Gigamon Application Metadata Intelligence Introduced
September 10, 2019
Share this

Gigamon introduced Gigamon Application Metadata Intelligence (AMI), which delivers unprecedented application visibility to an organization’s tools ecosystem.

Gigamon AMI provides over 5,000 applications-related attributes extracted from network packet data, allowing NetOps, SecOps and analytics tools to quickly identify and troubleshoot performance and security trouble spots.

Gigamon AMI includes pre-built connectors with leading analytics tools such as Splunk Enterprise and IBM QRadar, enabling IT to easily leverage the power of metadata. Included are pre-configured templates that simplify integration with common use cases such as video quality monitoring, user/session tracking and International Mobile Equipment Identity (IMEI) devices. Furthermore, out-of-the box integration is available with a growing ecosystem of third-party tools, including FireEye, Plixer, Viavi, Flowmon and WitFoo.

Gigamon AMI centralizes network visibility and extracts the context around applications and protocols. Use cases of Gigamon AMI include:

- Network Performance: Troubleshooting server and file access performance issues using error resource codes

- Application Performance: Monitoring roundtrip SQL query time to and from a Mongo DB instance

- Operational Technology (OT) Communications: Isolating traffic and extracting intelligence for OT-related communications to help tools better focus on machine-to-machine communications for specialized use cases, such as healthcare (HL7), finance (OpenRTB) and Industrial Control Systems (SCADA)

- Security and Threat Detection: More precise identification of Command and Control attacks, identification of weak or old cyphers used for encryption, out of date certificates

“An exceptional application user experience, paired with strong security, is critical for the success of any digital transformation initiative. With Application Metadata Intelligence, organizations now have the contextual data needed to quickly pinpoint potential threats and resolve network or application performance issues that can impact the user experience,” said Ananda Rajagopal, VP of Products, Gigamon. “The unparalleled depth of metadata elements, as well as the ease and convenience of integrations with leading analytics providers, enables our customers worldwide to run fast and stay secure in today’s complex, digital ecosystem.”

Solution providers can take advantage of the Gigamon Metadata Empowered Partner Program for rapid AMI integration, with support ranging from access to a development environment to development support and certification. Partners can then leverage the Gigamon Catalyst Program, which includes joint collateral, demo presence at labs and events, and direct access to Gigamon’s extensive field and channel organizations that cover over 3,300 large businesses and global government agencies.

Share this

The Latest

October 22, 2020

IT teams critically require better visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological advances, remote working reaching an all-time high and the expanding security threatscape, according to State of the Network 2020, a study conducted by VIAVI Solutions ...

October 21, 2020

Mobile commerce offers several benefits for retailers. But all this potential can only be fully realized if retailers can manage the associated challenges that mobile commerce introduces. Anyone involved in the development, operation or troubleshooting of a mobile shopping app needs to be aware of the three following technical obstacles and plan accordingly ...

October 20, 2020

Although cost control/expense management remains top of mind, organizations are realizing the necessity of technology solutions to enable them to steer the business during these turbulent times, according to IDG's CIO Pandemic Business Impact Study ...

October 19, 2020

The COVID-19 pandemic has compressed six years of modernization projects into 6 months. According to a recent report, IT leaders have accelerated projects aimed at increasing productivity and business agility, improving application performance and end-user experience, and driving additional revenue through existing channels ...

October 15, 2020

There is no doubt that automation has become the key aspect of modern IT management. The end-user computing market is no exception. With a large and complex technology stack and a huge number of applications, EUC specialists need to handle an ever-increasing number of changes at an ever-increasing rate. Many IT organizations are starting to realize that they can no longer control the flow of changes. It is time to think about how to facilitate change ...

October 14, 2020

Starting this September, the lifespan of an SSL/TLS certificate has been limited to 398 days, a reduction from the previous maximum certificate lifetime of 825 days. With this change, everyone needs to more carefully monitor SSL certificate expiration and server characteristics ...

October 13, 2020

Nearly 6 in 10 responding organizations have accelerated their digital transformations due to the COVID-19 pandemic, according to The IBM Institute for Business Value study COVID-19 and the Future of Business ...

October 08, 2020

Two-thirds (67%) of those surveyed expect the sheer quantity of data to grow nearly five times by 2025, according to a new report from Splunk: The Data Age Is Here. Are You Ready? ...

October 07, 2020

Gaming introduced the world to a whole new range of experiences through augmented reality (AR) and virtual reality (VR). And consumers are really catching on. To unlock the potential of these platforms, enterprises must ensure massive amounts of data can be transferred quickly and reliably to ensure an acceptable quality of experience. As such, this means that enterprises will need to turn to a 5G infrastructure powered by an adaptive network ...

October 06, 2020

A distributed, remote workforce is the new business reality. How can businesses keep operations going smoothly and quickly resolve issues when IT staff is in San Jose, employee A is working remotely in Denver at their home and employee B is a salesperson still doing some road traveling? The key is an IT architecture that promotes and supports "self-healing" at the endpoint to take care of issues before they impact employees. The essential element to achieve this is hyper-automation ...