Gigamon Application Metadata Intelligence Introduced
September 10, 2019
Share this

Gigamon introduced Gigamon Application Metadata Intelligence (AMI), which delivers unprecedented application visibility to an organization’s tools ecosystem.

Gigamon AMI provides over 5,000 applications-related attributes extracted from network packet data, allowing NetOps, SecOps and analytics tools to quickly identify and troubleshoot performance and security trouble spots.

Gigamon AMI includes pre-built connectors with leading analytics tools such as Splunk Enterprise and IBM QRadar, enabling IT to easily leverage the power of metadata. Included are pre-configured templates that simplify integration with common use cases such as video quality monitoring, user/session tracking and International Mobile Equipment Identity (IMEI) devices. Furthermore, out-of-the box integration is available with a growing ecosystem of third-party tools, including FireEye, Plixer, Viavi, Flowmon and WitFoo.

Gigamon AMI centralizes network visibility and extracts the context around applications and protocols. Use cases of Gigamon AMI include:

- Network Performance: Troubleshooting server and file access performance issues using error resource codes

- Application Performance: Monitoring roundtrip SQL query time to and from a Mongo DB instance

- Operational Technology (OT) Communications: Isolating traffic and extracting intelligence for OT-related communications to help tools better focus on machine-to-machine communications for specialized use cases, such as healthcare (HL7), finance (OpenRTB) and Industrial Control Systems (SCADA)

- Security and Threat Detection: More precise identification of Command and Control attacks, identification of weak or old cyphers used for encryption, out of date certificates

“An exceptional application user experience, paired with strong security, is critical for the success of any digital transformation initiative. With Application Metadata Intelligence, organizations now have the contextual data needed to quickly pinpoint potential threats and resolve network or application performance issues that can impact the user experience,” said Ananda Rajagopal, VP of Products, Gigamon. “The unparalleled depth of metadata elements, as well as the ease and convenience of integrations with leading analytics providers, enables our customers worldwide to run fast and stay secure in today’s complex, digital ecosystem.”

Solution providers can take advantage of the Gigamon Metadata Empowered Partner Program for rapid AMI integration, with support ranging from access to a development environment to development support and certification. Partners can then leverage the Gigamon Catalyst Program, which includes joint collateral, demo presence at labs and events, and direct access to Gigamon’s extensive field and channel organizations that cover over 3,300 large businesses and global government agencies.

Share this

The Latest

September 19, 2019

You must dive into various aspects or themes of services so that you can gauge authentic user experience. There are usually five main themes that the customer thinks of when experiencing a service ...

September 18, 2019

Service desks teams use internally focused performance-based metrics more than many might think. These metrics are essential and remain relevant, but they do not provide any insight into the user experience. To gain actual insight into user satisfaction, you need to change your metrics. The question becomes: How do I efficiently change my metrics? Then, how do you best go about it? ...

September 17, 2019

The skills gap is a very real issue impacting today's IT professionals. In preparation for IT Pro Day 2019, celebrated on September 17, 2019, SolarWinds explored this skills gap by surveying technology professionals around the world to understand their needs and how organizations are addressing these needs ...

September 16, 2019

Top performing organizations (TPOs) in managing IT Operations are experiencing significant operational and business benefits such as 5.9x shorter average Mean Time to Resolution (MTTR) per incident as compared to all other organizations, according to a new market study from Digital Enterprise Journal ...

September 12, 2019

Multichannel marketers report that mobile-friendly websites have emerged as a dominant engagement channel for their brands, according to Gartner. However, Gartner research has found that too many organizations build their mobile websites without accurate knowledge about, or regard for, their customer's mobile preferences ...

September 11, 2019

Do you get excited when you discover a new service from one of the top three public clouds or a new public cloud provider? I do. But every time you feel excited about new cloud offerings, you should also feel a twinge of fear. Because in the tech world, each time we introduce something new we also add a new point of failure for our application and potentially a service we are stuck with. This is why thinking about the long-tail cloud for your organization is important ...

September 10, 2019

A solid start to migration can be approached three ways — all of which are ladder up to adopting a Software Intelligence strategy ...

September 09, 2019

Many aren't doing the due diligence needed to properly assess and facilitate a move of applications to the cloud. This is according to the recent 2019 Cloud Migration Report which revealed half of IT leaders at banks, insurance and telecommunications companies do not conduct adequate risk assessments prior to moving apps over to the cloud. Essentially, they are going in blind and expecting everything to turn out ok. Spoiler alert: It doesn't ...

September 05, 2019

Research conducted by Aite Group uncovered more than 80 global eCommerce sites that were actively being compromised by Magecart groups, according to a new report, In Plain Sight II: On the Trail of Magecart ...

September 04, 2019

In this blog, I'd like to expand beyond the TAP and look at the role Packet Brokers play in an organization's visibility architecture. Here are 5 common mistakes that are made when deploying Packet Brokers, and how to avoid them ...