member sign-in
Forgot password? Create new account Close

Network Infrastructure


The Network Infrastructure is defined here as the physical infrastructure used to transmit data and comprises routers, switches, gateways, bridges, etc. that all the services and applications are delivered upon

Enterprise LAN Routing and Switching

In networking, switching and routing refers basically to packet management over a LAN or a WAN. Through different switching technologies that are crucial to network design, switches allow traffic to be sent only where it is needed in most cases, using fast, hardware-based ...

Network Traffic Visibility and Analytics

Traffic Visibility Networking contains specific solutions for enterprises, data centers and service providers that empower infrastructure architects, managers and operators with unmatched visibility into the traffic traversing both physical and virtual networks without affecting ...

Wireless LAN

Wireless Local Area Networks are platforms comprised by devices using wireless distribution methods (usually radio) that provide a connection through an access point and allow mobile users to connect to a Local Area Network and beyond, to the Internet. So, users connected ...


  • The Power of Selective Decryption

    During Gigamon’s recent sales kickoff, I sat down with Global Security Strategist Ian Farquhar to talk about the trend toward stronger encryption and the pros and cons of the pending TLS 1.3 standard. As you’ll see, we also got to share exciting news about Gigamon’s new inline SSL Decryption functionality that addresses a corresponding need for selective decryption to gain visibility into encrypted traffic. Here are some of the highlights, but we invite you to watch our video series to learn more. Right to Encrypt/Decrypt In response ...

    read all
  • Best practices for securing, analyzing, and mitigating threats to your AWS applications

    Tuesday, March 28th, 2017 at 1:00 PM EST (17:00:00 UTC) Companies are increasingly moving applications to Amazon Web Services to leverage the scale, elasticity, and innovative services capabilities of the public cloud. According to a recent Intel survey of 2000 IT professionals, 93% are using some type of cloud service with more than 60% moving customer data into cloud infrastructures. As networks expand and perimeters fade, IT Administrators and Security Operations teams face growing challenges in managing, securing, and understanding the data traversing ...

    read all
  • Security Leaders Discuss Reality of AI vs. Machine Learning to Fight Cyber Attacks

    Last week at the RSA 2017 Conference, Gigamon hosted a CSO Panel Luncheon, where we invited security industry leaders to debate on the emerging security defenses—including what role artificial intelligence (AI) and machine-based learning might play, and in light of the democratization of malware, shortage of security expertise, and fact that adversaries are already using automated methods. CSO Magazine Publisher Bob Bragdon moderated the impressive lineup including: Shehzad Merchant, Gigamon CTO Janet Levesque, RSA CISO Jack Leidecker, ...

    read all
  • How to Use Network Visibility to Bolster Security Effectiveness

    News on breaches continue to hit the headlines every day. In this Webinar, our guest Forrester Vice President and Principal Analyst John Kindervag discusses key insights on the “Streetlight Effect”, which highlights the central role that visibility plays in modern data security architectures to detect early signs of attacker activity. He will be accompanied by Gigamon Vice President of Products, who will outline an architectural approach called the “Security Delivery Platform” that enables organizations to gain pervasive visibility in today’s ...

    read all
  • Top Healthcare Topics from HIMSS Forum

    In healthcare, there can often be a disconnect between IT and executive leadership when it comes to prioritization of cybersecurity risk management. Finding ways to bridge this gap has been a prevailing theme at both this week’s HIMSS 2017 Conference and Exhibition and last quarter’s HIMSS Privacy and Security Forum. Between Two Worlds When it comes to cybersecurity governance for healthcare, I’m a bit of a unicorn—in that I work both in the cybersecurity industry at Gigamon Canada and serve as an active member on the board of directors ...

    read all