Articles By: Gigamon

Adressing the Threat Within: Rethinking Network Security Deployment

Download the Gigamon white paper, “Addressing the Threat Within: Rethinking Network Security Deployment”, to learn how evolving cyber security threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how the benefits of increased security […]

Read more ›

Inline Bypass: Scaling Inline Threat Prevention Tools to Keep Pace with High-Speed Networks

Stop deploying prevention tools in detection mode only. Get the “Scaling Inline Threat Prevention Tools to Keep Pace with High-Speed Networks” whitepaper. Read how inline bypass removes failure points by automatically distributing traffic to the right tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your […]

Read more ›

Gigamon / Splunk – Accelerate Threat Detection and Response

Read the Joint Solution Brief “Accelerate Threat Detection and Response” to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and […]

Read more ›

Nine Metadata Use Cases

Download Nine Metadata Use Cases: How to Use Metadata to Make Data-Driven Decisions to see how the increasing volume and velocity of data makes separating good traffic from bad costly and practically impossible. Read about nine specific use cases for metadata that will help you make better security decisions. Learn how you inspect every traffic packet with 1:1 sampling as […]

Read more ›

Tech WP: Harnessing the Power of Metadata for Security

Download Gigamon’s white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power. Metadata is data about data or put another way, a kind of summary or high-level view of data. By providing security tools with summary takes of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking […]

Read more ›

Gigamon Improves Security Visibility With Splunk Enterprise

Read the Joint Solution Brief Gigamon Improves Security Visibility with Splunk Enterprise to see how to effectively analyze network events for security threats. Benefits include enhanced visibility and deeper, faster security analytics and intelligence based on all machine data (not just security events), the ability to access new sources of information via the network, the reduction of device-specific agents to […]

Read more ›

IDC Report: The Benefits of Network Visibility in Optimizing Security

The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today’s mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides […]

Read more ›

Addressing the Threat Within: Rethinking Network Security Deployment

Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness […]

Read more ›