SlideShare a Scribd company logo
1 of 2
Download to read offline
1© 2013-2015 Gigamon. All rights reserved.
Drive Your Traffic with Intelligence
GigaSMART®
technology extends the intelligence and value of
the Gigamon Unified Visibility Fabric™ by enhancing your
monitoring infrastructure and improving tool performance. A range
of applications are available to optimize the traffic sent from your
network to the tool you rely upon to monitor, manager, and secure
that network. GigaSMART’s advanced processing engine can be
accessed anywhere within the Visibility Fabric without port- or
card-based restrictions. GigaSMART engines can be combined to process higher traffic
loads and optimized for specific applications. Operations can be combined or “service
chained” so traffic benefits from multiple functions at once, such as generating NetFlow
after duplicates have been removed or stripping headers before load balancing to tools.
Network monitoring tools perform more efficiently by eliminating unwanted content with
the de-duplication and packet slicing features. SSL Decryption provides visibility into
encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking
allows network security teams to hide confidential information such as passwords,
financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI
compliance regulations. Organizations can improve accuracy with the source port labeling
and time stamping capabilities, which allow the addition of source or timing information at the point of collection. Enhanced packet
distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when
combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers.
The advanced processing capabilities of the GigaSMART engine can also be leveraged to summarize and generate NetFlow statistics
from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Gigamon Visibility Fabric eliminates the risk of
expending expensive production network resources in generating these analytics. Enhanced flow-level visibility across remote locations
and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning
and enforcing security policies.
Features & Benefits
Quick Specs
üü High-performance compute engine
üü Available on GigaVUE H Series and
GigaVUE-2404
üü Packet transformation, packet
modification, and stateful session
correlation
üü Service chaining capability to
combine multiple GigaSMART
operations
üü Advanced traffic intelligence
available across the entire cluster
without any port-level or card-level
restrictions
Product Brief
GigaSMART
Adaptive Packet Filtering De-duplication
•	 Add labels to the packets indicating the ingress port
•	 Easily identify where a packet is coming from
•	 Enhance the efficiency of your network monitoring tools by
eliminating the potential of duplicate data stream
•	 Intelligent protocol-aware filtering across advanced
encapsulation headers including VXLAN, VN-Tag, GTP, MPLS,
etc., and inner (encapsulated) Layer3/Layer4 packet contents
•	 Advanced visibility into the application layer using pattern
matching regular expressions-based filters
•	 Mask private and sensitive data in the packet before it gets
stored, maintaining SOX, PCI, and HIPAA compliance
Product Brief: GigaSMART
2003-12 05/15
3300 Olcott Street, Santa Clara, CA 95054 USA | +1 (408) 831-4000 | www.gigamon.com
© 2013-2015 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or
other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks
of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
•	 Eliminate the need for monitoring tools to decipher protocols
•	 Allow easy filtering, aggregation, and load balancing of packets
with headers removed
•	 Support for ISL header/trailer removal and VXLAN, VNTAG,
VLAN, MPLS, and GTP-U tunnel stripping
Header Stripping
Load Balancing
•	 Add labels to the packets indicating the ingress port
•	 Easily identify where a packet is coming from
•	 Enhance the efficiency of your network monitoring tools by
eliminating the potential of duplicate data streams
NetFlow Generation
•	 Increase infrastructure efficiencies by offloading NetFlow
Generation to the Visibility Fabric
•	 Out-of-Band solution completely eliminates the risk of dropping
production traffic on busy routers or switches as a result of
generating NetFlow
NetFlow Generation continued
•	 Unsampled 1:1 NetFlow record generation to facilitate true
response and root cause capability
•	 Integrated traffic visibility solution with NetFlow Generation
support simultaneously provides both flow and packet statistics
to a variety of monitoring, analysis, and security tools
Masking
•	 Overwrite packet data between ad 64-9000 byte offset
•	 Conceal private data including financial and medical information
Source Port Labeling
•	 Add labels to the packets indicating the ingress port
•	 Easily identify where a packet is coming from
•	 Enhance the efficiency of your network monitoring tools by
eliminating the potential of duplicate data streams
SSL Decryption
•	 Provide visibility into encrypted sessions
•	 Send decrypted packets to multiple out-of-band tools: IDS, DLP,
APM, CEM, etc.
•	 Private server keys are encrypted and protected by role-based
access controls
Time Stamping
•	 Add Packet time stamps at line rate for subsequent analysis
•	 Troubleshoot and measure application response times jitter
and latency
•	 Applicable for GigaVUE-2404
Tunneling
•	 Encapsulate and forward packets to monitoring tools between
networks on separate routed paths
•	 Enable routing of data from lights-out data centers to central
monitoring facilities
•	 Reduce packet size to increase processing and
monitoring throughput
•	 Optimize the deployment of forensic recorder tools
Packet Slicing
FlowVUE™
•	 Flow-aware sampling of active subscriber devices to selectively
reduce traffic
•	 Preserve or increase CEM based on real-time reduced data
analytic throughput
•	 Leveraging Big Data to tailor marketing campaigns, pricing
strategies, etc., based on subscriber usage patterns
GTP Correlation
•	 Optimize tool infrastructure by accurate filtering, replicating,
and forwarding monitored subscriber sessions
•	 Correlate subscriber sessions (control and data) to offload tools,
increasing throughput
•	 Facilitate drilldowns into roaming users across peer networks

More Related Content

What's hot

Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
ChessBall
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
idsecconf
 

What's hot (20)

Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Firewalls
FirewallsFirewalls
Firewalls
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experience
Cisco Connect Halifax 2018   Optimizing your client's wi-fi experienceCisco Connect Halifax 2018   Optimizing your client's wi-fi experience
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experience
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
 
Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021
Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021
Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
ICPDAS - Modbus Concentrator 700 series
ICPDAS - Modbus Concentrator 700 seriesICPDAS - Modbus Concentrator 700 series
ICPDAS - Modbus Concentrator 700 series
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service Providers
 
Adapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear passAdapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear pass
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 

Similar to Advanced Network Traffic Intelligence with GigaSmart - Product Brief

Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
Tom Kopko
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaper
Abhishek Iyer
 

Similar to Advanced Network Traffic Intelligence with GigaSmart - Product Brief (20)

Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief
 
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case StudyAlfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
 
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
EXTENT-2016: Network Instrumentation Challenges and Solutions
EXTENT-2016: Network Instrumentation Challenges and SolutionsEXTENT-2016: Network Instrumentation Challenges and Solutions
EXTENT-2016: Network Instrumentation Challenges and Solutions
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
brocade-swisscom-ss
brocade-swisscom-ssbrocade-swisscom-ss
brocade-swisscom-ss
 
Application of Cloud Computing in the Retail sector
Application of Cloud Computing in the Retail sectorApplication of Cloud Computing in the Retail sector
Application of Cloud Computing in the Retail sector
 
Air Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAir Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management Systems
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Castrum
CastrumCastrum
Castrum
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
 
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaper
 

More from gigamon

Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
gigamon
 

More from gigamon (13)

How subscriber aware traffic processing yielded big savings for us wireless p...
How subscriber aware traffic processing yielded big savings for us wireless p...How subscriber aware traffic processing yielded big savings for us wireless p...
How subscriber aware traffic processing yielded big savings for us wireless p...
 
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
 
Guardium
GuardiumGuardium
Guardium
 
Tealeaf
TealeafTealeaf
Tealeaf
 
Reconnex
ReconnexReconnex
Reconnex
 
Coradiant
CoradiantCoradiant
Coradiant
 
Network Instruments
Network InstrumentsNetwork Instruments
Network Instruments
 
WildPackets
WildPacketsWildPackets
WildPackets
 
FireEye
FireEyeFireEye
FireEye
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
Network Physics
Network PhysicsNetwork Physics
Network Physics
 
Gigamon Systems Hardware Tour
Gigamon Systems Hardware TourGigamon Systems Hardware Tour
Gigamon Systems Hardware Tour
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Advanced Network Traffic Intelligence with GigaSmart - Product Brief

  • 1. 1© 2013-2015 Gigamon. All rights reserved. Drive Your Traffic with Intelligence GigaSMART® technology extends the intelligence and value of the Gigamon Unified Visibility Fabric™ by enhancing your monitoring infrastructure and improving tool performance. A range of applications are available to optimize the traffic sent from your network to the tool you rely upon to monitor, manager, and secure that network. GigaSMART’s advanced processing engine can be accessed anywhere within the Visibility Fabric without port- or card-based restrictions. GigaSMART engines can be combined to process higher traffic loads and optimized for specific applications. Operations can be combined or “service chained” so traffic benefits from multiple functions at once, such as generating NetFlow after duplicates have been removed or stripping headers before load balancing to tools. Network monitoring tools perform more efficiently by eliminating unwanted content with the de-duplication and packet slicing features. SSL Decryption provides visibility into encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking allows network security teams to hide confidential information such as passwords, financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI compliance regulations. Organizations can improve accuracy with the source port labeling and time stamping capabilities, which allow the addition of source or timing information at the point of collection. Enhanced packet distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers. The advanced processing capabilities of the GigaSMART engine can also be leveraged to summarize and generate NetFlow statistics from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Gigamon Visibility Fabric eliminates the risk of expending expensive production network resources in generating these analytics. Enhanced flow-level visibility across remote locations and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning and enforcing security policies. Features & Benefits Quick Specs üü High-performance compute engine üü Available on GigaVUE H Series and GigaVUE-2404 üü Packet transformation, packet modification, and stateful session correlation üü Service chaining capability to combine multiple GigaSMART operations üü Advanced traffic intelligence available across the entire cluster without any port-level or card-level restrictions Product Brief GigaSMART Adaptive Packet Filtering De-duplication • Add labels to the packets indicating the ingress port • Easily identify where a packet is coming from • Enhance the efficiency of your network monitoring tools by eliminating the potential of duplicate data stream • Intelligent protocol-aware filtering across advanced encapsulation headers including VXLAN, VN-Tag, GTP, MPLS, etc., and inner (encapsulated) Layer3/Layer4 packet contents • Advanced visibility into the application layer using pattern matching regular expressions-based filters • Mask private and sensitive data in the packet before it gets stored, maintaining SOX, PCI, and HIPAA compliance
  • 2. Product Brief: GigaSMART 2003-12 05/15 3300 Olcott Street, Santa Clara, CA 95054 USA | +1 (408) 831-4000 | www.gigamon.com © 2013-2015 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice. • Eliminate the need for monitoring tools to decipher protocols • Allow easy filtering, aggregation, and load balancing of packets with headers removed • Support for ISL header/trailer removal and VXLAN, VNTAG, VLAN, MPLS, and GTP-U tunnel stripping Header Stripping Load Balancing • Add labels to the packets indicating the ingress port • Easily identify where a packet is coming from • Enhance the efficiency of your network monitoring tools by eliminating the potential of duplicate data streams NetFlow Generation • Increase infrastructure efficiencies by offloading NetFlow Generation to the Visibility Fabric • Out-of-Band solution completely eliminates the risk of dropping production traffic on busy routers or switches as a result of generating NetFlow NetFlow Generation continued • Unsampled 1:1 NetFlow record generation to facilitate true response and root cause capability • Integrated traffic visibility solution with NetFlow Generation support simultaneously provides both flow and packet statistics to a variety of monitoring, analysis, and security tools Masking • Overwrite packet data between ad 64-9000 byte offset • Conceal private data including financial and medical information Source Port Labeling • Add labels to the packets indicating the ingress port • Easily identify where a packet is coming from • Enhance the efficiency of your network monitoring tools by eliminating the potential of duplicate data streams SSL Decryption • Provide visibility into encrypted sessions • Send decrypted packets to multiple out-of-band tools: IDS, DLP, APM, CEM, etc. • Private server keys are encrypted and protected by role-based access controls Time Stamping • Add Packet time stamps at line rate for subsequent analysis • Troubleshoot and measure application response times jitter and latency • Applicable for GigaVUE-2404 Tunneling • Encapsulate and forward packets to monitoring tools between networks on separate routed paths • Enable routing of data from lights-out data centers to central monitoring facilities • Reduce packet size to increase processing and monitoring throughput • Optimize the deployment of forensic recorder tools Packet Slicing FlowVUE™ • Flow-aware sampling of active subscriber devices to selectively reduce traffic • Preserve or increase CEM based on real-time reduced data analytic throughput • Leveraging Big Data to tailor marketing campaigns, pricing strategies, etc., based on subscriber usage patterns GTP Correlation • Optimize tool infrastructure by accurate filtering, replicating, and forwarding monitored subscriber sessions • Correlate subscriber sessions (control and data) to offload tools, increasing throughput • Facilitate drilldowns into roaming users across peer networks