The key to greater tool efficiency is the elimination of unnecessary traffic. But security and APM tools also need to see the “right” data to work effectively. The Gigamon Deep Observability Pipeline lets you do both. It applies traffic intelligence to optimize hybrid cloud traffic before sending to security, performance monitoring, and observability tools.
Gigamon traffic intelligence solutions such as Flow Mapping, De-duplication, Advanced Flow Slicing, and Advanced Load Balancing, help prevent tool oversubscription and lower costs. Traffic intelligence capabilities are found in GigaSMART® or built into GigaVUE-OS.
With Gigamon traffic intelligence, there’s no compromise between security and tool costs. As cloud and network traffic continue to grow, tool costs don’t have to.
Contain Tool Costs
Enable existing tools to perform better, while helping you avoid or delay costly upgrades.
Stop Tool Sprawl
Reduce operational complexity caused by the need to implement and maintain a large number of tools.
Pinpoint Security Issues Faster
Minimize noise created by unnecessary or low-risk traffic, helping security teams be more efficient in identifying real threats.
Traffic intelligence applications and features streamline traffic, support data protection, and help ensure service continuity.
NetFlow Generation
Delivers basic Layer 2–4 network traffic data to analysis tools.
Source Port Labeling
Provides context to packets and identifies behaviors and threats based on network location.
Adaptive Packet Filtering
Identifies patterns across any part of the network packet, including the packet payload.
GigaStream Sampling
Samples traffic based on hash settings and helps ensure that traffic sent to each tool is within the capacity of the tool.
De-duplication
Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.
Packet Slicing
Truncates packets while preserving the protocol headers required for network analysis.
Advanced Load Balancing
Divides and distributes traffic among multiple tools based on a variety of data points.
Flow Mapping
Takes line-rate traffic and sends it through a set of user-defined map rules to relevant tools.
Advanced Flow Slicing
Reduces bandwidth usage by slicing payloads and packets from long data flows.
Masking
Provides customizable data protection by overwriting specific packet fields with a set pattern.
Tunneling
Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.
Inline Bypass
Routes network flows around inline tools as needed in the event of failure.
Traffic intelligence delivers deep observability into network activity—going far beyond basic packet headers. Traditional packet inspection only provides surface-level visibility, whereas traffic intelligence incorporates deep packet inspection (DPI) and advanced analytics to:
These capabilities empower NetOps, SecOps, and CloudOps teams to strengthen security posture, reduce MTTR, and enhance user experience across hybrid environments.
Gigamon traffic intelligence uses GigaSMART and GigaVUE-OS to enable key capabilities, including:
As a result, you can detect and stifle potential threats, identify bottlenecks, and get a better understanding of how much bandwidth applications are using and how much they need. Gigamon Traffic Intelligence can play a key role if you’re trying to build a zero trust architecture by giving you a detailed picture of your network traffic.
Traffic intelligence enhances the efficiency of other tools by eliminating unnecessary network traffic and optimizing network performance and resource allocation. When excess or redundant data is minimized, it allows other tools to process essential information more quickly and reliably, improving response times and overall system performance. This optimization ensures that other solutions relying on real-time data or communication can function without delays or interruptions. Additionally, reducing unnecessary traffic can lower resource consumption, such as CPU and memory usage, leading to better performance and cost-efficiency across systems.
Website traffic intelligence allows you to monitor how applications are using your network and reroute traffic to prioritize the most important applications. For example, you can use traffic intelligence to identify bottlenecks in your network and allocate more bandwidth to video chat applications and other tools that use a lot of resources.
Optimizing your network to improve the performance of frequently used applications can also help you reduce tool costs. Plus, encrypted traffic intelligence allows you to securely reroute traffic to your security and monitoring tools.
Gigamon optimizes traffic across physical, virtual, and cloud environments, including East-West and North-South traffic. It integrates seamlessly with existing security and observability tools in:
Yes. By offloading traffic filtering, de-duplication, and load balancing from your tools, Gigamon enables you to:
Absolutely. You can book a free demo with one of our experts to see traffic intelligence in action. You can also visit our Resources section on our website for white papers, data sheets, webinars, and tech hub videos. If you have any questions, feel free to reach out to our sales team at any time.
“My highest priority was finding a solution that allowed us to watch more than the ocean of data passing at the network border, enabling us to sharpen our focus on the data we care about most. Now, we feel more comfortable that we’re not missing traffic and are better able to highlight and inspect traffic of interest to reduce false positives and optimize inline security tool performance.”
“Gigamon is traditionally thought of as a network efficiency platform, but the underlying technology has radical implications in cybersecurity as well. Visibility of encrypted packets is more of a must-have than a like-to-have, and intelligent traffic handling is a requisite in optimizing bandwidth and reducing storage costs.”
We're here to help you find the right solution for your business.
By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.