Introducing GigaVUE-HC3 with Traffic Intelligence at Scale for the Most Demanding Networks
Enterprises, services providers, and the public sector are seeing more and more volumes of data traveling faster and faster through their networks. This generates more complexity, more cost, and more vulnerability to security threats than ever before.
To solve this challenge we need pervasive visibility into the data moving throughout the network infrastructure. The GigaVUE-HC3 visibility node enables comprehensive traffic and security intelligence at scale to see more, secure more, and meet the needs of your security and monitoring infrastructure.
See more, secure more
With up to 25Tbps of traffic intelligence processing across 32 clustered nodes, the GigaVUE-HC3 enables you to gain deeper visibility into your data-in-motion, minimize traffic overload, extract metadata from network traffic, and provide more effective options to deploy both inline and out-of-band security tools.
Scale to your needs
The GigaVUE-HC3 visibility node provides comprehensive security intelligence in 10, 40, and 100Gb networks. With mix-and-match capabilities, this modular appliance enables you to establish and expand your visibility platform as your needs grow, and to maximize ROI.
- Deliver up to 25Tbps of processing power for optional GigaSMART® technologies
- Forward complex traffic decisions at wire-speed performance
- Scale your platform with 100Gb connectivity, modular design, and 32-node clusters
- Consolidate and simplify your security infrastructure
- Enhance your network security with GigaSECURE® traffic intelligence applications
- Provide session and security awareness with metadata generation on line rate 100Gb connectivity
Use the GigaVUE-HC3 for…
Application and service monitoring
- Eliminate contention for network data
- Centralize NetFlow/IPFIX Generation
- Filter streaming media and custom Layer 7 applications
On-premise monitoring of cloud services
- Get visibility into SDN infrastructure, as well as private and public clouds
Leverage legacy investments
- Take advantage of legacy tools with mismatched throughput connectivity
- Get network visibility during network upgrades
Security posture optimization
- Active security remediation with inline bypass
- Identify malware activity through metadata generation