Professional Documents
Culture Documents
BACKGROUND: PERFORMANCE:
• Founded in 2004 • World’s #1 Visibility Platform
• Headquarters: Santa Clara, CA, U.S. • Named #1 Network Monitoring Equipment (NME)
• Global Offices: 20 countries Vendor Worldwide by Market Share*
• 799 employees • Key Verticals: Federal, Financial Services,
Healthcare, Retail, Technology, Service Providers
• Over 2,500 customers
• $311M Revenue in FY16, +40% Year-over-Year
*Source: IHS Markit Report, Network Monitoring Equipment, May 19, 2017
©2017
©2016 Gigamon. All rights reserved. 2
The Data-in-Motion Dilemma
VOLUME + SPEED + THREATS = COMPLEXITY + RISK + COST
Volume
Network Data
Security tools do not
scale as fast as data
Machine to 6.7 ns available to
Machine process a network
packet on a 100Gb link
Internet
of Things 4.7ZB of global data
Data Center center traffic in 2016*
Emergence transition to 100Gb
of Big Data 1.7PB of M2M
Security Tool traffic in 2017**
Time
*Cisco Global Cloud Index 2016.
**Statista Global machine-to-machine (M2M) data traffic from 2014 to 2019 (in petabytes per month)
✕ Extraordinary costs
Data Loss
Routers Advanced
Persistent
✕ Contention for access to traffic
Prevention Advanced
On-premiseRouters Advanced
Data Loss Persistent
Prevention Data Center Advanced
Threat
Data Loss Advanced Persistent
Data Loss
Prevention
Prevention
“Spine”
Switches
Persistent
Threat
Security Delivery Platform
Threat
Remote
Sites
Private
“Leaf”
Email Threat Cloud
Switches Reach physicalSIEM Metadata for Targeted Detection of Inline mode for
Detection
and virtual
SIEM
networks Improved inspection encrypted threats visibility and control
Email Threat
Forensics
Detection SIEM
Public
Email Threat Virtualized
Cloud
Detection
Server Farm
On-premise
Data Center
Private
Cisco ACI Private
Cloud Physical,
Reach Virtual
physical Metadata
Metadata for Application
Targeted SSL of
Detection Inline
Inline mode for
Cloud and Cloud Engine Session Filtering Decryption Bypass
and virtual networks Improved inspection encrypted threats visibility and control
forensics
Public
Public
Cloud
Cloud
“… access to high fidelity “Even the best security “…To be effective, a “…GigaSECURE Security
network traffic is a vital appliance will fail to security appliance needs Delivery Platform sheds
step in the implementation deliver if it does not get to be able to access the light on insider initiated
of advanced protections.” the right traffic…” right network traffic…” threats, it can provide
complementary visibility
to the network traffic that
Palo Alto Networks sees…”
Security and
Vulnerability
Gigamon Visibility Platform
Management
Service
Provider
Network &
Application
Performance
Management
Infrastructure
Orchestration
Traffic Intelligence
Visibility Nodes
Any Network
Data Center, Hybrid and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites
SSL
Slicing Tunneling
Decryption
Visibility
Nodes Intelligent Visibility Public Cloud Virtual Traffic Aggregators Network TAPs
Any Network
Data Center, Hybrid and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites
Switch 2 Switch 2
Switch 3 Switch 3
VoIP Analyzer
Customer migrates to a 10Gb network and Customer able to extend the life
1Gb monitoring tools become useless of their 1Gb network and security tools
Intrusion
Detection
System (IDS)
Intrusion Detection
System (IDS) Application
Performance
Application Performance
Management
Management
Switch with two SPAN
session limitation VoIP Analyzer
VoIP Analyzer Switch with
two SPAN
ports Packet
Packet Capture
Capture
Customer is unable to use all tools! Customer has complete visibility for all tools!
Remote 4 Remote 4
Switch 4 Switch 4
Central
Central
Switch Switch
1 site per Tool – Tools not optimized Centralize the Tools for maximum efficiency
POC #2
Vendor Y
Tool tested w/ NW Tool tested w/ same NW Tool tested w/ same NW Tool
Segment – 4 weeks Segment – 4 weeks Segment – 4 weeks
POC #3
Vendor Z
Tool
Customer performs each Proof-of-Concept (POC) Customer is able to run multiple POCs
serially at different times using different data concurrently using same data
VIRTUALIZE
SERVER
SERVER
Hypervisor Hypervisor
SERVER SERVER
Switch
Switch
GigaVUE-VM
IDS
HYPERVISOR HYPERVISOR
ANTI-MALWARE
SERVER SERVER
APM
Monitor VM1
vSwitch vSwitch
Security
Core Core
Application
GigaVUE-VM Performance
• Flow Mapping™
• Filter on VM, application ports
• Packet slicing at any offset Spine Spine
• Tunneling for multi-tenant
Network
Tunnel Port
DB Server Network
Performance
Leaf Leaf Leaf Leaf
DB
OS
Tunneling Security
SSL
Slicing Tunneling
Decryption
Visibility
Nodes Intelligent Visibility Public Cloud Virtual Traffic Aggregators Network TAPs
Any Network
Data Center, Hybrid & Private Cloud Public Cloud Service Provider Networks Remote Sites
Volume, types and amount of data overwhelm SIEMs Metadata Engine Benefits:
• High Performance
• Cost Savings
• Full visibility, better security
* Planned Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Edge Routers
NetFlow SSL
Generation Decryption
GigaStream™
GigaVUE-VM
9 8 7 6 5 4 3 2 1
based on specific signatures
9 4 8 6 4 7 2
GigaVUE-VM
✓ Improve efficiency of
SIEM security appliances
✓ Analyze and respond to
incidents using custom
regex patterns
SSL Session
Leg 2 Inline Tool Group
(encrypted) (decrypted traffic)
KEY BENEFITS
Scalable GigaSMART®
• Inline SSL Decryption
Scalable GigaSMART®
• Inline SSL Decryption