Crypto

Crypto

Gigamon Introduces Post-Quantum Cryptography in Deep Observability Pipeline

Admin

By: Admin

Tuesday, November 11, 2025

Nov 11, 2025

3 min read

Gigamon has unveiled GigaVUE 6.12, introducing post-quantum cryptography (PQC) support to its Deep Observability Pipeline. The new release equips cybersecurity teams to identify where encryption is used across their environments, detect weak or non-compliant ciphers, and mitigate “harvest-now, decrypt-later” threats associated with emerging quantum computing capabilities.

With the update, teams can either decrypt traffic for inspection or apply Gigamon’s Precryption® technology to gain plaintext visibility without performing traditional “break-and-inspect” operations. The platform also exports detailed flow metadata to analytics and security tools such as Splunk, QRadar, and Elastic, enhancing visibility and compliance across hybrid and multi-cloud environments.

Rising Encryption and Threat Volumes

Cybersecurity threats across the Middle East continue to grow more sophisticated and increasingly encrypted. In the first half of 2025, more than half of the region’s attacks involved extortion or ransomware. The UAE ranked ninth globally and second in the MEA region for attack frequency, accounting for roughly 11.7% of affected customers.

As quantum computing progresses, existing public key encryption methods face growing risk. Industry analysts predict traditional cryptography could become unsafe as early as 2030. According to the Gigamon Hybrid Cloud Security Survey, conducted among more than 1,000 Security and IT leaders, 73 percent plan to implement PQC in their networks to prepare their hybrid cloud infrastructure for quantum-era threats.

“Encrypted traffic now dominates enterprise networks in this region, and the stakes are rising. With the UAE among the most targeted in MEA and GCC threat volumes climbing, security teams need a live map of the cryptography in use and a way to spot weak ciphers before attackers do,” said Damian Wilk, General Manager, EMEA Emerging Markets, Gigamon. “With this release, customers can inventory encryption, expose non-compliant TLS, and choose between decryption or Precryption® for visibility that fits their policies—allowing them to move toward quantum-safe encryption without adding operational friction.”

Deep Observability Pipeline: Laying the TLS 1.3 Foundation for PQC Readiness

As organizations prepare for the transition from public key algorithms to PQC, they must first understand where cryptography is applied, how data flows between systems, and which assets remain exposed. Such insights require deep observability—the correlation of network-derived telemetry (packets, flows, and metadata) with logs from security, cloud, and observability tools.

The Gigamon Deep Observability Pipeline provides this visibility by uncovering weak cipher suites and non-compliant encryption methods often concealed within encrypted flows. Using Gigamon, organizations can build cryptographic inventories, validate PQC readiness, and maintain secure operations across both classical and quantum-safe environments.

The industry-wide transition to TLS 1.3, one of the most widely adopted encryption protocols, plays a key role in PQC readiness. TLS 1.3 is natively supported by Gigamon, enabling customers to decrypt or selectively inspect traffic using Precryption®. This approach provides plaintext visibility across encrypted traffic in virtual, cloud, and containerized environments—without breaking encryption.

Additionally, Gigamon Application Metadata Intelligence (AMI), which enriches network telemetry with application-level context, now supports PQC. This enhancement allows organizations to identify and eliminate insecure cryptographic practices, strengthening their defense against data exfiltration and paving the way for a secure, quantum-resistant hybrid cloud infrastructure.

Key Capabilities of the New PQC Integration

  • Encrypted Traffic Visibility: Gigamon delivers flexible visibility into encrypted communications, allowing teams to either decrypt traffic or use Precryption® to view plaintext data before encryption. The platform extracts metadata such as TLS version, cipher suite, SNI, and IP information, offering deep insights without decryption.

  • Seamless Integration with Security Tools: Flow records and metadata are exported to SIEM, vulnerability management, and compliance tools, including Splunk, QRadar, and Elastic. These integrations help generate dashboards and alerts for insecure protocols, aiding regulatory compliance.

  • Accelerated PQC Transition: Organizations can identify and phase out weak TLS/SSL versions, reduce exploit exposure, and strengthen cryptographic posture as they transition toward post-quantum standards.

Share this article

Related Articles

Related Articles

Related Articles