Gigamon Application Visualization identifie plus d’applications, avec plus de précision, et vous permet de partager ces informations avec votre écosystème d’outils.
La visualisation des applications vous permet de voir quelles applications sont utilisées ou utilisées de manière abusive au sein de votre organisation. Le tout sans tâche supplémentaire de votre part.
Moins d’efforts
Identifiez automatiquement les applications sans aucun effort manuel requis.
Mettez en lumière le Shadow IT
Surveillez et contrôlez les applications cachées et non autorisées.
Visibilité pour hiérarchiser et optimiser
Améliorez la capacité des outils en dirigeant le trafic applicatif spécifique vers les outils appropriés.
“Our world is more interconnected than ever, with IT networks sometimes co-existing with industrial control systems and IoT devices. With such a large attack surface, it’s vital that organizations move beyond a reactive, compliance-based approach to a dynamic cybersecurity program that integrates real-time visibility in order to mitigate vulnerabilities and threats faster.”
“Without complete visibility into their network traffic, it is impossible to identify high interest traffic, optimize network performance and secure the network. With Gigamon Application Intelligence, our clients are able to visualize, analyze and act on the movement patterns of network applications in real-time based on their individual networking, security and mission needs.”
GigaSMART® offers several essential traffic intelligence services required for deep observability into infrastructure blind spots.
NetFlow Generation
Delivers basic Layer 2–4 network traffic data to analysis tools.
Source Port Labeling
Provides context to packets and identifies behaviors and threats based on network location.
Adaptive Packet Filtering
Identifies patterns across any part of the network packet, including the packet payload.
De-duplication
Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.
Packet Slicing
Truncates packets while preserving the protocol headers required for network analysis.
Advanced Load Balancing
Divides and distributes traffic among multiple tools based on a variety of data points.
Advanced Flow Slicing
Reduces bandwidth usage by slicing payloads and packets from long data flows.
Masking
Provides customizable data protection by overwriting specific packet fields with a set pattern.
Tunneling
Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.
Application Visualization
Provides a complete view of the applications running on your network.
Application Filtering Intelligence
Extends Layer 7 visibility to thousands of common and proprietary applications.
Application Metadata Intelligence
Provides application visibility to identify performance and quality issues, and potential security risks.
GTP Correlation
Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.
FlowVUE Flow Sampling
Provides subscriber IP-based flow sampling.
5G Correlation
Forwards subscriber sessions to specific tools by filtering on subscriber, user device, RAN, or network slice IDs.
SSL/TLS Decryption
Creates a secure channel between the server and the end user's computer or other devices as they exchange information.