Try our new research platform with insights from 80,000+ expert users

Anomali vs Gigamon Deep Observability Pipeline comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Anomali
Ranking in Security Information and Event Management (SIEM)
31st
Ranking in Advanced Threat Protection (ATP)
20th
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
User Entity Behavior Analytics (UEBA) (15th), Threat Intelligence Platforms (TIP) (7th), Extended Detection and Response (XDR) (25th)
Gigamon Deep Observability ...
Ranking in Security Information and Event Management (SIEM)
42nd
Ranking in Advanced Threat Protection (ATP)
24th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
9
Ranking in other categories
Application Performance Monitoring (APM) and Observability (39th), Event Monitoring (10th), Data Loss Prevention (DLP) (31st), Web Application Firewall (WAF) (30th), Network Packet Broker (NPB) (1st), Network Detection and Response (NDR) (17th)
 

Mindshare comparison

As of December 2025, in the Security Information and Event Management (SIEM) category, the mindshare of Anomali is 0.8%, up from 0.2% compared to the previous year. The mindshare of Gigamon Deep Observability Pipeline is 0.3%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM) Market Share Distribution
ProductMarket Share (%)
Anomali0.8%
Gigamon Deep Observability Pipeline0.3%
Other98.9%
Security Information and Event Management (SIEM)
 

Featured Reviews

CC
Enterprise Security Architect V at FirstEnergy
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
TN
Senior Relationship Banker at Joint stock Commercial Bank for Foreign Trade of V
Experience boosts operational efficiency while performance sees room for improvement
I don't have specific information on whether it was purchased on the AWS marketplace or somewhere else. I am working with Dynatrace Operator. I am also working with Algosec, Alluvio, CrowdStrike, Firemon, Gigamon Deep Observability Pipeline, and other solutions. I think it's a good tool, and I am satisfied with it. We have not stored cloud workloads with Gigamon Deep Observability Pipeline yet; we are still on-premises. The technical support takes about one to two hours to respond, which is acceptable. I am satisfied with the scalability of the product. The interface is good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"The most valuable aspect of Anomali is the threat modeling capability."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"The most valuable feature is NetFlow."
"The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security."
"It is a good product. It provides network visibility, which is important. Gigamon can bring some optimizations to my network. It is helpful for security inspection, and it makes my firewall work fast because my firewall doesn't have to do the inspection of the SSL connections, for example."
"The most valuable feature for improving network visibility with Gigamon is the packet filtering capability."
"It offers straightforward integration."
"It has high stability."
"The solution is straightforward to set up."
"The tool's most valuable feature is the encryption feature. From a security perspective, the solution hasn't significantly strengthened our security posture. However, it has greatly improved performance by streamlining encryption processes and avoiding encryption at multiple layers. This has also simplified troubleshooting, as we can whitelist certain processes."
 

Cons

"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"Less code in integration would be nice when building blocks."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"Its filtering feature needs improvement."
"They should increase the solution's cluster capacity."
"Gigamon Deep Observability Pipeline needs to improve its performance. I face issues with performance because we use SPAN, and the SPAN traffic is not good."
"The graphical user interface could be improved."
"In terms of improvement, while the initial setup is not overly complicated, we did encounter a few issues."
"The Gigamon Deep Observability Pipeline should have a feature showing the traffic flow within its platform. Currently, customers have to use separate tools for monitoring, which is inconvenient. If it had its visibility feature, it would make monitoring easier and more complete without needing extra tools."
"It only inspects a specific kind of traffic. There should be different kinds of use cases."
"The security should be improved."
 

Pricing and Cost Advice

"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"I would rate the solution as expensive, around an eight or nine out of ten. There are other competitive solutions available."
"The solution is highly-priced."
"The solution's price is reasonable."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
879,310 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
9%
Educational Organization
7%
Manufacturing Company
7%
Financial Services Firm
14%
Computer Software Company
11%
Healthcare Company
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise1
Large Enterprise5
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise5
 

Questions from the Community

What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting. Combining all aliases ...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence, such as indicators of compromise (IOCs), and dissemination of reports for repo...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading the user manual and taking the instructor-led training sessions from the customer...
What do you like most about Gigamon Deep Observability Pipeline?
The most valuable feature for improving network visibility with Gigamon is the packet filtering capability.
What needs improvement with Gigamon Deep Observability Pipeline?
Gigamon Deep Observability Pipeline needs to improve its performance. I face issues with performance because we use SPAN, and the SPAN traffic is not good. They need to improve their performance.
What is your primary use case for Gigamon Deep Observability Pipeline?
I am working with Gigamon Deep Observability Pipeline and Firemon, and I have been working with it for a year.
 

Also Known As

Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
Gigamon, GigaSecure
 

Overview

 

Sample Customers

Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Amica Insurance, College of William & Mary, Gamma, IntercontinentalExchange, OppenheimerFunds
Find out what your peers are saying about Anomali vs. Gigamon Deep Observability Pipeline and other solutions. Updated: December 2025.
879,310 professionals have used our research since 2012.