GigaSMART® applications expand capabilities in the Gigamon Deep Observability Pipeline to improve network visibility, traffic handling, and tool efficiency. Solutions include:
Combine or service-chain a range of GigaSMART applications to achieve exactly the results you want.
Subscription-based GigaSMART applications are available for GigaVUE® Visibility Appliances without port- or card-based restrictions. Select GigaSMART applications are also available with the GigaVUE Cloud Suite™ for public and private cloud.
Identify, Filter, & Enrich App Data
Use Application Intelligence to automatically discover applications, generate metadata attributes, and forward them to the appropriate tools.
Reduce Unnecessary Processing
Utilize Advanced Flow Slicing to granularly select and drop superfluous packet content to reduce traffic sent to tools by over 60 percent.
Maintain Strong Security Posture
Apply SSL/TLS Decryption to decrypt traffic with the latest cipher suites and share with tools to expose malware hiding in encrypted sessions.
Essential to transform data, provide contextual insights, and keep data secure
GigaSMART® offers several essential traffic intelligence services required for deep observability into infrastructure blind spots.
NetFlow Generation
Delivers basic Layer 2–4 network traffic data to analysis tools.
Source Port Labeling
Provides context to packets and identifies behaviors and threats based on network location.
Adaptive Packet Filtering
Identifies patterns across any part of the network packet, including the packet payload.
De-duplication
Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.
Packet Slicing
Truncates packets while preserving the protocol headers required for network analysis.
Advanced Load Balancing
Divides and distributes traffic among multiple tools based on a variety of data points.
Advanced Flow Slicing
Reduces bandwidth usage by slicing payloads and packets from long data flows.
Masking
Provides customizable data protection by overwriting specific packet fields with a set pattern.
Tunneling
Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.
Application Visualization
Provides a complete view of the applications running on your network.
Application Filtering Intelligence
Extends Layer 7 visibility to thousands of common and proprietary applications.
Application Metadata Intelligence
Provides application visibility to identify performance and quality issues, and potential security risks.
GTP Correlation
Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.
FlowVUE Flow Sampling
Provides subscriber IP-based flow sampling.
5G Correlation
Forwards subscriber sessions to specific tools by filtering on subscriber, user device, RAN, or network slice IDs.
SSL/TLS Decryption
Creates a secure channel between the server and the end user's computer or other devices as they exchange information.
“Gigamon is traditionally thought of as a network efficiency platform, but the underlying technology has radical implications in cybersecurity as well. Visibility of encrypted packets is more of a must-have than a like-to-have, and intelligent traffic handling is a requisite in optimizing bandwidth and reducing storage costs.”
Network traffic intelligence is the process of collecting and analyzing network traffic in order to detect security risks, monitor performance and identify optimization opportunities. Network traffic intelligence goes beyond basic network monitoring by incorporating processes like adaptive packet filtering, de-duplication, advanced load balancing, flow slicing and more to streamline traffic, support data protection and help ensure service continuity.
GigaSMART provides enhanced network visibility by performing advanced traffic, application, subscriber, and security intelligence functions before data is delivered to monitoring and security tools. Key GigaSMART features like application visualization, source port labeling, and adaptive packet filtering enable a comprehensive and streamlined view of network activity.
Yes, GigaSMART can help significantly reduce tool sprawl. GigaSMART offers various services that aim to optimize and streamline network traffic, allowing you to easily address redundancies and inefficiencies. For example, packet de-duplication targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows to your security and network monitoring tools. Used in combination with other GigaSMART features like advanced load balancing and flow slicing, your organization can avoid overloading tools and paying for unnecessary tool storage capacity.
Application metadata extraction is a crucial part of the deep observability pipeline providing high-level, context-rich insights into how applications behave and communicate across networks without needing full packet capture. It enhances visibility into application performance, usage patterns, and potential issues, enabling your team to detect problems faster, boost security posture, and reduce operational costs.
GigaSMART processes a broad spectrum of network traffic types to deliver advanced visibility and deep traffic intelligence. It supports network-level, application-level, encrypted, cloud-based, east-west, and north-south traffic. GigaSMART is designed to handle traffic at multiple layers (Layer 2 through Layer 7), making it highly versatile for both network operations and security operations.
The GigaVUE HC Series has 4 different models: GigaVUE-HC1, GigaVUE-HC1-Plus, GigaVUE-HC3, and GigaVUE HCT. Each model:
Installing a GigaVUE HC Series appliance involves both physical setup and initial configuration, and detailed instructions can be found in the installation guides for GigaVUE-HC1, GigaVUE-HC1-Plus, GigaVUE-HC3, and GigaVUE-HCT.
At a high level, installing a GigaVUE HC Series appliance consists of rack‑mounting, module installation (hot‑swappable), grounding, and console port connections, which are all discussed in the hardware installation guides. Initial CLI configuration uses the jump‑start script, which runs in Configure mode. It guides you to set admin passwords, management interface settings, hostname, cluster options, NTP, SSH, and ports. Gigamon support is always available for additional assistance.
We're here to help you find the right solution for your business.
By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.