Author Archive

FireEye and Gigamon Announce Global Partnership

Gigamon and FireEye, an the intelligence‐led security company, recently announced a global strategic partnership to improve threat defenses across our customers’ security infrastructures. The multifaceted alliance offers customers FireEye® Network Security combined with the GigaSECURE® Security Delivery Platform with flexible deployment options and scalability for optimal threat protection. With GigaSECURE providing intelligent access and control of network […]

Read more >

Last‐Day‐to‐Buy and End‐of‐Sale Announcements

GigaVUE‐HD4 and HD8 The last day to buy the GigaVUE‐HD4 and GigaVUE‐HD8 is June 30, 2018, with end of sale effective October 31, 2018. Service and Support will continue for customers with active Ltd Hardware Warranty and/or Gigamon Software and Product Support Agreement (“Support Agreement”) covering the products. Customers can continue to purchase the renewal […]

Read more >

Watch: Gigamon Ecosystem Partners Speak About the Benefits of Joint Solutions

Dozens of our Ecosystem Partners were kind enough to go on camera to explain how their solutions work hand‐in‐hand with ours. Each includes a joint solution brief, the links to which can be found in the video description. Featured this month: Cisco Systems, Corero, Flowmon Networks and RedSeal. See the full video lineup on GigamonTV.  […]

Read more >

Meet Us at These Events

Featured Event: Gigamon Cybersecurity Summit 2018 — Chicago Tuesday, June 12 from 7–11 a.m. in Oak Brook, IL In case you missed P.W. Singer’s keynote address at the Gigamon Public Sector Cybersecurity Summit in Washington, D.C., now is your chance to hear him speak in the Chicago area, along with expert cybersecurity panels and morning […]

Read more >

June 2018 Webinars

(ISC)² Live Security Briefing: Threat Detection in TLS: The Good, Bad and Ugly Thursday, May 31 at 10 a.m. Pacific/1 p.m. Eastern While TLS, formerly known as SSL, has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. Learn why deploying TLS decryption […]

Read more >