Gigamon Presentation
Gigamon Presentation
June Lim
Regional Sales Director
Enterprise
Version 3.2
© 2017-2020 Gigamon Inc. All rights reserved. © 2018 Gigamon. All rights reserved. 1
Think of Gigamon when you hear this from customer
+ Q&A
Reduce Costs
Significantly reduce network costs
MARKET SHARE
Single Platform
Unified visibility across physical,
virtual & cloud
Breadth of Capabilities
Breadth of capabilities across
visibility portfolio
Legacy
Systems ThreatINSIGHT
ThreatINSIGHT
Cloud Analyze FW
Operational
Technology
Transform IPS
Virtual
SIEM
Containers and
Microservices Aggregate
NPMD
*A TOOL is defined as a hardware and/or software device that ingests network traffic or data for the purpose of network and application 6
performance monitoring analysis, security analysis and threat mitigation, monitoring customer experience, recording, or troubleshooting
© 2018 Gigamon. All rights reserved. 6
Example Use Case for GigaVUE-HC2
DDOS
Internet Network Network
Data Loss Behavior Access
Prevention SIEM Analytics Control
Routers
“Spine” Switches
“Leaf” Switches
Virtualized
Server Farm Inline Bypass for Network Availability
WAF APT 1 No downtime to hardware / firmware
APT 2
Physical Nodes 10G
10G upgrades
Public Cloud – AWS / Azure / Google
VMWare / Nutanix
Encrypted Traffic
© 2018 Gigamon. All rights reserved. 7
Inline Bypass Protection
The best way to deploy inline threat prevention tools are not to put them inline
Internet Internet
• Each inline tool is a potential failure • Simplified troubleshooting
point
• Easily take tools offline for
FW • Tool maintenance/growth means an FW maintenance
outage
• Load balance to multiple tools
• Requires a dedicated load balancer
• Streamline traffic to each tool
SIEM for multiple tools
• Both Inline and out-of-band tools
• All traffic must go to all tools
WAF WAF IPS easily addressed
• Tapping or mirroring required for out-
WAF of-band tools
SIEM
Out Of Band
IPS GigaVUE HC Series Node
Forensics
ATP
Forensics
Internet Internet
FW FW FW
Routers
Out Of Band
Out Of Band
GigaVUE HC Series Node GigaVUE HC Series Node GigaVUE HC Series Node
Spine
Switches 9
VM /
Container / Conta Virtual Virtual
ThreatINSIGHT
Agents iner / (V Series)(V Series)
Agent
Technology
Containers Virtual Machines Service Mesh Physical Appliances
Platforms
Centralized
tools
Visibility &
Traffic Intelligence Analytics
▸ De-duplication ▸ NetFlow/IPFIX Generation* Fabric
▸
A CoreMasking
Packet ▸
Core
SSL Decryption*
▸ Packet Slicing ▸ Adaptive Packet Filtering*
Agentless Virtual TAPs ▸ Header Stripping ▸ Application Session Filtering* Appl/Network
Monitoring
▸ L2 – L4 Filtering: Flow Mapping™
▸ Filter on VM, application ports
▸ Packet slicing at any offset Spine Spine
Virtual
▸ Optionally add all CoreVUE and
data deduplication apps - or -
SIEM
Physica
Leaf Leaf Leaf Leaf l
DB
OS
NDR
DB Server
• SSL Decryption
Outcome : Decrypt once, reduce latency, reduce license + hardware cost of security investments
MARKET SHARE
• Inline Bypass
Outcome : Network resiliency, remains available when inline tools fail.
• V Series
Outcome : Eliminate the blindspot in private and public cloud (EW traffic)
17
Command
Privilege Defense Credential Lateral
Initial Access Execution Persistence Discovery Collection & Control Exfiltration Impact
Escalations Evasion Access Movement
(“C2”)
19
https://www.gigamon.com/campaigns/value-
calculator.html
Thank You