Gigamon Learning Center

In-depth guides and blogs written by talented network and security experts.

Sharing Our Knowledge

Get the latest resources from Gigamon on everything from network visibility and inline bypass to cybersecurity. You’ll find insights, tips and advice from some of the leading minds working in networking and cybersecurity today.

Network Visibility

Cloud Security

Fast, Centralized Decryption

Centralized NetFlow Generation

Collect and analyze vital network traffic, for a more granular look at your network packets.


Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.


What Is Deep Observability?

Observability provides in-depth intelligence and valuable insights that focus on the present and emerging operational states across the digital infrastructure. This includes networking, computing, cloud, security, applications, and end-user experience.

What Is Network Visibility?

At its most basic, network visibility is the ability to collect and directly analyze individual traffic packets as they flow through your network. More broadly, network visibility refers to being aware of everything within and moving through your network with the help of network visibility tools.

What Is Cloud Security?

Cloud security (also called cloud computing security or cloud network security) is a broad term describing the policies, technologies, tools, applications, and controls that work together to protect a network’s cloud-based systems, data, and infrastructure. Cloud security solutions also help users protect their information from theft, data leakage, and other threats.

What Is NetFlow?

NetFlow is a network protocol system created by Cisco that collects active IP network traffic as it flows in or out of an interface. The NetFlow data is then analyzed to create a picture of network traffic flow and volume.

What Are Cyber Threats?

At their most basic, cyber threats (also called cybersecurity threats) are any malicious attempt to gain unauthorized access into a digital system to steal, damage, alter, or disrupt proprietary digital information.