Network TAPs

Broad, reliable access to 100 percent of the traffic on your network.

Understanding Network TAPs

A network TAP is an external monitoring device that mirrors the traffic that is passing between network nodes. A TAP (test access point) is a hardware device inserted at a specific point in the network to monitor specific data. As part of the Gigamon Platform, network TAPs provide access to the traffic required to secure, monitor and manage your enterprise network infrastructure continuously and efficiently.

Passive optical TAPs create perfect copies of all traffic at full bandwidth. They require no power or management and do not actively interact with other components of the network. Gigamon offers several passive optical TAP solutions:

G-TAP M Series

Active TAPs are used in networks where copper cabling or optical budgets do not allow for passive TAPs. In the event of a power failure, active TAPs have battery backup to keep them running and will send an alert to indicate the failure. A bypass TAP is a type of active TAP that also has a relay that closes when it loses power, maintaining the network connection and minimizing disruption to traffic. Gigamon's active network TAP solutions:

active TAP image



TAP and SPAN technologies provide direct access to the actual packets — but which is the preferred methodology?


Definitive Guide to NGNPB

How to harness the power of unprecedented network visibility.


2019 Cyberthreat Defense Report

See what 1,200 of your peers are doing to address cyberthreat challenges and concerns.

G-TAP Visio Stencils

Our Partnerships

Get the most from your tools.

See how we deliver best of breed monitoring and security solutions with our ecosystem partners.

AWS logo

See what your peers are talking about in the Gigamon Community

Learn more about Gigamon Taps and connect with other Gigamon users to ask questions, share use cases and deployment examples.

Clemson University logo

“My highest priority was finding a solution that allowed us to watch more than the ocean of data passing at the network border, that allowed us to sharpen our focus on the data we care about most. Now, we feel more comfortable that we’re not missing traffic and are better able to highlight and inspect traffic of interest to reduce false positives and optimize inline security tool performance.”

John Hoyt • Security Information and Operations Director • Clemson University

Have Questions?

We're here to help you find the right solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages

GigaSECURE Security Delivery Platform



Route the right traffic to the right tools.




Optimize traffic sent to your tools.




Single pane-of-glass orchestration and management.



Traffic Aggregators

Aggregate low-utilization network links.