GigaSMART® technology extends the intelligence and value of the Gigamon Unified Visibility Fabric™ by enhancing your monitoring infrastructure and improving tool performance. A range of applications are available to optimize the traffic sent from your network to the tools you rely upon to monitor, manager, and secure that network. GigaSMART’s advanced processing engine can be accessed anywhere within the Visibility Fabric without port- or card-based restrictions. GigaSMART engines can be combined to process higher traffic loads and optimized for specific applications. Operations can be combined or “service chained” so traffic benefits from multiple functions at once, such as generating NetFlow after duplicates have been removed or stripping headers before load balancing to tools.
Network monitoring tools perform more efficiently by eliminating unwanted content with the de-duplication and packet slicing features. SSL Decryption provides visibility into encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking allows network security teams to hide confidential information such as passwords, financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI compliance regulations. Organizations can improve accuracy with the source port labeling and time stamping capabilities, which allow the addition of source or timing information at the point of collection. Enhanced packet distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers.
The advanced processing capabilities of the GigaSMART engine can also be leveraged to summarize and generate NetFlow statistics from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Gigamon Visibility Fabric eliminates the risk of expending expensive production network resources in generating these analytics. Enhanced flow-level visibility across remote locations and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning and enforcing security policies.