Introducing GigaVUE-HC3 with Traffic Intelligence at Scale for the Most Demanding Networks

 

Enterprises, services providers, and the public sector are seeing more and more volumes of data traveling faster and faster through their networks. This generates more complexity, more cost, and more vulnerability to security threats than ever before.

To solve this challenge we need pervasive visibility into the data moving throughout the network infrastructure. The GigaVUE-HC3 visibility node enables comprehensive traffic and security intelligence at scale to see more, secure more, and meet the needs of your security and monitoring infrastructure.

See more, secure more

With up to 25Tbps of traffic intelligence processing across 32 clustered nodes, the GigaVUE-HC3 enables you to gain deeper visibility into your data-in-motion, minimize traffic overload, extract metadata from network traffic, and provide more effective options to deploy both inline and out-of-band security tools.

Scale to your needs

The GigaVUE-HC3 visibility node provides comprehensive security intelligence in 10, 40, and 100Gb networks. With mix-and-match capabilities, this modular appliance enables you to establish and expand your visibility platform as your needs grow, and to maximize ROI.

Key benefits

Network operations

  • Deliver up to 25Tbps of processing power for optional GigaSMART® technologies
  • Forward complex traffic decisions at wire-speed performance
  • Scale your platform with 100Gb connectivity, modular design, and 32-node clusters

Security operations

  • Consolidate and simplify your security infrastructure
  • Enhance your network security with GigaSECURE® traffic intelligence applications
  • Provide session and security awareness with metadata generation on line rate 100Gb connectivity

Use the GigaVUE-HC3 for…

Application and service monitoring

  • Eliminate contention for network data
  • Centralize NetFlow/IPFIX Generation
  • Filter streaming media and custom Layer 7 applications

On-premise monitoring of cloud services

  • Get visibility into SDN infrastructure, as well as private and public clouds

Leverage legacy investments

  • Take advantage of legacy tools with mismatched throughput connectivity
  • Get network visibility during network upgrades

Security posture optimization

  • Active security remediation with inline bypass
  • Identify malware activity through metadata generation

Comments are currently closed.