

Gigamon Deep Observability Pipeline and Microsoft Defender for Endpoint target different areas in cybersecurity, with Gigamon focusing on network traffic analysis and Defender on endpoint security. Microsoft Defender for Endpoint has an edge regarding comprehensive security features, while Gigamon specializes in network-level visibility.
Features: Gigamon Deep Observability Pipeline facilitates extensive insights into network performance, boasts advanced packet filtering capabilities, and aids in security inspection. Microsoft Defender for Endpoint offers robust threat detection, integrated cloud analytics, and effective anti-malware protection, capitalizing on a large user base for enhanced threat intelligence.
Room for Improvement: Gigamon could enhance its user-friendliness and reduce the complexity of its setup and maintenance. It might also expand its intelligent traffic flow analysis capabilities. Microsoft Defender may focus on reducing false positives, improving integration ease with non-Microsoft products, and streamlining user interfaces to enhance user experience.
Ease of Deployment and Customer Service: Gigamon presents a more complex deployment process due to its technical requirements, often demanding specialized knowledge. On the other hand, Microsoft Defender for Endpoint benefits from seamless integration within the Microsoft ecosystem, offering a more straightforward setup and user-friendly customer support experience.
Pricing and ROI: Gigamon incurs higher initial costs, justified by premium network analysis features, providing substantial ROI in data-intensive environments. Microsoft Defender for Endpoint is more cost-effective upfront, offering significant value through its comprehensive security and efficient threat management, ensuring a strong ROI.
Without detection and protection measures, organizations would face substantial payments and reputational damage, including the necessity to inform customers about data breaches, potentially leading to loss of business.
We have seen a return on investment when using Microsoft Defender for Endpoint, as it saves labor by reducing the need for staff to focus on it.
The biggest return on investment for me when using Microsoft Defender for Endpoint is the time saving.
The technical support by Gigamon Deep Observability Pipeline is good because it has a local architect in my area.
The Microsoft agent, who did not actually work for Microsoft, is one of the vendors that Microsoft uses for support, said, 'Just to set expectations, my lunch break is in an hour and I am going to go away then.'
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Microsoft Defender for Endpoint is scalable enough to handle various devices across environments, whether they are laptops, Android devices, or operating in hybrid environments.
Compatibility is its main feature.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
In contrast, competing products offer reduced pricing for long-term commitments, which makes it difficult for us in that environment.
We use Microsoft partners to help govern the platform, and as part of an alliance, we want to gather data from each tenant and combine them for a complete view.
That has been the trend we have seen with Microsoft lately—it is just getting more and more expensive.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
It costs $15 per VM for the P2 plan, which is seen as affordable for customers.
The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Microsoft Defender for Endpoint provides a unified management interface allowing customers to manage their on-premises and hybrid infrastructures from a single pane.
One of the best features of Microsoft Defender for Endpoint is its database for identifying zero-day attacks or malware attacks.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 5.7% |
| Gigamon Deep Observability Pipeline | 1.9% |
| Other | 92.4% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 43 |
| Large Enterprise | 95 |
Gigamon Deep Observability Pipeline boosts network visibility and performance through features like NetFlow and deduplication, facilitating data flow insights and improved security. It supports traffic monitoring and management across various infrastructures.
Gigamon Deep Observability Pipeline enhances network management by offering features such as NetFlow, deduplication, header stripping, and packet filtering. These capabilities are instrumental in optimizing performance, offering users stability and improved encryption processes. Despite its robust hardware capabilities, it requires enhancements in security, filtering, and delivery time for hardware. Users note challenges with monitoring cloud networks and insufficient cluster capacity. There is also a call for improved interface design and internal traffic flow visualization.
What are the essential features of Gigamon Deep Observability Pipeline?Gigamon Deep Observability Pipeline finds application across industries for network visibility and management. It is used extensively for traffic monitoring, SSL inspection, mobile network oversight, and data center operations. Organizations leverage its capabilities to address network issues, enhance security, and streamline performance monitoring processes. Its ability to group traffic aids significantly in problem-solving and SSL detection.
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.