Unified Visibility Fabric Architecture – A New Approach to Visibility

Get the White Paper

October 21st, 2013

By Gigamon

Gigamon’s Unified Visibility Fabric architecture provides a new approach to monitoring and management of IT infrastructure. By centralizing tools and connecting them into the Visibility Fabric, significant cost savings and operational efficiencies can be realized. The Unified Visibility Fabric architecture provides pervasive visibility across campus, branch, virtualized and, ultimately, SDN islands and consists of four key components—Visibility Fabric nodes, Management, Orchestration and Applications, which when taken together provide a scalable, flexible and centralized Visibility Fabric solution.

Visibility into the Cloud and Virtualized Data Center

Get the White Paper

June 24th, 2013

by Gigamon

IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities. At the same time, it is not unusual for organizations to issue broad mandates to cut back on spending budgets. In these tough times, the adoption of disruptive technologies holds the key to improving efficiency and truly accomplishing more with less. Cloud computing and virtualization as a technology is one such innovation that allows creation of a more dynamic and flexible infrastructure by maximizing resource utilization while increasing IT service delivery. With more of the path of application data being shrouded in virtual
networks, managing and monitoring network operations with traditional approaches is becoming difficult. IT leaders and stakeholders are constantly struggling with gaining back visibility, maintaining and improving application performance, and enforcing corporate regulatory policies across this new type of network while also leveraging benefits brought by virtualization; this white paper shows you how.

The Visibility Fabric Architecture–A New Approach to Traffic Visibility

Get the White Paper

June 10th, 2013

by Gigamon

The volume of digital information created and replicated will grow from 1.8 trillion gigabytes in 2011 to 7.9 trillion gigabytes in 2015. IDC

By 2014 70% of IT risk and security officers in the Global 2000 will be required to report at least annually to their board of directors on the state of IT security within their organization. Gartner

There are many drivers to network visibility. The Gigamon Visibility Fabric architecture empowers network and security architects, engineers and operators to design and deploy an intelligent infrastructure by applying user-defined “map” logic to select the appropriate, relevant and critical network traffic flows and deliver them to centralized security, monitoring and management systems. This new approach can extend the network reach of tools to significantly improve return on investment, allows IT organizations to more efficiently manage and secure their network, and provides a solution that can quickly evolve and scale as network needs change.

Gigamon’s Shehzad Merchant On The Killer SDN App: Network Visualization

Listen to the Podcast

May 13th, 2013

Shehzad_Merchant_On_The_Killer_SDN_App_Network_VisualizationAs the need for visibility of applications flowing inside networks grows, network architecture itself is changing thanks to network plus server virtualization in data centers, and now Software-Defined Networking. Also trends like BYOD, virtualization, and application mobility are bringing complexity and a new dynamism to today’s networks. Shehzad Merchant, Chief Strategy Officer at Gigamon joins me to discuss the role of network visualization in the world of Software-Defined Networking.

Lippis Report 207: The Killer SDN Applications: Network Virtualization and Visualization

April 8th, 2013

nicklippis.jpgAt the last Open Networking User Group (ONUG) meeting in Boston organized with partner Fidelity Investments, it became very clear that there are two killer SDN applications: network virtualization and visualization. Some argue that network virtualization used for VM-VM networking is not an SDN technology, but I beg to differ. Sure, there are closed and open approaches to network virtualization, but over the next business cycle, the integration of OpenStack and OpenFlow will make it clear that network virtualization is an SDN application, especially as it’s extended to physical networks. The second killer app is network visualization—that is, the ability to monitor network traffic and tweak application performance.   At ONUG Rich Groves, Principal Architect at Microsoft presented his SDN based approach to network visualization he designed with Big Switch Networks, cPacket, IBM, Arista and other suppliers that everyone is now using.  Why is network visualization an SDN killer app? Because it uses SDN technology, and most importantly, lowers the capital cost significantly from existing network visualization approaches while also delivering an entirely new level of self-server flexibility. Companies, such as Big Switch Networks, Gigamon, Arista, Cisco, NetScout, Ixia/Anue, cPacket and others, are now positioning their network visualization offers within an SDN context and for good reason. In this Lippis Report Research Note, I focus on network visualization as an SDN killer app.

Read the rest of this entry »

The Visibility Fabric Architecture–A New Approach to Traffic Visibility

Get the White Paper

April 8th, 2013

The volume of digital information created and replicated will grow from 1.8 trillion gigabytes in 2011 to 7.9 trillion gigabytes in 2015. IDC

By 2014 70% of IT risk and security officers in the Global 2000 will be required to report at least annually to their board of directors on the state of IT security within their organization. Gartner

There are many drivers to network visibility. The Gigamon Visibility Fabric architecture empowers network and security architects, engineers and operators to design and deploy an intelligent infrastructure by applying user-defined “map” logic to select the appropriate, relevant and critical network traffic flows and deliver them to centralized security, monitoring and management systems. This new approach can extend the network reach of tools to significantly improve return on investment, allows IT organizations to more efficiently manage and secure their network, and provides a solution that can quickly evolve and scale as network needs change.