- 22 February 2013 10:43
Gigamon addresses Big Data for mobile carriers
SYDNEY, Feb. 22, 2013. Gigamon®, a leader in traffic visibility solutions with the innovative Visibility Fabric™ architecture, has announced a holistic approach to the current Big Data challenge facing mobile carriers.
With the recent additions of the GigaPORT-C01 100Gb and the GigaPORT-Q08 40Gb line cards to the GigaVUE H Series product line, Gigamon's technology portfolio provides the volume, port density and scale needed to address network visibility in the most demanding of mobile carrier environments. These industry leading capabilities will be demonstrated live at Mobile World Congress 2013 in Barcelona, Spain.
"One of the key reasons behind the growth of Gigamon is its proven ability to develop products based on customer challenges and emerging trends. The GigaPORT-C01 100Gb and GigaPORT-Q08 40Gb line cards provide the pervasive traffic visibility required to manage Big Data across complex networks," said Srihari Padmanabhan, Frost & Sullivan Senior Research Analyst.
"With a strong customer base that includes some of the leading mobile carriers across the world, Gigamon is in the best position to understand and tackle the Big Data challenges faced by its customers."
As carriers continue to increase not only the number of pipes in their networks, but also the speeds of existing pipes from 10Gb and 40Gb to 100Gb, they require a solution that can enable the efficient management and monitoring of this rising volume of data.
The 100Gb GigaPORT-C01 line card extends the pervasive reach of the Visibility Fabric architecture, allowing for the unique ability to handle 40Gb and 100Gb, in addition to 10Gb and 1Gb connections. Gigamon deploys highly port-dense 1Gb, 10Gb, 40Gb and 100Gb solutions, facilitating connections with all processing taking place over the built-in backplane. This design allows for enhanced tool integration features, filtering and load balancing across tool ports.
The GigaPORT-Q08 40Gb line card further enhances Gigamon's carrier-grade chassis implementation, providing some of the greatest port concentration in the industry. To ensure the scale necessary to manage the growing influx of data, Gigamon's nodes within the Visibility Fabric architecture interconnect seamlessly and are able to process traffic across a non-blocking backplane chassis architecture.
"Big Data is no a longer a problem unique to enterprise data centres. Mobile carriers are now facing a deluge of traffic in their pipes, from an increasingly mobile workforce and the proliferation of smart devices and applications,” said Andy Huckridge, Director of Service Provider Solutions at Gigamon. “Mobile carriers must have the capacity to connect pipes to individual analytics tools at the network core and concentration points, to ensure accurate data processing and analysis, as they have already invested a tremendous amount into their existing tools.
“Gigamon's technology uniquely provides the necessary volume, port density and scale that enables each tool to function at maximum efficiency whilst keeping monitored traffic off the production network, saving the carrier significant costs that translate into cost savings for the subscriber,"
About the Visibility Fabric
At Gigamon we realised that delivering the visibility essential to manage, analyse and secure the complex system that is the IT infrastructure requires a new approach. With millions of traffic flows across thousands of endpoints, visibility needs to be pervasive, intelligent and dynamic. Using our patented, unique technology, we created an innovative new approach for delivering this visibility called the Visibility Fabric architecture. This new approach is intelligent and versatile in its ability to enable visibility into the network. For more information visit http://www.gigamon.com/traffic-visibility-fabric.
Gigamon provides an intelligent Visibility Fabric™ architecture for enterprises, data centres and service providers around the globe. Our technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies and centralised management, the Gigamon GigaVUE portfolio of high availability and high density products intelligently delivers the appropriate network traffic to security, monitoring or management systems. With over eight years' experience designing and building traffic visibility products in the US, Gigamon solutions are deployed globally across vertical markets including over half of the Fortune 100 and many government and federal agencies. www.gigamon.com
For more information
Jim Balog ANZ Regional Sales Director, Gigamon Tel +61 3 9823 6295 Email: email@example.com
David Frost PR Deadlines, for Gigamon Tel: +61.2.4341 5021 Email: firstname.lastname@example.org
Sign up now »
File MPS analyzes network file shares to detect and quarantine malware brought into the network through the Web, email, or other manual means, such as online file sharing.
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTTest Analyst (MS Environment) .netNSW
- FTQuality ManagerSA
- FTLead Software EngineerSA
- FTTest Analyst (MS Environment) .netNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTTest EngineerVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.