SlideShare a Scribd company logo
1 of 2
Download to read offline
Case Study:
Gigamon Ensures Privacy of Data in Multi-tenant Network
and Enables Near Real-time Changes for Outsourcing Firm

Challenge                                        Headquartered in Texas, this firm provides information technology,
• Protect the privacy of client data in a        applications, and business process outsourcing services to enter-
shared network environment                       prise clients around the world.
• Reduce change control intervals
                                                 Challenge
Solution                                         Like most outsourcing organizations, this firm’s clients share net-
• GigaVUE® Data Access Switch from               work resources: i.e., switches, routers, and links. Client traffic for
Gigamon                                          monitoring is typically provided via SPAN ports. Individual clients
                                                 need to be able to view their own information from a common data
Benefits                                         stream. However, the outsourcer can’t inadvertently allow one cli-
• Ensure privacy of data among clients           ent to view another client’s data. Such an incident could put clients
• Enable near real-time response to cli-         in regulatory noncompliance subject to fines and, at the very least,
ent requests for changes                         seriously damage the outsourcer/client relationship. Information
• Eliminate port contention                      must be kept private and secure, yet readily available to clients—a
• Extend life of existing lower-speed            task that proved challenging for the outsourcing firm.
monitoring tools
                                                 Responding in a timely fashion to client requests for data access
                                                 was also a challenge. Formal change control requests could take
                                                 more than a week to implement. The outsourcer needed to find a
                                                 fast, effective, reliable way to ensure data privacy among clients
“The most important thing we
                                                 and respond more rapidly to requests for changes.
provide our customers is a secure
method of relieving the contention               Solution
for Mirrored Ports or SPAN Ports                 The outsourcing firm looked for a solution, but was unable to find
when multiple tool connections are               one that would meet their needs until they discovered the GigaVUE
required.”                                       Data Access Switch from Gigamon. GigaVUE provides secure
                                                 aggregation, replication, and filtering of critical network traffic and
                      -Patrick Leong             simplifies the deployment of monitoring tools. Connected to securi-
                       Chief Technical Officer   ty IDS, sniffers, protocol analyzers, VoIP analyzers, data recorders,
                       Gigamon                   application monitors, compliance monitors, or any other Ethernet-
                                                 based passive monitoring tool, GigaVUE creates an intelligent Data
                                                 Access Network (DAN).

                                                 Gigamon would allow this customer to effortlessly filter traffic
                                                 from SPAN ports and securely forward it to monitoring tools based
                                                 on client-specific addresses. Requests for changes could be imple-
                                                 mented on the fly through software configuration changes in the
Corporate Headquarters
                                                 GigaVUE Data Access Switches.
736 South Hillview Dr.
Milpitas, CA ,95035
Tel: 408.263.2022
Fax 408.263.2023
                                                                       www.gigamon.com
Copyright © 2009 all rights reserved                                                                         June 2009
The company deployed nearly a dozen GigaVUE-2404 high-density Data
                                       Access Switches in its major data centers. Installation was completed entirely
                                       by internal technicians with virtually no assistance required from Gigamon.
                                       As monitoring needs grow and change, GigaVUE’s stackable chassis provides
                                       nearly unlimited scalability and also eliminates port contention.

                                       Benefits
                                       Before deploying Gigamon, the outsourcing company lived in constant fear of
                                       accidently giving one client access to another client’s data. Today, the Giga-
                                       VUE switches provide peace of mind for both the customer and clients by
                                       ensuring that traffic is viewed only by the appropriate parties. What was once
                                       an open issue for compliance has now been resolved with the threat of fines
                                       and lawsuits reduced.

                                       In the past, up to two weeks were required to implement change requests,
                                       hampering the clients’ ability to view and manage their own data. Gigamon has
                                       brought near real-time data access. A simple configuration within the GigaVUE
                                       switch provides instant access, reducing the need for configuration manage-
                                       ment and maintenance windows, allowing flexibility in connecting and discon-
                                       necting tools in a production environment anytime, anywhere. Faster response
                                       has led to higher levels of client satisfaction.

                                       In addition to securing customer data and enabling faster changes, Gigamon
                                       has delivered other benefits. The maximum of two SPAN ports per switch
                                       could create port contention when multiple tools must share the same port. The
                                       GigaVUE Data Access Switch eliminates port contention, supporting up to 23
                                       tools per port.

                                       Legacy tools with lower-speed 1 Gbps interfaces may be unable to keep up
                                       with SPAN ports running at 10 Gbps, causing reporting accuracy to degrade.
                                       Gigamon enables tools to retrieve critical data from high-speed ports and send
                                       that data accurately to tools with lower speed interfaces, extending the use-
                                       ful life of existing tools. Based on its experience with the Gigamon solution
                                       to date, the company has plans to deploy additional GigaVUE Data Access
                                       Switches throughout its network.

                                       About Gigamon
                                       Gigamon is the inventor and leading provider of Data-Access Switches. Its
                                       flagship product, GigaVUE®, can replicate packets from one span or TAP to
                                       many tools to solve the span port sharing problem. It also can aggregate and
                                       intelligently filter packets from many spans or TAPs to one or multiple tools
                                       to solve the problem of monitoring flows across complex mesh topologies and
                                       virtual networks. GigaVUE® facilitates unobtrusive parallel tool deployment
                                       with network-wide coverage, significantly reducing customers’ capital budgets.
Corporate Headquarters
736 South Hillview Dr.
Milpitas, CA ,95035
Tel: 408.263.2022
Fax 408.263.2023
                                                                       www.gigamon.com
Copyright © 2009 all rights reserved                                                                        June 2009

More Related Content

What's hot

Benefits of the Converged Network
Benefits of the Converged NetworkBenefits of the Converged Network
Benefits of the Converged NetworkScott Morrison
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offeringimpodgirl
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...CA Technologies
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platformProdapt Solutions
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a serviceGavin M Amos.
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Networks
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)subtitle
 
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...DATA SECURITY SOLUTIONS
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingLicensingLive! - SafeNet
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
Cisco Connect Ottawa 2018  Cisco digital buildings and the 4th utility   w co...Cisco Connect Ottawa 2018  Cisco digital buildings and the 4th utility   w co...
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...Cisco Canada
 

What's hot (20)

Benefits of the Converged Network
Benefits of the Converged NetworkBenefits of the Converged Network
Benefits of the Converged Network
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance Management
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a service
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)
 
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
Cisco Connect Ottawa 2018  Cisco digital buildings and the 4th utility   w co...Cisco Connect Ottawa 2018  Cisco digital buildings and the 4th utility   w co...
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
 

Similar to Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real-time Changes for Outsourcing Firm

Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGrant Swanson
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product BriefAdvanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product Briefgigamon
 
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case StudyAlfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Studygigamon
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsSteven_Jackson
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief gigamon
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Dialogic Inc.
 
Trending: Convergence of networking and security in stores and branches
Trending: Convergence of networking and security in stores and branchesTrending: Convergence of networking and security in stores and branches
Trending: Convergence of networking and security in stores and branchesNational Retail Federation
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper Array Networks
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...Dialogic Inc.
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureBaqar kazmi
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochurebakar kazmi
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...Amazon Web Services
 
Infrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldInfrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldGlenn Allison
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
 

Similar to Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real-time Changes for Outsourcing Firm (20)

Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product BriefAdvanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
 
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case StudyAlfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
 
Trending: Convergence of networking and security in stores and branches
Trending: Convergence of networking and security in stores and branchesTrending: Convergence of networking and security in stores and branches
Trending: Convergence of networking and security in stores and branches
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
me
meme
me
 
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Infrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldInfrastructure 2.0 - Network World
Infrastructure 2.0 - Network World
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 

More from Grant Swanson

Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGrant Swanson
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Grant Swanson
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGrant Swanson
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGrant Swanson
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Grant Swanson
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGrant Swanson
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGrant Swanson
 
Gigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGrant Swanson
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGrant Swanson
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingGrant Swanson
 

More from Grant Swanson (11)

Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis Architecture
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone Wild
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP Technology
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
 
Gigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGigamon U - Its Not The Network
Gigamon U - Its Not The Network
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and Troubleshooting
 

Recently uploaded

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Recently uploaded (20)

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real-time Changes for Outsourcing Firm

  • 1. Case Study: Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real-time Changes for Outsourcing Firm Challenge Headquartered in Texas, this firm provides information technology, • Protect the privacy of client data in a applications, and business process outsourcing services to enter- shared network environment prise clients around the world. • Reduce change control intervals Challenge Solution Like most outsourcing organizations, this firm’s clients share net- • GigaVUE® Data Access Switch from work resources: i.e., switches, routers, and links. Client traffic for Gigamon monitoring is typically provided via SPAN ports. Individual clients need to be able to view their own information from a common data Benefits stream. However, the outsourcer can’t inadvertently allow one cli- • Ensure privacy of data among clients ent to view another client’s data. Such an incident could put clients • Enable near real-time response to cli- in regulatory noncompliance subject to fines and, at the very least, ent requests for changes seriously damage the outsourcer/client relationship. Information • Eliminate port contention must be kept private and secure, yet readily available to clients—a • Extend life of existing lower-speed task that proved challenging for the outsourcing firm. monitoring tools Responding in a timely fashion to client requests for data access was also a challenge. Formal change control requests could take more than a week to implement. The outsourcer needed to find a fast, effective, reliable way to ensure data privacy among clients “The most important thing we and respond more rapidly to requests for changes. provide our customers is a secure method of relieving the contention Solution for Mirrored Ports or SPAN Ports The outsourcing firm looked for a solution, but was unable to find when multiple tool connections are one that would meet their needs until they discovered the GigaVUE required.” Data Access Switch from Gigamon. GigaVUE provides secure aggregation, replication, and filtering of critical network traffic and -Patrick Leong simplifies the deployment of monitoring tools. Connected to securi- Chief Technical Officer ty IDS, sniffers, protocol analyzers, VoIP analyzers, data recorders, Gigamon application monitors, compliance monitors, or any other Ethernet- based passive monitoring tool, GigaVUE creates an intelligent Data Access Network (DAN). Gigamon would allow this customer to effortlessly filter traffic from SPAN ports and securely forward it to monitoring tools based on client-specific addresses. Requests for changes could be imple- mented on the fly through software configuration changes in the Corporate Headquarters GigaVUE Data Access Switches. 736 South Hillview Dr. Milpitas, CA ,95035 Tel: 408.263.2022 Fax 408.263.2023 www.gigamon.com Copyright © 2009 all rights reserved June 2009
  • 2. The company deployed nearly a dozen GigaVUE-2404 high-density Data Access Switches in its major data centers. Installation was completed entirely by internal technicians with virtually no assistance required from Gigamon. As monitoring needs grow and change, GigaVUE’s stackable chassis provides nearly unlimited scalability and also eliminates port contention. Benefits Before deploying Gigamon, the outsourcing company lived in constant fear of accidently giving one client access to another client’s data. Today, the Giga- VUE switches provide peace of mind for both the customer and clients by ensuring that traffic is viewed only by the appropriate parties. What was once an open issue for compliance has now been resolved with the threat of fines and lawsuits reduced. In the past, up to two weeks were required to implement change requests, hampering the clients’ ability to view and manage their own data. Gigamon has brought near real-time data access. A simple configuration within the GigaVUE switch provides instant access, reducing the need for configuration manage- ment and maintenance windows, allowing flexibility in connecting and discon- necting tools in a production environment anytime, anywhere. Faster response has led to higher levels of client satisfaction. In addition to securing customer data and enabling faster changes, Gigamon has delivered other benefits. The maximum of two SPAN ports per switch could create port contention when multiple tools must share the same port. The GigaVUE Data Access Switch eliminates port contention, supporting up to 23 tools per port. Legacy tools with lower-speed 1 Gbps interfaces may be unable to keep up with SPAN ports running at 10 Gbps, causing reporting accuracy to degrade. Gigamon enables tools to retrieve critical data from high-speed ports and send that data accurately to tools with lower speed interfaces, extending the use- ful life of existing tools. Based on its experience with the Gigamon solution to date, the company has plans to deploy additional GigaVUE Data Access Switches throughout its network. About Gigamon Gigamon is the inventor and leading provider of Data-Access Switches. Its flagship product, GigaVUE®, can replicate packets from one span or TAP to many tools to solve the span port sharing problem. It also can aggregate and intelligently filter packets from many spans or TAPs to one or multiple tools to solve the problem of monitoring flows across complex mesh topologies and virtual networks. GigaVUE® facilitates unobtrusive parallel tool deployment with network-wide coverage, significantly reducing customers’ capital budgets. Corporate Headquarters 736 South Hillview Dr. Milpitas, CA ,95035 Tel: 408.263.2022 Fax 408.263.2023 www.gigamon.com Copyright © 2009 all rights reserved June 2009