1-805-277-2400
Select Page

Gigamon Inline Bypass Threat Prevention Solution

A fail-safe access port for in-line security tools.

Remove the Single Point of Failure from Your Network

How can you maximize the efficacy of inline threat prevention tools without compromising network performance or overcomplicating your security stack?

One way to maintain network performance and security is to deploy a Gigamon Inline Bypass Threat Prevention solution which acts as a fail-safe access port for inline security tools, such as web application firewall (WAF), intrusion prevention system (IPS), and advanced threat protection (APT) solutions.

The GigaSECURE® Security Delivery Platform offers an inline bypass switch, which enables enterprises to:

  • Keep up with growing network traffic volumes by improving the performance of inline security tools.
  • Streamline operations so you can complete security functions in hours versus weeks.
  • Eliminate single points of tool failure by creating a resiliency layer.
  • Solve the problem of asymmetric routing by enabling resilient (dual path) network architectures.

Most Advanced Physical and Logical Bypass Switch

Inline bypass protection comes in two forms: logical and physical. Both operate on the principle that traffic must continue, even if you don’t have the power to inspect it.

A physical bypass switch provides users with the ability to physically forward packets in the event of a Gigamon visibility node power failure. It also allows you to perform maintenance and upgrade your tools without impacting network operation or downtime. Switching to protected mode occurs automatically and without software intervention upon the loss of power.

Logical bypass happens in the event of inline tool failure and forwards traffic either to  other tools or to the network. The system detects failure when the link with that tool breaks down, the inline tool stops responding or during loss of software control, thus enabling you to safely remove or upgrade an inline appliance, or even move it from one network segment to another, without disrupting the network.

EBOOK

 

Encrypted Threats are Lurking in Your Traffic

SOLUTION BRIEF

 

SSL/TLS Decryption

DEPLOYMENT GUIDE

 

Visibility for Small Enterprises and Remote Sites.

Accelerate detection and response with SSL/TLS decryption. Scalable, automatic visibility and management of SSL/TLS traffic. Instructions for deploying Inline SSL on GigaVUE-OS within an enterprise network.
READ NOW READ NOW READ NOW

Smiling man on phoneTraining: How Inline Bypass Fuels Inline Prevention

Get the most out of your visibility and security investments with free training videos.

ACCESS TRAINING

Related Pages

VISIBILITY APPLIANCE

GigaVUE-HC1

 

Small appliance, aggregates and optimizes network data.

 

LEARN MORE

Digital lines and shapes

TRAFFIC INTELLIGENCE

GigaSMART®

 

Optimize all the traffic sent to your tools.

 

LEARN MORE

GigaVUE-FM background

MANAGEMENT

GigaVUE-FM

 

Single pane-of-glass organize and manage.

 

LEARN MORE

GigaVUE-TA series

TRAFFIC AGGREGATORS

GigaVUE TA Series

 

Aggregate low-utilization network links.

 

LEARN MORE

Gigamon Information Request

Gigamon Information Request

I would like: (Check all that apply)