LogRhythm announced a technology integration with Gigamon.
LogRhythm and Gigamon are working together to help organizations around the globe increase visibility and protect against modern cyberattacks. By understanding the power and necessity of visibility, Gigamon and LogRhythm have integrated their solutions — the Gigamon Hawk Deep Observability Pipeline and LogRhythm SIEM Platform. The combined solution empowers security teams to identify behavioral anomalies, internal and external threats, and to prioritize their responses based on accurate enterprise security intelligence.
Threat actors continue to find ways around prevention technology to access an organization’s network and proprietary information. When considering the high amount of network traffic security operators need to sift through each day, it becomes more difficult to survey and analyze the network to detect anomalous behavior. LogRhythm’s integration with Gigamon helps address these challenges by providing organizations with network-derived intelligence and insights needed to proactively detect and respond to threats.
“Our integration with Gigamon allows us to provide customers with visibility across physical, virtual and cloud networks,” said Andrew Hollister, Chief Information Security Officer at LogRhythm. “Security teams will gain the necessary insights to accelerate detection and response to emergent threats, including custom malware and nation-state espionage, as well as routine network misuse and many other types of anomalous behavior.”
Together, the Gigamon Hawk and LogRhythm SIEM Platform integration delivers the awareness needed to detect, prioritize, and neutralize damaging cyber threats that have either penetrated the network perimeter or originated from within. Key benefits of this integration include:
- Actionable network-derived intelligence and easy access to traffic from physical, virtual and cloud networks with the Gigamon Hawk Deep Observability Pipeline.
- Aggregation, filtering, and distribution of relevant traffic to LogRhythm SIEM accelerates processing throughput.
- Masking of private and sensitive data to meet industry regulations before sending to LogRhythm SIEM.
- Generated metadata can be selected from over 7,000 attributes across over 3,000 applications – for example, HTTP response codes and DNS queries – to provide highly detailed contextual analysis when looking at network events.
- Ability to generate NetFlow from any traffic flow and decrypt SSL traffic to avoid unnecessary processing.
- Automatic traffic load balancing helps optimize the performance of LogRhythm SIEM.
“No matter what prevention technology organizations deploy, persistent hackers will find a way in. Therefore, today’s security efforts must focus on proactively detecting and neutralizing malicious activity faster, more effectively, and before severe damage can compromise an entire organization,” said Michael Dickman, chief product officer at Gigamon. “The combined benefits of Gigamon Hawk and LogRhythm SIEM are exactly what organizations need to ensure they can patrol their entire network as it provides network and endpoint monitoring for end-to-end threat lifecycle management.”
The Latest
The demand for real-time AI capabilities is pushing data scientists to develop and manage infrastructure that can handle massive volumes of data in motion. This includes streaming data pipelines, edge computing, scalable cloud architecture, and data quality and governance. These new responsibilities require data scientists to expand their skill sets significantly ...
As the digital landscape constantly evolves, it's critical for businesses to stay ahead, especially when it comes to operating systems updates. A recent ControlUp study revealed that 82% of enterprise Windows endpoint devices have yet to migrate to Windows 11. With Microsoft's cutoff date on October 14, 2025, for Windows 10 support fast approaching, the urgency cannot be overstated ...
In Part 1 of this two-part series, I defined multi-CDN and explored how and why this approach is used by streaming services, e-commerce platforms, gaming companies and global enterprises for fast and reliable content delivery ... Now, in Part 2 of the series, I'll explore one of the biggest challenges of multi-CDN: observability.
CDNs consist of geographically distributed data centers with servers that cache and serve content close to end users to reduce latency and improve load times. Each data center is strategically placed so that digital signals can rapidly travel from one "point of presence" to the next, getting the digital signal to the viewer as fast as possible ... Multi-CDN refers to the strategy of utilizing multiple CDNs to deliver digital content across the internet ...
We surveyed IT professionals on their attitudes and practices regarding using Generative AI with databases. We asked how they are layering the technology in with their systems, where it's working the best for them, and what their concerns are ...
40% of generative AI (GenAI) solutions will be multimodal (text, image, audio and video) by 2027, up from 1% in 2023, according to Gartner ...
Today's digital business landscape evolves rapidly ... Among the areas primed for innovation, the long-standing ticket-based IT support model stands out as particularly outdated. Emerging as a game-changer, the concept of the "ticketless enterprise" promises to shift IT management from a reactive stance to a proactive approach ...
In MEAN TIME TO INSIGHT Episode 10, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Generative AI ...
By 2026, 30% of enterprises will automate more than half of their network activities, an increase from under 10% in mid-2023, according to Gartner ...