Intelligence to optimize and manage layer 2–7 network traffic.

Apply Application and Traffic Intelligence to Your Network

GigaSMART® applications expand the capabilities of Gigamon Hawk, the Hybrid Cloud Visibility and Analytics Fabric to improve network visibility, traffic handling, and tool efficiency. Solutions include Application Intelligence, Subscriber Intelligence for advanced 5G networks, and Traffic Intelligence. Combine or service-chain a range of GigaSMART applications to achieve exactly the results you want.

Examples include:

  • Application Intelligence: Visualize all applications on your network and forward only relevant application traffic for greater tool efficiency
  • SSL/TLS Decryption: Centrally decrypt traffic, including TLS 1.3, to eliminate network blind spots and re-encrypt after inspection to keep data secure
  • NetFlow and Application Metadata: Generate NetFlow and over 5,000 L3-7 metadata attributes to provide contextual insights
  • Advanced Flow Slicing: Forward the first set of packets then slice or drop the rest to minimize bandwidth and reduce unnecessary burdens on tools
  • ThreatINSIGHT Sensor: Feed real-time metadata to the Gigamon SaaS-based NDR for comprehensive infrastructure coverage

Subscription-based GigaSMART applications are available for GigaVUE® Visibility Appliances without port- or card-based restrictions. Select GigaSMART applications are also available with the GigaVUE Cloud Suites for public and private cloud.



Automatically discover applications and generate metadata attributes and forward to the appropriate tools.

Granularly select and drop superfluous packet content to reduce traffic by over 60 percent.

Decrypt traffic utilizing the latest cipher suites and share with security tools to expose any malware hiding in encrypted sessions.


Get Bundled

GigaSMART applications are now available bundled, so you can maximize your infrastructure visibility. Choose your bundle:




GigaSMART Overview

Get the most out of your visibility and security investments with free online learning.

“Gigamon is traditionally thought of as a network efficiency platform, but the underlying technology has radical implications in cybersecurity as well. Visibility of encrypted packets is more of a must-have than a like-to-have, and intelligent traffic handling is a requisite in optimizing bandwidth and reducing storage costs.”

Chris Kessel, Director of Research Worldwide Security Products, IDC

GigaSMART Features

GigaSMART® offers a number of other essential traffic intelligence services required for active visibility into infrastructure blind spots, including:

NetFlow Generation

Delivering basic Layer 2–4 network traffic data to analysis tools. 

Source Port Labeling

Provides context to packets and allows tools to properly assess network behavior and threats based on where they are.

Adaptive Packet Filtering

Identifies patterns across any part of the network packet, including the packet payload.


Targets, identifies and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.

Packet Slicing

Truncates packets while preserving the portion of the packet (the protocol headers) required for network analysis.

Advanced Load Balancing

Divides and distributes traffic among multiple tools, so network and security visibility can scale.

Advanced Flow Slicing

Eliminates these issues by slicing payloads and packets from long data flow.


Provides customizable data protection by overwriting specific packet fields with a set pattern. 


Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or hosted in a public cloud.

Application Visualization

Provides a complete view of the applications running on your network automatically.

Application Filtering Intelligence

Extends Layer 7 visibility to thousands of common and proprietary applications.

Application Metadata Intelligence

Empowers your security information and event management and network performance monitoring tools.

GTP Correlation

Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.

5G Correlation

Intelligently forward subscriber sessions to specific tools by filtering on subscriber, user device, RAN or network slice IDs.

FlowVUE Flow Sampling

Provides subscriber IP-based flow sampling.

SIP/RTP Correlation

Enables enterprises and service providers to monitor VoIP traffic.

SSL/TLS Decryption

Creates a secure channel between the server and the end user's computer or other devices as they exchange information.

ThreatINSIGHT Sensor

Collect and send rich metadata to the ThreatINSIGHT NDR solution.

Take a Gigamon Tour

See the tech. Touch the tech.

Have Questions?

We're here to help you find the right application visibility solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages