Ecosystem Partner Spotlight

Top 3 Ways to Pair GigaSECURE with Splunk Enterprise

Splunk Enterprise is a hugely popular network operations tool that’s also gaining market share as a security information manager; your organization might be thinking about deploying it, or might already be using it today. Either way, you’ll definitely want to know how Gigamon’s GigaSECURE® Security Delivery Platform works with Splunk’s offerings to help keep your networks […]

Read more >

Gigamon and Splunk: Using Metadata to Improve Security Visibility

Metadata—it has the power to achieve actionable visibility so you can get better performance and intelligence from your security solutions. Establishing reliable baselines and context for network activity is a daunting task. There are simply too many data sources belonging to too many different tools and solutions: endpoints, routers, switches, application servers (like DNS and […]

Read more >

Why America’s Largest Pension Fund Relies on Gigamon’s Visibility Fabric

Not only is the California Public Employees’ Retirement System (CalPERS) responsible for administering tens of billions of dollars in retirement and healthcare benefits for over 1.7 million members, it manages the single largest public pension fund in America. So when CalPERS built a new site to service its many clients, it turned to Gigamon’s Visibility […]

Read more >

4 Ways GigaSECURE Helps Imperva Web Application Firewall Deployments

Hackers love web applications, which can offer easy access to valuable—oftentimes business critical—data. But in their way stands the Imperva SecureSphere Web Application Firewall (WAF), a remarkable first line of defense against hackers targeting web‐application traffic. Deploying and managing multiple SecureSphere devices, however, can be challenging, especially at scale. That’s where Gigamon GigaSECURE®, the industry’s first […]

Read more >

GigaSECURE & CASBs: A Joint Solution to Control Shadow IT

Shadow IT—rogue apps and services set up by individual groups within a company without the IT department’s approval—has become a big problem for IT teams. Many of these services run in the cloud, and a new category of products, Cloud Access Security Brokers (CASBs), has sprung up to help IT sniff out and manage these […]

Read more >