
Intelligence to optimize and manage Layer 2–7 network traffic.
Vendor
Gigamon
Company Website
Overview
GigaSMART applications expand the capabilities in the Gigamon Deep Observability Pipeline to improve network visibility, traffic handling, and tool efficiency. Solutions include:
- Traffic Intelligence for streamlining traffic
- Application Intelligence to filter and extract app metadata
- Subscriber Intelligence for advanced 5G networks
- Security Intelligence for SSL/TLS decryption Combine or service-chain a range of GigaSMART applications to achieve exactly the results you want. Subscription-based GigaSMART applications are available for GigaVUE Visibility Appliances without port- or card-based restrictions. Select GigaSMART applications are also available with the GigaVUE Cloud Suite for public and private cloud.
Features
Traffic Intelligence
- Identifies patterns across any part of the network packet, including the packet payload.
- Reduces bandwidth usage by slicing payloads and packets from long data flows. Application Intelligence
- Automatically discovers applications and generates metadata attributes.
- Provides visibility into application performance and potential security risks. Subscriber Intelligence
- Monitors subscriber data in advanced 5G networks.
- Filters subscriber sessions based on various identifiers like user device or network slice IDs. Security Intelligence
- Decrypts SSL/TLS traffic to expose hidden threats.
- Applies customizable data protection by overwriting specific packet fields. NetFlow Generation
- Delivers basic Layer 2–4 network traffic data to analysis tools.
- Provides context to packets and identifies behaviors and threats based on network location. De-duplication
- Identifies and eliminates duplicate packets.
- Optimizes traffic flows by blocking unnecessary duplication. Advanced Load Balancing
- Distributes traffic among multiple tools based on various data points.
- Ensures efficient use of network resources. Masking
- Protects sensitive data by overwriting specific packet fields with a set pattern.
- Ensures data privacy during network analysis. Tunneling
- Provides visibility into business-critical traffic at remote sites or in the cloud.
- Creates secure channels for data exchange.
Benefits
Identify, Filter, & Enrich App Data Use Application Intelligence to automatically discover applications, generate metadata attributes, and forward them to the appropriate tools. Reduce Unnecessary Processing Utilize Advanced Flow Slicing to granularly select and drop superfluous packet content to reduce traffic sent to tools by over 60 percent. Maintain Strong Security Posture Apply SSL/TLS Decryption to decrypt traffic with the latest cipher suites and share with tools to expose malware hiding in encrypted sessions.