{"id":54089,"date":"2025-02-12T00:30:31","date_gmt":"2025-02-12T08:30:31","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/gigamon-deep-observability-pipeline-app-fuer-sumo-logic"},"modified":"2026-01-02T18:01:18","modified_gmt":"2026-01-03T02:01:18","slug":"gigamon-deep-observability-pipeline","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/gigamon-deep-observability-pipeline","title":{"rendered":"Gigamon Deep Observability Pipeline-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-0319f92d30cb02b67c6b06d16f40ad8a\" id=\"a-flexible-new-layer-of-it-security-stack\">Eine flexible neue Ebene f\u00fcr das IT-Sicherheitspaket<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/detect-insider-threats-2-1.svg\" alt=\"\" class=\"wp-image-10158\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Einsicht in den gesamten Netzwerkverkehr<\/h3>\n\n\n\n<p>Vollst\u00e4ndige Transparenz und Erweiterung der Datenpunkte zur Erfassung sowie zur Einsicht umfangreicher Metadatenattribute aus dem Netzwerk von \u00fcber 3.000 Anwendungen und \u00fcber 5.000 Attributen<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"106\" height=\"122\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Compliance.png\" alt=\"\" class=\"wp-image-8665\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"adversary-network-activity-and-network-events\">Netzaktivit\u00e4ten und Netzereignisse des Gegners<\/h3>\n\n\n\n<p>Die Integration liefert Aktivit\u00e4ten und Verhaltensweisen von Angreifern in Form von Erkennungen, Beobachtungen und Zusammenfassungen von Netzereignissen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/150x150_cloud_siem.svg\" alt=\"\" class=\"wp-image-8666\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"discover-new-assets-and-applications\">Entdecken Sie neue Assets und Anwendungen<\/h3>\n\n\n\n<p>Dank der F\u00e4higkeit, den gesamten Datenverkehr im Netzwerk zu \u00fcberwachen, kann diese L\u00f6sung alle DHCP- und IP-bezogenen Transaktionen erfassen und dadurch granulare Attribute wie DHCP-Hostname und DHCP-Angebot mit MAC-Adresse identifizieren, und dies erleichtert wiederum die Entdeckung neuer Assets im Netzwerk.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1285\" height=\"703\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Application-Overview-and-Suspicious-Traffic-1.jpg\" alt=\"\" class=\"wp-image-10374\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Application-Overview-and-Suspicious-Traffic-1.jpg 1285w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Application-Overview-and-Suspicious-Traffic-1-300x164.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Application-Overview-and-Suspicious-Traffic-1-1024x560.jpg 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Application-Overview-and-Suspicious-Traffic-1-768x420.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Application-Overview-and-Suspicious-Traffic-1-575x315.jpg 575w\" sizes=\"auto, (max-width: 1285px) 100vw, 1285px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Anwendungs\u00fcbersicht und verd\u00e4chtiger Traffic<br\/><\/h2>\n\n\n\n<p>Dieses Dashboard bietet einen \u00dcberblick \u00fcber alle Anwendungen aus der Netzwerkperspektive und identifiziert verd\u00e4chtige Anwendungen wie Bit Torrent und potenzielles Crypto Jacking.<br\/><\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">SSL-Chiffren und ablaufende Zertifikate<\/h2>\n\n\n\n<p>Das Dashboard zeigt die Gesamtverwendung von SSL-Zertifikaten in der Umgebung und identifiziert alle verwendeten Wochen-Zertifikate. Der andere Teil zeigt die TLS-Zertifikate, die demn\u00e4chst ablaufen.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1260\" height=\"593\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/SSL-Ciphers-and-expiring-certificates-1.jpg\" alt=\"\" class=\"wp-image-10375\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/SSL-Ciphers-and-expiring-certificates-1.jpg 1260w, https:\/\/www.sumologic.com\/wp-content\/uploads\/SSL-Ciphers-and-expiring-certificates-1-300x141.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/SSL-Ciphers-and-expiring-certificates-1-1024x482.jpg 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/SSL-Ciphers-and-expiring-certificates-1-768x361.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/SSL-Ciphers-and-expiring-certificates-1-575x271.jpg 575w\" sizes=\"auto, (max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1333\" height=\"720\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DNS-Queries-Dashboard-1.jpg\" alt=\"\" class=\"wp-image-10376\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DNS-Queries-Dashboard-1.jpg 1333w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DNS-Queries-Dashboard-1-300x162.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DNS-Queries-Dashboard-1-1024x553.jpg 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DNS-Queries-Dashboard-1-768x415.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DNS-Queries-Dashboard-1-575x311.jpg 575w\" sizes=\"auto, (max-width: 1333px) 100vw, 1333px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">DNS-Abfragen, SMB-Dateibewegung, DHCP-IP und -Hostnamen sowie Http-Codes<\/h2>\n\n\n\n<p>Das Dashboard f\u00fcr DNS-Abfragen zeigt an, ob einer der internen Hosts mit externen DNS-Servern kommuniziert (h\u00e4ufig bei C&amp;C-Angriffen). SMB-Dateibewegungen zeigen alle Dateien an, die sich im Netzwerk \u00fcber SMB bewegen (um ungew\u00f6hnliche Dateibewegungen zu erkennen). DHCP-IP und -Hostnamen helfen bei der Identifizierung von OT\/loT-Ger\u00e4ten im Netzwerk. Http-Antwort-Codes tragen zur Leistungsverfolgung bei.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":326,"featured_media":44924,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,268],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,268],"class_list":["post-54089","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-operations"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/326"}],"version-history":[{"count":3,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54089\/revisions"}],"predecessor-version":[{"id":64714,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54089\/revisions\/64714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/44924"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=54089"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=54089"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=54089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}