Security / June 1, 2016

Big Data and Security Analytics

The traditional approach to security-based analytics has been to focus on network packets and logs in order to provide critical input information. However, with everything on the rise (network traffic volumes, network speeds, mobile device numbers), developing analytics based solely on packets and logs now demands greater amounts of computational resources. To solve this problem and improve security analytics, the use of Big Data analytics is becoming essential. Read the full article and learn more about how Gigamon’s Metadata Engine supports this Big Data analytics need.


Active Visibility. This blog series looks at critical cyber-security issues that can be mitigated or better managed by adopting new and innovative approaches to traffic visibility and monitoring. The ability to gain complete traffic visibility is essential to directing traffic to security appliances and solutions to optimize their effectiveness. In addition, there are new “best practices” to improve security through traffic monitoring for virtual and cloud infrastructure. This blog series will identify tactical as well as strategic issues around this topic. See past blogs – Blog #1 – Blog #2 – Blog #3 – Blog #4 – Blog #5 – Blog #6 – Blog #7 – Blog #8 – Blog #9 – Blog #10 – Blog #11 – Blog #12 – Blog #13 – Blog #14 – Blog #15 – Blog #16 – Blog #17 – Blog #18 – Blog #19 – Blog #20


Customers have saved millions in IT costs. How much can you save?
Pervasive Visibility: A Critical Foundation of Federal Zero Trust Architecture
Ransomware Loitering Presents an Opportunity for Network Detection
Cybersecurity in a Converged IT/OT/IoT Environment

Back to top