Have Questions?
We're here to help you find the right security solution for your business.
When your network becomes plagued with security risks and threats, network outages can become a serious concern.
One way to maintain network performance is to deploy an inline bypass protection solution which acts as a fail-safe access port for inline security tools, such as web application firewall (WAF), intrusion prevention system (IPS), and advanced threat protection (APT) solutions.
The GigaSECURE® Security Delivery Platform offers inline bypass, which enables enterprises to:
Bypass protection comes in two forms: logical and physical. Both operate on the principle that traffic must continue, even if it can't be inspected.
Physical bypass is the ability to physically forward packets in the event of a Gigamon visibility node power failure. It also allows you to upgrade your tools without impacting network downtime. Switching to protected mode occurs automatically and without software intervention upon the loss of power.
Redundant Tools |
Inline Bypass | |
---|---|---|
1+1 protection during tool failure | ||
N + 1 protection during tool failure | ||
Failure detection and tool failover | ||
Significant cost savings from tool reduction | ||
Session load balacing |
Logical bypass happens in the event of inline tool failure and forwards traffic either to other tools or to the network. The system detects failure when the link with that tool breaks down, the inline tool stops responding or during loss of software control, thus enabling you to safely remove or upgrade an inline tool without disrupting the network.
WHITEPAPER
Learn the technical benefits of inline bypass and prevention, including negative heartbeat and IPFIX.
BUSINESS BRIEF
Get better performance out of your existing security devices. Improve your security posture with inline bypass.
TECHNOLOGY OVERVIEW
Move tools from outlying detection mode to inline prevention mode—yet stay resilient.
“The performance of the GigaSECURE Security Delivery
Platform has been exceptional. I don’t even know where the
ceiling is because we haven’t even come close to hitting it.
Everything that we’ve wanted to do with the company’s solution,
we’ve been able to do.”
Neil R. “Grifter” Wyler • Network Operations Center Lead • Black Hat
We're here to help you find the right security solution for your business.
CORE SOLUTION
Route the right traffic to the right tools.
CSO BLOG
Simplify the security tool evaluation process with GigaSECURE.
TRAFFIC INTELLIGENCE
Granular filtering and forwarding.
TRAFFIC INTELLIGENCE
Decrypt and expose malware away from security tools.