Tips and How-To’s

Gigamon’s Top 10 IT Predictions for 2016

With the New Year on the horizon, we asked Johnnie Konstantas, director of security solutions marketing and business development at Gigamon, to peer into her crystal ball to bring you the leading predictions on what to expect in 2016. Check it out—exciting changes are imminent. SDN (software‐defined networks) will continue to be discussed, debated, and […]

Read more >

NetFlow Generation: The Security Value Proposition

Countless IT teams have scoured NetFlow/IPFIX data to pinpoint performance problems and spot signs of a security breach. This technique, though relatively inexpensive, can be extremely taxing on the networking devices responsible for generating such data (namely, routers and switches), resulting in increased latency and lost packets. Now there is a better way. Download the […]

Read more >

Tech Tip: Use the GigaVUE‐HC2 Copper TAP Module for Inline Bypass

Did you know that the Copper TAP module on Gigamon GigaVUE‐HC2 can now be used for inline bypass? GigaVUE‐OS™ 4.4 lets you configure the network ports of the GigaVUE‐HC2 TAP module (TAP‐HC0‐G100C0) as inline network ports. This enables the same Copper TAP hardware module to act as a copper bypass module, providing protected inline networks for copper ports. The TAP‐HC0‐G100C0 module features 12 pairs of […]

Read more >

Tech Tip: How to Mask Sensitive Data Before It Is Sent to a Tool

Does your organization handle sensitive data on a daily basis? If so, compliance can be a thorn in your side. The reason: Where sensitive data appears in packets can be a mystery, making it difficult to identify and protect. Fortunately, Gigamon GigaVUE® devices equipped with the GigaSMART® Adaptive Packet Filtering feature can search through packets […]

Read more >