Updated Gigamon.com Web Experience

We’re excited to introduce a refreshed Gigamon.com experience. On your next visit you’ll see new pages for the GigaSECURE Security Delivery Platform, GigaSECURE Cloud and inline threat prevention, plus new content to help you better navigate our products and solutions.

Read more >

Case Study: Clemson University — Balancing Network Performance and Security to Connect and Protect Today’s Great Minds

Clemson University recently upgraded its network and needed a solution that generated NetFlow and had proven success in higher education. Learn why the university chose the GigaSECURE Security Delivery Platform over Big Switch Networks to reduce false positives and optimize inline security tool performance without jeopardizing the efficiency of the university’s 100Gb network. Get the […]

Read more >

GigaVUE‐OS 5.3 Brings New Features for Inline Bypass

With the just‐announced 5.3 release, we’ve added new features to GigaVUE‐OS. Highlights include: Key Inline Bypass features such as flexible inline arrangements and resilient deployment architectures, completing the Gigamon Inline Bypass whole product offering. Metadata export in Comment Event Format (CEF). SSL decryption feature enhancement to store security keys in Thales Hardware Security Modules (HSM). […]

Read more >

Important Updates for Gigamon Customers

#1. The Metadata Generation Engine Now Supports CEF Log Format, Plus New Apps for QRadar and Splunk Integration Gigamon Metadata Generation Engine now supports CEF export, which is a text‐based, human readable, log friendly and broadly used meta data format. We also have two new apps to help you integrate with SIEM platforms from IBM […]

Read more >

General Availability of GigaSECURE Cloud for Microsoft Azure

Gigamon recently announced the general availability of GigaSECURE® Cloud for Microsoft Azure. Developed for enterprise customers with mission‐critical applications deployed in Azure, GigaSECURE Cloud enables organizations to acquire, optimize and distribute selected traffic to security and monitoring tools, ensuring business‐critical data in the cloud is protected and monitored by security operations. MORE: How to Achieve a […]

Read more >