A protocol for transmitting the human voice in digital form over the Internet or other networks as an audio stream, instead of using traditional telephone lines.



Corporations continue to expand and upgrade their networks. The ability to access critical data points and gain visibility into the data flows are in high demand. Monitoring, recording, and analysing user activity, application performance and detecting threats are daunting tasks. Having access to the network in a timely manner for trouble shooting increases network uptime.

All of these systems are as effective as the information and traffic that they can see. 

Limit visibility to the traffic, and the value of the system is equally limited. Therefore IT Managers attempt to connect the systems to the most appropriate location within the environment, although what defines “most appropriate” changes frequently due to the dynamic nature of the network, the virtualized applications and the mobile user.

With the expansion of IT infrastructure into the mobile world, a whole new array of visibility demands arise, and the systems find themselves drowning under the volume of traffic from multiple sources. Compound this with the adoption of cloud based services, and the challenge amplifies resulting in real impacts for both IT and the user community.

Gigamon's hardware appliance, GigaVUE, connects to multiple high speed links, 1GB,10GB,100GB via SPAN/Mirror ports or TAP's and aggregates all the traffic at line rate.The traffic is sent through a patented, intelligent classification and filtering algorithm.

GigaSmart is an entirely new way to enhance monitoring tools, allowing tools to perform analysis more efficiently and accurately. Thus, creating the ability to modify packets at line rate and add valuable information by packet slicing, masking, ingress port labeling, time stamping, and more.

Gigamon provide the visibility fabric to address the following issues;

  • Compliance, governance and risk challenge how tools access and store information.
  • Customer internal teams compete for SPAN ports.
  • To expensive to purchase individual tools for each and every critical network segment.
  • To long to get the appropriate change requests signed off to connect vital tools.
  • Network traffic data rates are oversubscribing on existing legacy tools.
  • Legacy tools cannot gain visibility into the virtual world.