendor-independent real-time monitoring and troubleshooting solution covers end-to-end 2G, 3G and 4G from radio access to core network. Astellia’s scalable products and expert services address the needs of operators’ full value chain: CEM, network performance, customer care, marketing and commercial.
Atigeo Corp. is a compassionate technology company for a wiser planet. The xPatterns platform, Atigeo’s flagship big data analytics product, generates knowledge from all available data to deliver previously unforeseen insights, predict outcomes, and mitigate risks. xPatterns revolutionary analysis is localized, responsive, adaptive and automated, which means organizations can quickly deploy a solution, extend existing technology investments, broadly scale and apply learnings in a timely manner to solve the most complex business problems. Atigeo serves customers across healthcare, cyber, defense, energy, and financial services.
Check Point Software Technologies is the largest pure-play security vendor globally, providing industry-leading solutions and protecting customers from cyber-attacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.
The concept of solutions being driven to address specific customer challenges has been with Cisco since its inception. A technology had to be invented to deal with disparate local area protocols; and as a result of solving their challenge - the multi-protocol router was born.
ExtraHop is changing how organizations use their network by transforming data-in-motion into a rich multidimensional data source that delivers the IT and business insights they require. The network is the common element in every aspect of modern business, and ExtraHop makes it easy to derive insights from wire-data with a turnkey analytics platform.
Through universal observation, dynamic discovery and multi-dimensional stream analytics, ExtraHop is revolutionizing the way IT and business operates.
Fidelis Cybersecurity is creating a world where attackers have no place left to hide. Fidelis products reduce the time it takes to detect attacks and resolve security incidents. Fidelis Network and Fidelis Endpoint products look deep inside the traffic and content where attackers hide their exploits. Then, they pursue them out to the endpoints where critical data lives. With Fidelis an organization can know when it’s being attacked, can retrace attackers’ footprints, and prevent data theft at every stage of the attack lifecycle.
FireEye provides the only global, anti-botnet protection system to combat botnets and targeted, stealthy malware. FireEye protects organizations against botnets to prevent customer data, intellectual property, and company resources from being compromised and stolen as a result of unauthorized remote control of PCs and servers. Our solutions bring advanced network security together with state-of-the-art virtualization technology to combat targeted malware as well as its criminal attack vector of choice—botnets.
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making to streamline security. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
Forescout enables its customers to unleash the full power of their network through enterprise-class security and control. Forescout’s automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because Forescout security solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by more than 1,000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, Forescout delivers its solutions through its network of authorized partners worldwide.
Fortinet is a worldwide provider of network security appliances and a market leader in Network Security (Datacenter Firewall/NGFW/UTM). Fortinet’s products and subscription services provide broad, integrated and high-performance protection for both on-premise and cloud environments against dynamic security threats while simplifying the IT security infrastructure.
IBM QRadar SIEM consolidates log events and network flow data from thousands of devices, endpoints, and applications distributed throughout a network. It helps normalize and correlate raw data to identify security offenses, and uses an advanced Sense Analytics engine to baseline normal behavior, detect anomalies, uncover advanced threats, and remove false positives. Optionally, this software incorporates IBM X-Force Threat Intelligence, which identifies, scores, and categorizes potentially malicious IP addresses, including malware hosts, spam sources, and other threats. IBM QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to better analyze and prioritize security incidents. Integrated with the Gigamon GigaSECURE® Security Delivery Platform, IBM QRadar SIEM can detect threats other solutions often miss in the noise of millions of events, as well as help ensure policy and regulatory compliance and minimize risks to mission-critical services, data, and assets.
More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user.
Kentik offers Kentik Detect, a big data analytics solution delivered via SaaS, purpose built for turning network telemetry such as NetFlow, sFlow, and IPFIX into valuable, actionable visibility and operational intelligence. NetOps, NetEng, and SecOps teams commonly use the platform for network traffic and performance monitoring, DDoS detection, and BGP path and peering analysis. Kentik Detect has certified support of flow telemetry originating from the Gigamon Visibility Fabric™.
LiveAction is award-winning software designed to simplify network management. Initially developed to aid the U.S. Department of Defense in the operation of its networks, LiveAction features an innovative visual display, real-time big data analytics for decision making and deep integration with routers and switches for unparalleled network control. LiveAction accelerates troubleshooting with its QoS control, application-aware, and WAN functionality developed in collaboration with Cisco Systems.
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.
Riverbed enables organizations to maximize performance and visibility for networks and applications, so they can overcome complexity and fully capitalize on their digital and cloud investments. The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, remediate and accelerate the performance of any network for any application. The platform addresses performance and visibility holistically with best-in-class WAN optimization, network performance management (NPM), application acceleration (including Office 365, SaaS, client and cloud acceleration), and enterprise-grade SD-WAN. Riverbed’s 30,000+ customers include 99% of the Fortune 100.
RSA provides more than 30,000 customers around the world with essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations can effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.
Sourcefire, now part of Cisco, is a world leader in intelligent cybersecurity solutions. Together with Cisco, Sourcefire provides a broad portfolio of integrated solutions that deliver unmatched visibility and continuous advanced threat protection across the entire attack continuum, allowing customers to act smarter and more quickly—before, during, and after an attack. Sourcefire’s innovation in open source security, as well as commercial next-generation network security platforms and advanced malware protection solutions has been trusted for more than 10 years. Sourcefire has earned a reputation for innovation, consistent security effectiveness and world-class research all focused on detecting, understanding and stopping threats.
At Spirent Communications we work behind the scenes to help the world communicate and collaborate faster, better and more often. The world’s leading communications companies rely on Spirent to help design, develop and deliver world-class network, devices and services. Spirent’s lab test solutions are used to evaluate performance of the latest technologies. As new communication services and applications are introduced in the market, Spirent provides tools for service management and field test to improve troubleshooting and quality. Spirent also enables enterprises, institutions and government agencies to secure and manage their networks.
Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data"—generated by websites, applications, servers, networks, mobile devices and all the sensors and RFID assets that produce data every second of every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records—and more—Splunk turns machine data into valuable insights no matter what business you're in. It's what we call Operational Intelligence.
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk, ensure compliance and respond to threats. Their family of products includes SecurityCenter Continuous View, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world¹s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.
Trend Micro Deep Discovery: Your Network Defense against APTs and targeted attacks. The industry's first advanced threat protection solution that enables businesses and government agencies not only to detect and analyze advanced persistent threats (APTs) and targeted attacks, but also to rapidly adapt their protection and respond to these attacks. Network Defense integrates software, global threat intelligence, and specialized tools and services to deliver a customized and comprehensive solution for businesses and government.
Vasona Networks, Inc. Works with global mobile network operators to improve RAN performance and deliver better subscriber experiences. The company's pioneering edge application controller, the SmartAIR1000, takes a holistic approach to addressing mobile network data traffic congestion that occurs in each cell, monitoring every application demanding bandwidth. With this visibility, Vasona Networks' RateControl technology allocates bandwidth by precise determination of user needs and experiences. Vasona Networks is based in Santa Clara, California.
Vectra Networks is the leader in real-time detection of in-progress cyber attacks. The company’s automated threat management solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. It then automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly address and mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2015, Gartner named Vectra a Cool Vendor in Security Intelligence for addressing the challenges of post-breach threat detection.
Velocimetrics delivers comprehensive, real-time business insight to the global financial community. Designed by industry experts to meet the specific monitoring and performance analysis needs of each firm’s complex environments, Velocimetrics provides an independent, transparent and detailed view of the business impact of all activities taking place across each and every system and network as they are happening.
By rapidly detecting potential risks, identifying inefficiencies and exposure to financial loss, Velocimetrics instantly alerts the business to issues that could adversely impact success as a situation is emerging, before it’s too late.
Viavi Solutions deliver 360-degree visibility across physical, virtual, and cloud environments providing insight to deliver optimal service levels, transition to new technologies, and roll out new services, while improving efficiency and ROI. Implement major transformations with greater confidence when armed with historical intelligence to support investment planning, standards-based deployment testing and certification, and performance monitoring to ensure optimum service delivery. Leading solutions and deep technical mastery make Viavi a trusted advisor to top enterprises worldwide.
VMware, the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware’s approach accelerates the transition to cloud computing while preserving existing investments and improving security and control. With more than 300,000 customers and 25,000 partners, VMware solutions help organizations of all sizes lower costs, increase business agility and ensure freedom of choice.
Voipfuture provides a full picture by unifying data from different layers—media plane/Real-time Transport Protocol (RTP) with control plane/Session Initiation Protocol (SIP)—into one combined monitoring platform. This broad view on service quality (24x7, full traffic, all streams, and both directions) detects connections between all types of events on the control and media plane. The technology is exceptionally scalable. It makes the products applicable to a wide range of network environments from enterprise branch sites to major interconnection points and carrier networks. Use cases include troubleshooting, network performance optimization, customer care applications, interconnection monitoring, and customer SLA monitoring.
For 11 years, Amazon Web Services has been the world's most comprehensive and broadly adopted cloud platform. AWS offers over 90 fully featured services for compute, storage, networking, database, analytics, application services, deployment, management, developer, mobile, Internet of Things (IoT), Artificial Intelligence (AI), security, hybrid, and enterprise applications, from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world -- including the fastest growing startups, largest enterprises, and leading government agencies -- to power their infrastructure, make them more agile, and lower costs.
Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more.
Microsoft Azure is a comprehensive set of cloud services that developers and IT professionals use to build, deploy, and manage applications through our global network of datacenters. Integrated tools, DevOps, and a marketplace support you in efficiently building anything from simple mobile apps to internet-scale solutions.
Sentinel IPS relieves the burden of security for businesses with its active threat management system based on collective intelligence. As a managed service, it's the extra team you need — but one that never sleeps.
Nectar is the global market leader in providing the most comprehensive monitoring and diagnostics software solution for Unified Communication services, enables IT and operation organizations to proactively ensure the end-user experience. Nectar’s flagship offering, the Unified Communications Management Platform (UCMP), improves visibility and service delivery across integrated voice, video and data application solutions by providing unique and critical performance information. Nectar provides monitoring and diagnostics for millions of enterprise endpoints to over 2,100 enterprises in over 86 countries—including some of the largest global banking, search engine, service provider, healthcare, and manufacturing organizations in the world.
ReversingLabs is a leading provider of threat intelligence solutions that dramatically accelerate and broaden an organization’s ability to detect new threats, respond to incidents and gain visibility on attacks. Our solutions implement unique, innovative technologies that perform real-time deep inspection and analysis to detect threats within files. Large enterprises, government agencies and security vendors use these solutions to implement enterprise-scale classification, analysis and hunting.
Endace’s multifunctional Network Analytics Platform can host 3rd-party network analytics applications while simultaneously recording a 100% accurate Network History, providing definitive evidence for investigating cybersecurity threats, quantifying data breaches and analyzing network or application performance problems.
Corelight provides the most powerful network visibility solutions for information security professionals. Built on Bro, the open source network security monitoring framework, Corelight Sensors help organizations understand their network traffic to detect and stop cyber attacks. Bro has been in use since 1995 when it was created by Vern Paxson, Corelight's co-founder and chief scientist. Corelight Sensor appliances provide the right type and volume of information organized to help you understand network traffic deeply and take action to stop and prevent cyber attacks. With dozens of specialized logs and over 400 fields of derived data that can be ingested into your SIEM or analytics stack, Corelight will make your log analysis even more powerful.
Today's fast-moving digital environment enables enterprises to operate more efficiently, gain competitive advantage and serve customers better than ever before. It also multiplies the security risks. nCipher Security empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications.
Our cryptographic solutions secure emerging technologies – cloud, IoT, blockchain, digital payments – and help meet new compliance mandates. Using the same proven technology that our customers depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical information and applications, ensuring the integrity of your data and putting you in complete control – today, tomorrow, and at all times.
Learn more about nCipher
Plixer is a leading threat detection and forensic evidence provider focused at engineering the very best system for uncovering unwanted communication behaviors. Rather than depending on packet signatures, their strategy uncovers unwanted communications by leveraging NetFlow, IPFIX, sFlow and other derivatives. The company was built by network and system engineers who understand the need for scalable distributed collection solutions that meet the dynamic demands of security and network professionals.