Intelligence to optimize and manage Layer 2–7 network traffic.

Apply Application and Traffic Intelligence to Your Network

GigaSMART® applications expand the capabilities in the Gigamon Deep Observability Pipeline to improve network visibility, traffic handling, and tool efficiency. Solutions include:

  • Traffic Intelligence for streamlining traffic
  • Application Intelligence to filter and extract app metadata
  • Subscriber Intelligence for advanced 5G networks
  • Security Intelligence for SSL/TLS decryption

Combine or service-chain a range of GigaSMART applications to achieve exactly the results you want.

Subscription-based GigaSMART applications are available for GigaVUE® Visibility Appliances without port- or card-based restrictions. Select GigaSMART applications are also available with the GigaVUE Cloud Suite for public and private cloud.


Keep networks responsive and secure.


Identify, Filter, & Enrich App Data
Use Application Intelligence to automatically discover applications, generate metadata attributes, and forward them to the appropriate tools.

Reduce Unnecessary Processing
Utilize Advanced Flow Slicing to granularly select and drop superfluous packet content to reduce traffic sent to tools by over 60 percent.

Maintain Strong Security Posture
Apply SSL/TLS Decryption to decrypt traffic with the latest cipher suites and share with tools to expose malware hiding in encrypted sessions.

GigaSMART, a Critical Component of the Gigamon Deep Observability Pipeline

Essential to transform data, provide contextual insights, and keep data secure


GigaSMART Features

GigaSMART® offers several essential traffic intelligence services required for deep observability into infrastructure blind spots.

NetFlow Generation

Delivers basic Layer 2–4 network traffic data to analysis tools.

Source Port Labeling

Provides context to packets and identifies behaviors and threats based on network location.

Adaptive Packet Filtering

Identifies patterns across any part of the network packet, including the packet payload.


Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.

Packet Slicing

Truncates packets while preserving the protocol headers required for network analysis.

Advanced Load Balancing

Divides and distributes traffic among multiple tools based on a variety of data points.

Advanced Flow Slicing

Reduces bandwidth usage by slicing payloads and packets from long data flows.


Provides customizable data protection by overwriting specific packet fields with a set pattern. 


Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.

Application Visualization

Provides a complete view of the applications running on your network.

Application Filtering Intelligence

Extends Layer 7 visibility to thousands of common and proprietary applications.

Application Metadata Intelligence

Provides application visibility to identify performance and quality issues, and potential security risks.

GTP Correlation

Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.

FlowVUE Flow Sampling

Provides subscriber IP-based flow sampling.

5G Correlation

Forwards subscriber sessions to specific tools by filtering on subscriber, user device, RAN, or network slice IDs.

SSL/TLS Decryption

Creates a secure channel between the server and the end user's computer or other devices as they exchange information.




GigaSMART Overview

Get the most out of your visibility and security investments with free online learning.

“Gigamon is traditionally thought of as a network efficiency platform, but the underlying technology has radical implications in cybersecurity as well. Visibility of encrypted packets is more of a must-have than a like-to-have, and intelligent traffic handling is a requisite in optimizing bandwidth and reducing storage costs.”

Chris Kessel, Director of Research Worldwide Security Products, IDC


Take a Gigamon Tour

See the tech. Touch the tech.

Have Questions?

We're here to help you find the right solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages