Observer GigaFlow

Enriched performance management and cyber network security insight via in-depth network intrusion detection, infrastructure tools, and user data

Observer GigaFlow

The network and supporting infrastructure have so much to tell you—if only you knew how to ask: What’s connected? Who is talking? What are they saying? The growing number and variety of devices and applications across today’s hybrid IT environment are becoming increasingly difficult to manage — whether related to IoT, SD-WAN, cloud migrations, or remote users at the network edge making answering these questions more urgent.

Observer GigaFlow to the rescue by combining network, infrastructure, and user data into a single enriched flow record captured and retained over time. Combining mountains of unstructured data provides in-depth details on network device types, connectivity, traffic control, and usage patterns. This information is maintained at the individual user/host, over time across all communication traversing the environment from any point of view making it particularly valuable for NetOps and SecOps teams when they are investigating anomalies activity.

With the release of Observer v18, enriched flow data from GigaFlow and packet-level wire data from GigaStor now coexist in Observer Apex. This means all levels of expertise have access to comprehensive views of performance and threat landscapes across their environments, using preferred data sources for QoS measurements, baselining, capacity planning, and more. This single, integrated interface improves operational efficiencies through boosted data quality, intuitive visualizations, and simplified workflows for any level of IT user.

VIAVI brings the network to the table and exposes the infrastructure and traffic clearly to all business stakeholders serving as the go-to platform for every IT team.

Feature and Benefit Summary:


End-user experience and infrastructure insights provide situational awareness for stakeholders driving better decisions for tuning service delivery and assessing security challenges
High-fidelity forensic visibility into network conversations over time supporting investigations reduces mean time to resolution
Advanced service path visibility ensures immediate problem domain isolation across hybrid IT environments
Automated threat assessment strengthens defense through immediate identification of rogue activity and unauthorized devices
Cloud and virtual device insight deliver real-time understanding of performance in virtual, cloud, and remote environments
An interactive IP Viewer that visualizes relationships between User, IP, MAC, and application usage in the network.
A new, easy wizard-driven configuration method for Threat Profiles allows you to quickly and confidently define the hosts and services you want to monitor for suspicious traffic patterns

Feature and Benefit Summary:

  • End-user experience and infrastructure insights provide situational awareness for stakeholders driving better decisions for tuning service delivery and assessing security challenges.
  • High-fidelity forensic visibility into network conversations over time supporting investigations reduces mean time to resolution.
  • Advanced service path visibility ensures immediate problem domain isolation across hybrid IT environments.
  • Automated threat assessment strengthens defense through immediate identification of rogue activity and unauthorized devices.
  • Cloud and virtual device insight deliver real-time understanding of performance in virtual, cloud, and remote environments.
  • An interactive IP Viewer that visualizes relationships between User, IP, MAC, and application usage in the network.
  • A new, easy wizard-driven configuration method for Threat Profiles allows you to quickly and confidently define the hosts and services you want to monitor for suspicious traffic patterns.

    Contact Form