Viavi Solutions launched Observer GigaFlow, a solution that delivers enriched flow records to stitch together user, network, and infrastructure data into a single record. GigaFlow is the latest enhancement to VIAVI Observer, the platform recognized as a Network Performance Management and Diagnostics (NPMD) solution by Gartner’s Magic Quadrant.
The growing number and variety of devices and applications across today’s hybrid IT environment are becoming difficult to manage — whether related to IoT, SD-WAN, cloud migrations or remote users at the network edge.
Observer GigaFlow delivers analytics and insight in a single enriched flow record, providing end-to-end visibility beyond the core to the farthest reaches of the IT network for fast, simple and effective troubleshooting and forensics investigations.
“IT network operations and security teams are struggling to manage a variety of critical issues with incomplete and siloed data; from investigating abnormal behavior on the network to troubleshooting remote user experience and applications,” said Doug Roberts, Vice President and General Manager, Enterprise and Cloud, VIAVI.
“Observer GigaFlow intelligently fuses rich data sets from all perspectives – user, traffic and infrastructure – delivering powerful insights for expertly mastering every performance and security challenge.”
As an integrated part of the VIAVI Observer platform, GigaFlow records complement GigaStor wire data to present operational visibility for management of user experience, network performance and security incidents. With GigaFlow’s approach, visibility is simpler than ever – only requiring a user’s name to call up details including client devices, performance issues, access behavior, and activity.
Key benefits of Observer GigaFlow:
- End-user experience delivers situational awareness for each IT stakeholder to ensure optimal service delivery,
- Visibility into every network conversation over time, reducing mean time to resolution,
- Service path visibility ensures problem domain isolation across a hybrid IT environment,
- Automated threat assessment, creating a new line of defense utilizing an enriched flow record for identification of rogue activity.