Gigamon announces the availability of its new Precryption technology

Issue 7 2023 Information Security, Security Services & Risk Management

Gigamon recently announced a series of breakthrough cybersecurity innovations to the Gigamon Deep Observability Pipeline in its latest GigaVUE 6.4 software release. Gigamon Precryption technology enables IT and security organisations, for the first time with an automated solution, to gain unobscured visibility into encrypted traffic across virtual machine (VM) or container workloads, to conduct advanced threat detection, investigation, and response across the hybrid cloud infrastructure.

While intended for security and privacy, encryption has become a hiding place for cybercriminals, with over 93% of malware now lurking behind encryption. With this announcement, Gigamon is helping IT organisations eliminate these blind spots by shining a spotlight on this previously concealed threat activity inside encrypted traffic, reinforcing a strong foundation for Zero Trust.

Undetected threats in encrypted traffic

According to the recent Gigamon 2023 Hybrid Cloud Security Survey, over 70% of the 1000 IT and security leaders surveyed admit they currently do not inspect the encrypted data flowing across their hybrid cloud infrastructure. This presents grave business risk as encrypted data cannot be sufficiently analysed, and malware threats cannot be detected by security and monitoring tools alone as encrypted data traverses internally, externally, or laterally across an organisation.

Gigamon Precryption technology reveals previously concealed threat activity, including lateral movement, malware distribution, and data exfiltration inside virtual, cloud, and container applications. Its innovative approach leverages eBPF technology inside the Linux kernel to deliver plaintext visibility, capturing traffic before encryption or after decryption. No keys need to be intercepted or sniffed, and no expensive decryption is required. Moreover, Precryption technology runs independently of the application, avoiding the operational challenges of classic agent-based approaches.

“Global enterprises are increasingly successful with unifying security logs in a security data lake, but encrypted traffic poses a real challenge,” said Omer Singer, Head of Cybersecurity Strategy at Snowflake. “Industry advances like Gigamon Precryption technology present a compelling path for organisations to turn encrypted cloud traffic into visibility for better security and compliance across hybrid cloud infrastructure.”

Gigamon Precryption technology addresses a range of advanced security requirements, including:

• Easily enables InfoSec, Network, and CloudOps teams to gain full visibility into encrypted traffic across VM or container workloads.

• Seamlessly works with modern encryption methods, including TLS 1.3 or TLS 1.2 with perfect-forward secrecy (PFS) enabled, and legacy encryption methods, including TLS 1.2 without PFS.

• Fully supports organisations with sensitive personal identifiable information (PII) by masking this traffic from view to maintain data security, compliance, and governance.

• Dramatically reduces the operational complexity associated with decryption by eliminating cumbersome private key management for key sharing, passing, and library updates.

• Efficiently offloads TLS decryption overhead from cloud, security, and observability tools, greatly boosting their capacity and performance.

“In a recent study of large enterprise IT and security leaders, we found that an alarming 50% accept the risk and do not decrypt traffic today due to technical and cost challenges,” said Christopher Steffen, Vice President of Research at EMA. “At a time when organisations have a Zero Trust goal, it is clear that half have no hope of achieving it. It is time to pull visibility into encrypted traffic and out of the ‘too hard, impossible, and too expensive bucket’. With innovations like Gigamon Precryption technology, organisations can get the deep observability they need to meet evolving standards and regulatory compliance, and also confidently secure their hybrid cloud infrastructure.”

“As cloud adoption accelerates across an expanding number of private and public platforms, organisations must also address the escalating risks of threat activity concealed within encrypted traffic,” said Michael Dickman, Chief Product Officer at Gigamon. “Until now, decrypting cloud traffic has been arduous and expensive. With Gigamon Precryption technology, we are turning the tables on cybercriminals by bringing deep observability to encrypted traffic, allowing customers to dramatically improve their security posture across any number of clouds and workloads, without any burden on developers.”

Seamless security integration

The software release incorporates several more advanced security capabilities, including:

• Cloud SSL decryption – extending classic on-premises decryption capabilities to a wide range of virtual and cloud platforms.

• Universal Cloud Tap (UCT) – a single, executable tap for leading platforms, extending across VMs and containers with pre-filtering at the source for maximum efficiency.

• Application Metadata Intelligence (AMI) integration – detection of vulnerabilities and suspicious activities across both managed and unmanaged hosts (e.g., IoT devices).

Read the Gigamon 2023 Hybrid Cloud Security Survey at www.securitysa.com/*gigamon1




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.