colored-bar

Traffic Intelligence

Optimize traffic for greater tool efficiency and performance

Traffic Intelligence Lets You Do More with Less

The key to greater tool efficiency is the elimination of unnecessary traffic. But security and APM tools also need to see the “right” data to work effectively. The Gigamon Deep Observability Pipeline lets you do both. It applies traffic intelligence to optimize hybrid cloud traffic before sending to security, performance monitoring, and observability tools.

Gigamon traffic intelligence solutions such as Flow Mapping, De-duplication, Advanced Flow Slicing, and Advanced Load Balancing, help prevent tool oversubscription and lower costs. Traffic intelligence capabilities are found in GigaSMART® or built into GigaVUE-OS.

With Gigamon traffic intelligence, there’s no compromise between security and tool costs. As cloud and network traffic continue to grow, tool costs don’t have to. 

RESEARCH REPORT

AI is pushing infrastructure to its limits. See how security and IT leaders are recalibrating.

Benefits

Contain Tool Costs
Enable existing tools to perform better, while helping you avoid or delay costly upgrades.

Stop Tool Sprawl
Reduce operational complexity caused by the need to implement and maintain a large number of tools.

Pinpoint Security Issues Faster
Minimize noise created by unnecessary or low-risk traffic, helping security teams be more efficient in identifying real threats.

Traffic Intelligence

Traffic intelligence applications and features streamline traffic, support data protection, and help ensure service continuity.

NetFlow Generation

Delivers basic Layer 2–4 network traffic data to analysis tools.

Source Port Labeling

Provides context to packets and identifies behaviors and threats based on network location.

Adaptive Packet Filtering

Identifies patterns across any part of the network packet, including the packet payload.

GigaStream Sampling

Samples traffic based on hash settings and helps ensure that traffic sent to each tool is within the capacity of the tool.

De-duplication

Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.

Packet Slicing

Truncates packets while preserving the protocol headers required for network analysis.

Advanced Load Balancing

Divides and distributes traffic among multiple tools based on a variety of data points.

Flow Mapping

Takes line-rate traffic and sends it through a set of user-defined map rules to relevant tools.

Advanced Flow Slicing

Reduces bandwidth usage by slicing payloads and packets from long data flows.

Masking

Provides customizable data protection by overwriting specific packet fields with a set pattern. 

Tunneling

Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.

Inline Bypass

Routes network flows around inline tools as needed in the event of failure.

Resources

Frequently Asked Questions

Traffic intelligence delivers deep observability into network activity­—going far beyond basic packet headers. Traditional packet inspection only provides surface-level visibility, whereas traffic intelligence incorporates deep packet inspection (DPI) and advanced analytics to:

  • Detect threats early
  • Monitor application performance in real time
  • Identify and resolve bottlenecks
  • Optimize bandwidth and resource allocation

These capabilities empower NetOps, SecOps, and CloudOps teams to strengthen security posture, reduce MTTR, and enhance user experience across hybrid environments.

Gigamon traffic intelligence uses GigaSMART and GigaVUE-OS to enable key capabilities, including:

  • Flow Mapping: Directs relevant traffic to appropriate tools, improving focus and efficiency.
  • De-duplication: Eliminates duplicate packets, reducing tool overload and bandwidth waste.
  • Flow Slicing: Extracts only the necessary portion of the packet, conserving tool capacity.
  • Load Balancing: Distributes traffic evenly to prevent bottlenecks and enhance reliability.
  • Encrypted Traffic Intelligence: Decrypts and inspects encrypted traffic for hidden threats.
  • Subscriber Intelligence (for 5G):  Correlates user sessions to optimize mobile network visibility.

As a result, you can detect and stifle potential threats, identify bottlenecks, and get a better understanding of how much bandwidth applications are using and how much they need. Gigamon Traffic Intelligence can play a key role if you’re trying to build a zero trust architecture by giving you a detailed picture of your network traffic.

Traffic intelligence enhances the efficiency of other tools by eliminating unnecessary network traffic and optimizing network performance and resource allocation. When excess or redundant data is minimized, it allows other tools to process essential information more quickly and reliably, improving response times and overall system performance. This optimization ensures that other solutions relying on real-time data or communication can function without delays or interruptions. Additionally, reducing unnecessary traffic can lower resource consumption, such as CPU and memory usage, leading to better performance and cost-efficiency across systems.

 

Website traffic intelligence allows you to monitor how applications are using your network and reroute traffic to prioritize the most important applications. For example, you can use traffic intelligence to identify bottlenecks in your network and allocate more bandwidth to video chat applications and other tools that use a lot of resources.

 

Optimizing your network to improve the performance of frequently used applications can also help you reduce tool costs. Plus, encrypted traffic intelligence allows you to securely reroute traffic to your security and monitoring tools.

Gigamon optimizes traffic across physical, virtual, and cloud environments, including East-West and North-South traffic. It integrates seamlessly with existing security and observability tools in:

  • On-prem data centers
  • Private and public clouds (AWS, Azure, GCP)
  • Containerized and hybrid environments

Yes. By offloading traffic filtering, de-duplication, and load balancing from your tools, Gigamon enables you to:

  • Use fewer tools more effectively
  • Reduce processing overhead
  • Avoid costly overprovisioning
  • Extend the life of existing security infrastructure

Absolutely. You can book a  free demo with one of our experts  to see traffic intelligence in action. You can also visit our Resources section on our website for white papers, data sheets, webinars, and tech hub videos. If you have any questions, feel free to reach out to our sales team at any time.

Gigamon Community

Get the latest technical content and discussions about networking in the Gigamon VÜE Community.

colored-bar

Take a Gigamon Tour

See the tech. Touch the tech.

Have Questions?

We're here to help you find the right solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages