Security

Gigamon’s Top 10 IT Predictions for 2016

With the New Year on the horizon, we asked Johnnie Konstantas, director of security solutions marketing and business development at Gigamon, to peer into her crystal ball to bring you the leading predictions on what to expect in 2016. Check it out—exciting changes are imminent. SDN (software‐defined networks) will continue to be discussed, debated, and […]

Read more >

Securing Virtual Traffic Just Got Easier with the Joint Gigamon‐RSA Solution

Attacks happen. And with virtualization on the rise—in the form of VM, VDI, and SDDC technologies—they’re happening all the time. That’s where Gigamon and RSA come in. Designed to detect security breaches across both physical and virtual environments, this powerful joint solution enables you to capture traffic that travels exclusively between virtual machines and never […]

Read more >

Gigamon Launches GigaSECURE, the Industry’s First Security Delivery Platform

In July Gigamon introduced GigaSECURE®—the IT industry’s first Security Delivery Platform—offering enterprises a more efficient and cost‐effective security architecture. The timing couldn’t be better. A recent survey of more than 800 security decision‐makers showed that “71% of respondents’ networks were breached in 2014, up from 62%” and “52% of respondents believe a successful attack is […]

Read more >

FireEye + Gigamon: A One‐Two Knockout Punch

FireEye is one of today’s top security companies, leading the charge against advanced persistent threats (APTs) with industry‐leading solutions currently used by companies around the globe.1 These deployments can be enhanced with the advanced visibility, scaling, and efficiency provided by Gigamon’s solutions. The Gigamon Visibility Fabric™ extends the reach of FireEye threat detection to virtualized […]

Read more >

NetFlow Generation: The Security Value Proposition

Countless IT teams have scoured NetFlow/IPFIX data to pinpoint performance problems and spot signs of a security breach. This technique, though relatively inexpensive, can be extremely taxing on the networking devices responsible for generating such data (namely, routers and switches), resulting in increased latency and lost packets. Now there is a better way. Download the […]

Read more >

Tech Tip: How to Mask Sensitive Data Before It Is Sent to a Tool

Does your organization handle sensitive data on a daily basis? If so, compliance can be a thorn in your side. The reason: Where sensitive data appears in packets can be a mystery, making it difficult to identify and protect. Fortunately, Gigamon GigaVUE® devices equipped with the GigaSMART® Adaptive Packet Filtering feature can search through packets […]

Read more >