We’re excited to introduce a refreshed Gigamon.com experience. On your next visit you’ll see new pages for the GigaSECURE Security Delivery Platform, GigaSECURE Cloud and inline threat prevention, plus new content to help you better navigate our products and solutions.
Case Study: Clemson University — Balancing Network Performance and Security to Connect and Protect Today’s Great Minds
Clemson University recently upgraded its network and needed a solution that generated NetFlow and had proven success in higher education. Learn why the university chose the GigaSECURE Security Delivery Platform over Big Switch Networks to reduce false positives and optimize inline security tool performance without jeopardizing the efficiency of the university’s 100Gb network. Get the […]
Get your copy of this information‐packed report, based on an IDG CSO survey, to learn how centralized next‐generation network packet brokers provide granular visibility into all segments of the network so they can better tackle threats while reducing costs. Download the report today >
With the just‐announced 5.3 release, we’ve added new features to GigaVUE‐OS. Highlights include: Key Inline Bypass features such as flexible inline arrangements and resilient deployment architectures, completing the Gigamon Inline Bypass whole product offering. Metadata export in Comment Event Format (CEF). SSL decryption feature enhancement to store security keys in Thales Hardware Security Modules (HSM). […]
#1. The Metadata Generation Engine Now Supports CEF Log Format, Plus New Apps for QRadar and Splunk Integration Gigamon Metadata Generation Engine now supports CEF export, which is a text‐based, human readable, log friendly and broadly used meta data format. We also have two new apps to help you integrate with SIEM platforms from IBM […]
Gigamon recently announced the general availability of GigaSECURE® Cloud for Microsoft Azure. Developed for enterprise customers with mission‐critical applications deployed in Azure, GigaSECURE Cloud enables organizations to acquire, optimize and distribute selected traffic to security and monitoring tools, ensuring business‐critical data in the cloud is protected and monitored by security operations. MORE: How to Achieve a […]