Gigamon Customer Newsletter

Enterprise & Service Provider

Editor’s Picks for the Informed Reader

CRN Magazine Names GigaSECURE Cloud for Microsoft Azure One of the “10 Hot New Cloud Security Products” at RSA 2018. TLS 1.3 Is Moving Forward: What You Need to Know Today to Get Ready. How to Achieve a Consistent Security Posture Even with a Multi‐Cloud Strategy. Prevent Security Tool Downtime with Inline Bypass Threat Prevention.

Read more >

All Killer, No Filler: How Metadata Became a Security Superpower at Gigamon

As enterprises battle to keep pace with online traffic growth by throttling up network speeds, they are beginning to lose the war on cybercrime. Why? Because security tools are limited in how much traffic they can intelligently process. At the same time, these tools are tasked with taking on increasingly sophisticated functions to combat ever‐more […]

Read more >

New Research from Gartner Reveals How to Securely Enable Digital Business

As a Gigamon customer, you know that visibility is the key to security. Simply put, you can’t secure what you can’t see. A recent research note from Gartner on continuous adaptive risk and trust assessment (CARTA) puts visibility into a wider context. Entitled “Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an […]

Read more >

Vela Trading Technologies Depends on Gigamon for Real‐Time Troubleshooting

As a global leader in high performance trading and market data technology, Vela knows the importance of low‐latency times and solid network performance. The company is partly made up of a former New York Stock Exchange (NYSE) Technologies division subsequently acquired by SR Labs. Now as an independent financial technology firm, Vela initiated an effort, […]

Read more >

Announcing the General Availability of GigaVUE‐HC3 Visibility Node

Gigamon is pleased to announce the release of the GigaVUE‐HC3 Visibility Node with pervasive visibility for the highest performance networks. Organizations are seeing increasing volumes of data surpassing the capacity and performance of monitoring and security tools. As attacks escalate, security teams face increased complexity, higher costs, and increasing loss of control. Security and management […]

Read more >