The Gigamon Deep Observability App is designed for customers who want to access pre-built dashboards that offer deep insights into their network's performance and security posture. It utilizes search queries derived from the CEF feed of the Gigamon Cloud Suite to provide detailed observability into your network and security environment. Use Cases: The app covers a variety of use cases to enhance security, troubleshoot issues, and maintain compliance: 1. Security Posture - Detect and remediate flaws in securing applications within the network. - Provides visibility into weak ciphers, untrusted certificates, and signature algorithms. 2. Anomalous Traffic - Identify and address challenges with DNS, HTTP, and HTTPS traffic in the network. 3. Troubleshooting - Detect and resolve network delays, connectivity issues, and protocol errors. - Examples include server vs. network latency, TCP/IP connectivity issues, and DNS problems. 4. Suspicious Activities - Detect and remediate issues related to unmanaged devices, suspicious connections, and traffic that falls outside of network norms. - Examples include unmanaged IoT devices, unwanted services, and port misuse. 5. Rogue Activities - Identify and mitigate unsanctioned applications that pose potential risks to your network and security. - Examples include unsanctioned P2P apps and crypto-jacking activities. 6. M-21-31 Logging - Meet the U.S. Office of Management and Budget (OMB) **M-21-31** logging requirements. - Leverage AMI metadata for HTTPS, HTTP, DNS, Shadow IT, IOMT protocol activity, and OT monitoring. 7. PCI Compliance - Helps organizations validate their PCI compliance posture with specialized dashboards. 8. Operational Technology (OT) - Gain visibility into OT applications, traffic volume, and OT sessions. - Verify if networks support fully air-gapped OT systems and detect the presence of non-OT or IT applications, which may indicate retrofitted systems due to IT/OT convergence. This app provides a comprehensive suite of tools to ensure network security, troubleshooting, and compliance while offering detailed visibility into your network's activities.
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources