What is port spoofing?

The threat of malicious applications traveling over non-standard ports will always be present. What is port spoofing and how Gigamon helps organizations identify this malicious traffic?