Give Tools the Data They Need for Better Threat Detection

Access network traffic from the edge to the core.

Accelerate Time to Detection

To detect threats in a network you need to provide the right data to the right security tools. For most security teams, there’s simply too little time, too few resources and too much data to efficiently find potential security threats. With the increased use of SSL encryption, network virtualization and security segmentation, how do you ensure that your tools are receiving all the right information and not being overloaded?

The GigaSECURE® Security Delivery Platform delivers only the specific type of data required by security and monitoring tools to assess the network for threats. GigaSECURE, a next-generation network packet broker, generates metadata and optimized data packets specifically tuned to the security tool that is receiving it to boost threat detection efficacy across the enterprise.

The Choice Is Yours: Metadata or Raw Packet Data

The Value of Metadata

Metadata provides summarized information about raw network packets based on Layer-4 and Layer-7 information. With it, organizations gain insight into:

  • Critical details about the flow - for example, 5-tuple, protocol information
  • Application-level insights based on Layer-7 traffic information
  • Traffic flows across on-premises and public cloud infrastructures

The GigaSECURE Metadata Generation capability includes NetFlow, a network protocol used to collect statistics on IP traffic information, such as IP source, destination of traffic, class of service and causes of congestion. NetFlow provides insight into traffic types and usage patterns across systems, enabling enterprises to catch denial of service attacks, data extraction and other events that represent a security risk.

By offloading metadata generation to GigaSECURE, enterprises can:

  • Save time and money by not sending raw data to analytics tools.
  • Reduce false positives by separating signals from noise.
  • Accelerate threat detection through proactive, real-time traffic monitoring versus reactive forensics.
  • Reduce High CPU utilization issues in routers and switches.

The Value of Raw Packet Data

Although packet data contains valuable information, the exponential growth of data is causing tool overload. Detection tools, such as data loss prevention (DLP), intrusion detection system (IDS) and advanced threat prevention (ATP) tools, are unable to accurately assess all packets for threats.  

GigaSECURE can gather raw data – from the edge to the core to the cloud – and optimize and deliver it to security tools to enhance their threat detection ability across the entire network. The Gigamon solution includes core intelligence and GigaSMART® applications that enable organizations to reduce the burden on their detection tools. For example:

  • Flow Mapping® takes line-rate traffic and sends it through a set of user-defined map rules to security tools. Organizations can optimize tool performance and drive down costs.
  • SSL/TLS Decryption helps manage increasing volumes of encrypted traffic. Organizations can ensure that tools focus on their primary functions while circumventing unnecessary appliance sprawl and related costs, complexity and the potential to introduce latency.
  • De-duplication eliminates redundant packet information, speeding up forensics and malware detection and reducing the load required to store duplicate packets.

WHITEPAPER

Nine Metadata Use Cases

Read about nine specific use cases for metadata that will help you make better security decisions.

WHITEPAPER

Gigamon Intelligent Flow Mapping

Learn how Flow Mapping provides granular control over distinct traffic streams to optimize tool performance.

WHITEPAPER

Prevent Encrypted Threats with Inline SSL Decryption

Learn how to decrypt, expose and stop threats in encrypted traffic on high-speed networks. 

The security experts have spoken.

Read what your colleagues are saying in the 2018 Cyberthreat Defense Report.

Training: Using Metadata for Enhanced Security

Learn how GigaSECURE uses metadata to accelerate threat detection.

Man looking at a phone
BlackHat logo

“The performance of the GigaSECURE Security Delivery
Platform has been exceptional. I don’t even know where the
ceiling is because we haven’t even come close to hitting it.
Everything that we’ve wanted to do with the company’s solution,
we’ve been able to do.”

Neil R. “Grifter” Wyler • Network Operations Center Lead • Black Hat

The New Defender Lifecycle Model

Automate and accelerate threat prevention, detection and mitigation.

Related Pages

GigaSECURE Security Delivery Platform

CORE SOLUTION

GigaSECURE

Route the right traffic to the right tools.

GigaSMART

TRAFFIC INTELLIGENCE

GigaSMART®

Optimize traffic sent to your tools.

NetFlow and Metadata Generation

TRAFFIC INTELLIGENCE

NetFlow and Metadata Generation

Use flow data to gain insights and take action.

threat prevention

USE CASE

Threat Prevention

Stop intrusions before they start.