LogRhythm announced a technology integration with Gigamon.
LogRhythm and Gigamon are working together to help organizations around the globe increase visibility and protect against modern cyberattacks. By understanding the power and necessity of visibility, Gigamon and LogRhythm have integrated their solutions — the Gigamon Hawk Deep Observability Pipeline and LogRhythm SIEM Platform. The combined solution empowers security teams to identify behavioral anomalies, internal and external threats, and to prioritize their responses based on accurate enterprise security intelligence.
Threat actors continue to find ways around prevention technology to access an organization’s network and proprietary information. When considering the high amount of network traffic security operators need to sift through each day, it becomes more difficult to survey and analyze the network to detect anomalous behavior. LogRhythm’s integration with Gigamon helps address these challenges by providing organizations with network-derived intelligence and insights needed to proactively detect and respond to threats.
“Our integration with Gigamon allows us to provide customers with visibility across physical, virtual and cloud networks,” said Andrew Hollister, Chief Information Security Officer at LogRhythm. “Security teams will gain the necessary insights to accelerate detection and response to emergent threats, including custom malware and nation-state espionage, as well as routine network misuse and many other types of anomalous behavior.”
Together, the Gigamon Hawk and LogRhythm SIEM Platform integration delivers the awareness needed to detect, prioritize, and neutralize damaging cyber threats that have either penetrated the network perimeter or originated from within. Key benefits of this integration include:
- Actionable network-derived intelligence and easy access to traffic from physical, virtual and cloud networks with the Gigamon Hawk Deep Observability Pipeline.
- Aggregation, filtering, and distribution of relevant traffic to LogRhythm SIEM accelerates processing throughput.
- Masking of private and sensitive data to meet industry regulations before sending to LogRhythm SIEM.
- Generated metadata can be selected from over 7,000 attributes across over 3,000 applications – for example, HTTP response codes and DNS queries – to provide highly detailed contextual analysis when looking at network events.
- Ability to generate NetFlow from any traffic flow and decrypt SSL traffic to avoid unnecessary processing.
- Automatic traffic load balancing helps optimize the performance of LogRhythm SIEM.
“No matter what prevention technology organizations deploy, persistent hackers will find a way in. Therefore, today’s security efforts must focus on proactively detecting and neutralizing malicious activity faster, more effectively, and before severe damage can compromise an entire organization,” said Michael Dickman, chief product officer at Gigamon. “The combined benefits of Gigamon Hawk and LogRhythm SIEM are exactly what organizations need to ensure they can patrol their entire network as it provides network and endpoint monitoring for end-to-end threat lifecycle management.”
The Latest
For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...
FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...
Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...
While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...
A perfect storm is brewing in cybersecurity — certificate lifespans shrinking to just 47 days while quantum computing threatens today's encryption. Organizations must embrace ephemeral trust and crypto-agility to survive this dual challenge ...
In MEAN TIME TO INSIGHT Episode 14, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud network observability...
While companies adopt AI at a record pace, they also face the challenge of finding a smart and scalable way to manage its rapidly growing costs. This requires balancing the massive possibilities inherent in AI with the need to control cloud costs, aim for long-term profitability and optimize spending ...
Telecommunications is expanding at an unprecedented pace ... But progress brings complexity. As WanAware's 2025 Telecom Observability Benchmark Report reveals, many operators are discovering that modernization requires more than physical build outs and CapEx — it also demands the tools and insights to manage, secure, and optimize this fast-growing infrastructure in real time ...
As businesses increasingly rely on high-performance applications to deliver seamless user experiences, the demand for fast, reliable, and scalable data storage systems has never been greater. Redis — an open-source, in-memory data structure store — has emerged as a popular choice for use cases ranging from caching to real-time analytics. But with great performance comes the need for vigilant monitoring ...
Kubernetes was not initially designed with AI's vast resource variability in mind, and the rapid rise of AI has exposed Kubernetes limitations, particularly when it comes to cost and resource efficiency. Indeed, AI workloads differ from traditional applications in that they require a staggering amount and variety of compute resources, and their consumption is far less consistent than traditional workloads ... Considering the speed of AI innovation, teams cannot afford to be bogged down by these constant infrastructure concerns. A solution is needed ...