SYDNEY, Feb. 22, 2013. Gigamon®, a leader in traffic visibility solutions with the innovative Visibility Fabric™ architecture, has announced a holistic approach to the current Big Data challenge facing mobile carriers.
With the recent additions of the GigaPORT-C01 100Gb and the GigaPORT-Q08 40Gb line cards to the GigaVUE H Series product line, Gigamon's technology portfolio provides the volume, port density and scale needed to address network visibility in the most demanding of mobile carrier environments. These industry leading capabilities will be demonstrated live at Mobile World Congress 2013 in Barcelona, Spain.
"One of the key reasons behind the growth of Gigamon is its proven ability to develop products based on customer challenges and emerging trends. The GigaPORT-C01 100Gb and GigaPORT-Q08 40Gb line cards provide the pervasive traffic visibility required to manage Big Data across complex networks," said Srihari Padmanabhan, Frost & Sullivan Senior Research Analyst.
"With a strong customer base that includes some of the leading mobile carriers across the world, Gigamon is in the best position to understand and tackle the Big Data challenges faced by its customers."
As carriers continue to increase not only the number of pipes in their networks, but also the speeds of existing pipes from 10Gb and 40Gb to 100Gb, they require a solution that can enable the efficient management and monitoring of this rising volume of data.
The 100Gb GigaPORT-C01 line card extends the pervasive reach of the Visibility Fabric architecture, allowing for the unique ability to handle 40Gb and 100Gb, in addition to 10Gb and 1Gb connections. Gigamon deploys highly port-dense 1Gb, 10Gb, 40Gb and 100Gb solutions, facilitating connections with all processing taking place over the built-in backplane. This design allows for enhanced tool integration features, filtering and load balancing across tool ports.
The GigaPORT-Q08 40Gb line card further enhances Gigamon's carrier-grade chassis implementation, providing some of the greatest port concentration in the industry. To ensure the scale necessary to manage the growing influx of data, Gigamon's nodes within the Visibility Fabric architecture interconnect seamlessly and are able to process traffic across a non-blocking backplane chassis architecture.
"Big Data is no a longer a problem unique to enterprise data centres. Mobile carriers are now facing a deluge of traffic in their pipes, from an increasingly mobile workforce and the proliferation of smart devices and applications,” said Andy Huckridge, Director of Service Provider Solutions at Gigamon. “Mobile carriers must have the capacity to connect pipes to individual analytics tools at the network core and concentration points, to ensure accurate data processing and analysis, as they have already invested a tremendous amount into their existing tools.
“Gigamon's technology uniquely provides the necessary volume, port density and scale that enables each tool to function at maximum efficiency whilst keeping monitored traffic off the production network, saving the carrier significant costs that translate into cost savings for the subscriber,"
About the Visibility Fabric
At Gigamon we realised that delivering the visibility essential to manage, analyse and secure the complex system that is the IT infrastructure requires a new approach. With millions of traffic flows across thousands of endpoints, visibility needs to be pervasive, intelligent and dynamic. Using our patented, unique technology, we created an innovative new approach for delivering this visibility called the Visibility Fabric architecture. This new approach is intelligent and versatile in its ability to enable visibility into the network. For more information visit http://www.gigamon.com/traffic-visibility-fabric.
Gigamon provides an intelligent Visibility Fabric™ architecture for enterprises, data centres and service providers around the globe. Our technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies and centralised management, the Gigamon GigaVUE portfolio of high availability and high density products intelligently delivers the appropriate network traffic to security, monitoring or management systems. With over eight years' experience designing and building traffic visibility products in the US, Gigamon solutions are deployed globally across vertical markets including over half of the Fortune 100 and many government and federal agencies. www.gigamon.com
For more information
Jim Balog ANZ Regional Sales Director, Gigamon Tel +61 3 9823 6295 Email: firstname.lastname@example.org
David Frost PR Deadlines, for Gigamon Tel: +61.2.4341 5021 Email: email@example.com
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana